SlideShare a Scribd company logo
Cyber security
Presentation On
What is Cybersecurity?
♦ The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
♦ Cyber Security and Information Security differs only in its
response and Reduction/Prevention.
♦ Cyber security encompasses all aspects of security viz.,
Physical, Technical, Environmental, Regulations and
Compliance including Third Parties involved in delivering
an objective
♦ With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm
are increasing also
Why Cybersecurity Is Important ?
• Our world today is ruled by technology and we can’t
do without it at all. From booking our flight tickets, to
catching up with an old friend, technology plays an
important role in it.
• However, the same technology may expose you when
it’s vulnerable and could lead to loss of essential data.
Cyber security, alongside physical commercial
security has thus, slowly and steadily, become one of
the most important topics in the business industry to
be talked about.
• Cyber security is necessary since it helps in securing
data from threats such as data theft or misuse, also
safeguards your system from viruses.
Why Cybersecurity is Important?
♦ Cyber security becomes important as Business
are being carried now on Network of Networks.
Computer networks have always been the
target of criminals, and it is likely that the
danger of cyber security breaches will only
increase in the future as these networks
expand, but there are sensible precautions
that organizations can take to minimize losses
from those who seek to do harm.
Cyber Security Objectives
Confidentiality
♦ the property that information is not
made available or disclosed to
unauthorized individuals, entities, or
processes
Confidentiality
♦ Confidentiality refers to protecting information
from being accessed by unauthorized parties.
In other words, only the people who are
authorized to do so can gain access to
sensitive data.
♦ A failure to maintain confidentiality means that
someone who shouldn't have access has
managed to get it, through intentional
behavior or by accident. Such a failure of
confidentiality, commonly known as a breach
Integrity
the property of safeguarding the accuracy
and completeness of assets
Integrity
♦ Integrity refers to ensuring the authenticity of
information—that information is not altered,
and that the source of the information is
genuine.
♦ Imagine that you have a website and you sell
products on that site. Now imagine that an
attacker can shop on your web site and
maliciously alter the prices of your products,
so that they can buy anything for whatever
price they choose. That would be a failure of
integrity, because your information—in this
case, the price of a product—has been altered
and you didn't authorize this alteration
Availability
♦ The property of being accessible and
usable upon demand by an authorized
entity
Availability
♦ Availability means that information is
accessible by authorized users.
♦ Information and other critical assets are
accessible to customers and the
business when needed. Note,
information is unavailable not only when
it is lost or destroyed, but also when
access to the information is denied or
delayed
Cyberspace as a Battleground?
Each day, there is an increase in the number of threats
against our nation's critical infrastructures.
These threats come in the form of computer intrusion
(hacking), denial of service attacks, and virus
deployment.
In India DEITY-Dept., of Electronics & Information
Technology operating under MCIT-Ministry of
Communication & Information Technology is responsible
for Cyberspace security other than delivering Govt.,
services online and promoting the IT Sector.
The National Information Board (NIB) a policy making
body for cyber security operates independently and is
chaired by National Security Advisor (NSA)
CERT-In performs emergency cyber security functions and
releases annual reports on security incidents
Cyber attack
♦ A malicious attempt, using digital
technologies, to cause personal or property
loss or damage, and/or steal or alter
confidential personal or organizational data
Major security problems
♦ Virus
♦ Hacker
♦ Malware
♦ Trojan horses
♦ Password cracking
Viruses and worms
♦ Virus – malware attached to a carrier such as
an email message or a word processing
document
♦ A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
♦ Worm – malware can autonomously spread
itself without a carrier, using information
about connected computers
Solution
♦ Install a security suite that protects the
computer against threats such as
viruses and worms.
Hackers
♦ In common a hacker is a person who
breaks into computers, usually by
gaining access to administrative
controls.
Types of Hackers
♦ White Hat Hacker
♦ Grey Hat Hacker
♦ Black Hat Hacker
Whit Hat Hackers
♦ The term "white hat" in Internet slang
refers to an ethical computer hacker, or
a computer security expert, who
specializes in penetration testing and in
other testing methodologies to ensure
the security of an organization's
information systems.
Grey Hat Hackers
♦ The term "grey hat", "greyhat" or "gray
hat" refers to a computer hacker or
computer security expert who may
sometimes violate laws or typical ethical
standards, but does not have the
malicious intent typical of a black hat
hacker.
Black Hat Hackers
♦ A black hat hacker (or black-hat hacker)
is a hacker who "violates computer
security for little reason beyond
maliciousness or for personal gain".
How To prevent hacking
♦ It may be impossible to prevent
computer hacking, however effective
security controls including strong
passwords, and the use of firewalls can
helps.
Malware
♦ The word "malware" comes from the
term "MALicious softWARE."
♦ Software that has some malicious intent
and which is installed on a user’s
computer without that user’s consent.
♦ Key loggers – Software installed on a
computer that captures key strokes and
sends these to a remote system. Used
to try and get personal information to
gain access to sites such as banks
Malware Cont.
♦ Ransomware– Software that runs on a
user’s computer and demands that the
user pays some other organization. If
they don’t, the information on their
computer will be destroyed.
♦ Malware can usually spread itself from
one computer to another either as a
virus or as a worm
To Stop Malware
♦ Download an anti-malware program
that also helps prevent infections.
♦ Do not download from unknown sources
♦ Activate Network Threat Protection,
Firewall, Antivirus.
Trojan Horses
♦ Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
♦ These viruses are the
most serious threats
to computers
How to Avoid Trojans
♦ Security suites, such as Avast Internet
Security, will prevent you from
downloading Trojan Horses.
♦ Do not click unknown links.
Password Cracking
♦ Password attacks are attacks by
hackers that are able to determine
passwords or find passwords to different
protected electronic areas and social
network sites.
Securing Password
♦ Use always Strong password. Never use
same password for two different sites.
Insider attacks
♦ Attacks to an organization carried out
by someone who is inside that
organization either by himself or with
connivance of an outsider.
♦ • Difficult to counter using technical
methods as the insider may have valid
credentials to access the system
External attacks
♦ Attacks to an organisation carried out
by an external agent
♦ Requires either valid credentials or the
exploitation of some vulnerability to
gain access to the systems
Malicious and accidental damage
♦ Cybersecurity is most concerned with
– Cyber attacks
♦ Cyber-accidents – Accidental events
that can cause loss or damage to to an
individual, business or public body.
♦ Many of the same technologies used to
protect against external attack also
protect against cyber-accidents.
♦ However, sometimes protecting against
cyber attacks increases the probability
of cyber-accidents.
Analysis of Information Security
Threats
• WHO
– 98% from external
agents
– 4% from implicated
internal employees
– < 1% by Business
Partners &
– 58% of all data thefts
linked to activist
groups
• WHO
– 98% from external
agents
– 4% from implicated
internal employees
– < 1% by Business
Partners &
– 58% of all data thefts
linked to activist
groups
Latest Trends – Information
Security Threats
Hacktivism
- Hack + Activism = Hacktivism
- the use of legal and/or illegal digital tools in pursuit of a political /
personal objective
- Tools and Attacks are used for
- Web-site defacements
- Redirects
- Denial Of Service Attacks
- Identity Theft
- E-mail Bombing
- Web-Site Mirroring
- Doxing – To gather information using sourced on the internet
Web Site Defacement
♦ Web Site Defacements – Hacking and altering
the website of a company’s website.
Identity Fraud / Identity Theft
♦ Stealing someone's identity in which someone pretends
to be someone else by assuming that person's identity
Doxing
♦ Process of Gathering and releasing Personally
Identifiable information
Denial Of Service Attack
• Attempt to make a machine or network resource
unavailable to its intended users
• typically target sites or services hosted on high-profile
web servers such as banks, credit card payment
gateways, and even root nameservers.
Key Techniques Used
♦ Phishing - attempt to acquire sensitive information,
like bank account information or an account password,
by posing as a legitimate entity in an electronic
communication
 You get an email that looks like it comes from your
bank, credit card company, etc.
 Asking you to “update their records” may be due to
potential fraud, other reasons
 Provides a hyperlink to a web page where you enter
your personal information
 The link takes you to a thief’s website that is disguised
to look like the company’s.
Key Technique Used
• Step 1 - Preparation
– Setup fake website
• Step 2 - Luring the
users
– Send Email with fake
link
• Step 3 - Steal the
details
– User gives away
id/password
• Step 4 - Use the details
– Commit fraud
Real Web SiteReal Web Site
PhisherPhisher
VictimVictim
Phishing email
User’s response
(id/password)
Use of stolen (id/password)
information
Phishing How-to
Most common security mistakes
• Poor password management
• Not locking the computer while unattended
• Opening email attachments from unknown addressees
• Not running anti-virus programs
• Sharing information (and machines)
• Not reporting security violations
• Unattended Paper Documents
• Unprotected Electronic Data (while at rest and in
motion).E.g: Emails, USB’s, CD’s, etc..
• Improper Information Handling
• Passing of information over Phone.
Information Security Responsibilities
• Engage Information Security teams to support the line of business,
enabling secure solutions for new processes and technology
• Work with Information Security teams RISO, RISI to drive line of
business-specific information security metrics reporting
• Support Regional Information Security teams in mitigating security
risks from Internal Audit report findings
• Follow business continuity plans given by bank, in case of any
disaster/ emergency.
• Report Security Violations and security incidents
• Adhere to Bank’s Information Security Policy and guidelines
• Maintain and update Asset register of your office/dept
• Extend support to RISO during Risk Assessment and Business Impact
Analysis of your office/dept
• Implement and act in accordance with the organization’s information
security policies and procedures
• Protect assets from unauthorized access, disclosure, modification,
destruction, or interference
• Execute defined security processes or activities
• Report security events, potential events, or other security risks by
following approved processes
• Do not use systems or access information without authorization
• Adheres to controls put in place to protect assets
Standards & Regulations
 ISO 27001 (Information Security Management
System)
 ISO 22301 (Business Continuity Management
System)
 PCI- DSS (Payment Card Industry - Data Security
Standard)
 IT Act 2000 & ITAA 2008 (Information Technology
Act, India)
 RBI Guidelines (Reserve Bank of India)
Cyber Security Is Everyone’s
Responsibility
Robert Statica – Cybersecurity
India stands 10th in the cyber
crime in the world
Conclusion
♦ I hope that my presentation will be
helpful for my audience to improve their
knowledge about cyber security and to
overcome several security loopholes on
their computer operation. Also it helps
to spread awareness among normal
people about emerging security threats.
Simple and practical prevention
methods are explained in the Seminar
to protect the information assets.
Cyber security & Importance of Cyber Security

More Related Content

PPTX
Cyber security
PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Cyber security ppt
PPTX
Cyber security
PPTX
Cyber Security
PPTX
Cyber security presentation
PPTX
Cyber security
Cyber security
Cyber security presentation
Cyber security
Cyber security ppt
Cyber security
Cyber Security
Cyber security presentation
Cyber security

What's hot (20)

PPTX
Ethical hacking
PPTX
Introduction to cyber security
PPTX
Cybersecurity PowerPoint Presentation
PPTX
Cyber security
PPTX
Presentation on Ethical Hacking ppt
PPTX
Cyber Security
PPTX
cyber security
PPTX
cyber security presentation.pptx
PPT
Ethical hacking
PPTX
Cybersecurity
PDF
Network Security Presentation
PDF
Cyber security
PPTX
Cyber Security in Society
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Computer Security Threats
PPTX
Cryptography
PPTX
Types of cyber attacks
PPTX
Cyber security
PPTX
Cloud security
Ethical hacking
Introduction to cyber security
Cybersecurity PowerPoint Presentation
Cyber security
Presentation on Ethical Hacking ppt
Cyber Security
cyber security
cyber security presentation.pptx
Ethical hacking
Cybersecurity
Network Security Presentation
Cyber security
Cyber Security in Society
Cybersecurity 1. intro to cybersecurity
Computer Security Threats
Cryptography
Types of cyber attacks
Cyber security
Cloud security
Ad

Similar to Cyber security & Importance of Cyber Security (20)

PPTX
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
PPTX
Cybersecurity Explained: From Viruses to Ethical Hacking
PPTX
Cyber security detailed ppt and understand
PDF
Implications of Misuse and Cyber Security.pdf
PPTX
Introduction of ethical hacking.........
DOCX
Cyber Security.docx
DOCX
Cyber Security Company.docx
PPTX
CYBER SECURITY
PPTX
Computer-Security.pptx
PPTX
unit -ii security1.pptx for Information system management
PPTX
Cyber Security, cyber crime and cyber safety all .pptx
PPTX
Ethical Hacking
PDF
SAMPLE ATTACKS PRESENTATION.pdf
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PPTX
Cyber Security and data Security for all.pptx
PPTX
Introduction to Cyber Security-- L01.pptx
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
Cybersecurity Explained: From Viruses to Ethical Hacking
Cyber security detailed ppt and understand
Implications of Misuse and Cyber Security.pdf
Introduction of ethical hacking.........
Cyber Security.docx
Cyber Security Company.docx
CYBER SECURITY
Computer-Security.pptx
unit -ii security1.pptx for Information system management
Cyber Security, cyber crime and cyber safety all .pptx
Ethical Hacking
SAMPLE ATTACKS PRESENTATION.pdf
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
Cyber Security and data Security for all.pptx
Introduction to Cyber Security-- L01.pptx
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber Security Awareness Session for Executives and Non-IT professionals
Ad

More from Mohammed Adam (20)

PPTX
Android Penetration Testing - Day 3
PPTX
Android Penetration testing - Day 2
PPTX
Android Penetration Testing - Day 1
PPTX
Wireless Penetration Testing
PPTX
Network Penetration Testing
PPTX
Basic Foundation For Cybersecurity
PPTX
Golden Ticket Attack - AD - Domain Persistence
PPTX
Evading Antivirus software for fun and profit
PDF
Introduction to Network Fundamentals
PPTX
Breaking out of crypto authentication
PPTX
Cybersecurity Awareness Session by Adam
PPTX
Career Guidance on Cybersecurity by Mohammed Adam
PPTX
Introduction to null villupuram community
PPTX
Internet security
PDF
BugBounty Roadmap with Mohammed Adam
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PPTX
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
PPTX
Android Application Penetration Testing - Mohammed Adam
PPTX
Vulnerability assessment &amp; Penetration testing Basics
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Android Penetration Testing - Day 3
Android Penetration testing - Day 2
Android Penetration Testing - Day 1
Wireless Penetration Testing
Network Penetration Testing
Basic Foundation For Cybersecurity
Golden Ticket Attack - AD - Domain Persistence
Evading Antivirus software for fun and profit
Introduction to Network Fundamentals
Breaking out of crypto authentication
Cybersecurity Awareness Session by Adam
Career Guidance on Cybersecurity by Mohammed Adam
Introduction to null villupuram community
Internet security
BugBounty Roadmap with Mohammed Adam
Webinar On Ethical Hacking & Cybersecurity - Day2
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Android Application Penetration Testing - Mohammed Adam
Vulnerability assessment &amp; Penetration testing Basics
What is SSL ? The Secure Sockets Layer (SSL) Protocol

Recently uploaded (20)

PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
GamePlan Trading System Review: Professional Trader's Honest Take
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Advanced Soft Computing BINUS July 2025.pdf
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Cyber security & Importance of Cyber Security

  • 2. What is Cybersecurity? ♦ The term cyber security is used to refer to the security offered through on-line services to protect your online information. ♦ Cyber Security and Information Security differs only in its response and Reduction/Prevention. ♦ Cyber security encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations and Compliance including Third Parties involved in delivering an objective ♦ With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also
  • 3. Why Cybersecurity Is Important ? • Our world today is ruled by technology and we can’t do without it at all. From booking our flight tickets, to catching up with an old friend, technology plays an important role in it. • However, the same technology may expose you when it’s vulnerable and could lead to loss of essential data. Cyber security, alongside physical commercial security has thus, slowly and steadily, become one of the most important topics in the business industry to be talked about. • Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 4. Why Cybersecurity is Important? ♦ Cyber security becomes important as Business are being carried now on Network of Networks. Computer networks have always been the target of criminals, and it is likely that the danger of cyber security breaches will only increase in the future as these networks expand, but there are sensible precautions that organizations can take to minimize losses from those who seek to do harm.
  • 6. Confidentiality ♦ the property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  • 7. Confidentiality ♦ Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. ♦ A failure to maintain confidentiality means that someone who shouldn't have access has managed to get it, through intentional behavior or by accident. Such a failure of confidentiality, commonly known as a breach
  • 8. Integrity the property of safeguarding the accuracy and completeness of assets
  • 9. Integrity ♦ Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine. ♦ Imagine that you have a website and you sell products on that site. Now imagine that an attacker can shop on your web site and maliciously alter the prices of your products, so that they can buy anything for whatever price they choose. That would be a failure of integrity, because your information—in this case, the price of a product—has been altered and you didn't authorize this alteration
  • 10. Availability ♦ The property of being accessible and usable upon demand by an authorized entity
  • 11. Availability ♦ Availability means that information is accessible by authorized users. ♦ Information and other critical assets are accessible to customers and the business when needed. Note, information is unavailable not only when it is lost or destroyed, but also when access to the information is denied or delayed
  • 12. Cyberspace as a Battleground? Each day, there is an increase in the number of threats against our nation's critical infrastructures. These threats come in the form of computer intrusion (hacking), denial of service attacks, and virus deployment. In India DEITY-Dept., of Electronics & Information Technology operating under MCIT-Ministry of Communication & Information Technology is responsible for Cyberspace security other than delivering Govt., services online and promoting the IT Sector. The National Information Board (NIB) a policy making body for cyber security operates independently and is chaired by National Security Advisor (NSA) CERT-In performs emergency cyber security functions and releases annual reports on security incidents
  • 13. Cyber attack ♦ A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organizational data
  • 14. Major security problems ♦ Virus ♦ Hacker ♦ Malware ♦ Trojan horses ♦ Password cracking
  • 15. Viruses and worms ♦ Virus – malware attached to a carrier such as an email message or a word processing document ♦ A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes ♦ Worm – malware can autonomously spread itself without a carrier, using information about connected computers
  • 16. Solution ♦ Install a security suite that protects the computer against threats such as viruses and worms.
  • 17. Hackers ♦ In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 18. Types of Hackers ♦ White Hat Hacker ♦ Grey Hat Hacker ♦ Black Hat Hacker
  • 19. Whit Hat Hackers ♦ The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
  • 20. Grey Hat Hackers ♦ The term "grey hat", "greyhat" or "gray hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  • 21. Black Hat Hackers ♦ A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
  • 22. How To prevent hacking ♦ It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 23. Malware ♦ The word "malware" comes from the term "MALicious softWARE." ♦ Software that has some malicious intent and which is installed on a user’s computer without that user’s consent. ♦ Key loggers – Software installed on a computer that captures key strokes and sends these to a remote system. Used to try and get personal information to gain access to sites such as banks
  • 24. Malware Cont. ♦ Ransomware– Software that runs on a user’s computer and demands that the user pays some other organization. If they don’t, the information on their computer will be destroyed. ♦ Malware can usually spread itself from one computer to another either as a virus or as a worm
  • 25. To Stop Malware ♦ Download an anti-malware program that also helps prevent infections. ♦ Do not download from unknown sources ♦ Activate Network Threat Protection, Firewall, Antivirus.
  • 26. Trojan Horses ♦ Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. ♦ These viruses are the most serious threats to computers
  • 27. How to Avoid Trojans ♦ Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses. ♦ Do not click unknown links.
  • 28. Password Cracking ♦ Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 29. Securing Password ♦ Use always Strong password. Never use same password for two different sites.
  • 30. Insider attacks ♦ Attacks to an organization carried out by someone who is inside that organization either by himself or with connivance of an outsider. ♦ • Difficult to counter using technical methods as the insider may have valid credentials to access the system
  • 31. External attacks ♦ Attacks to an organisation carried out by an external agent ♦ Requires either valid credentials or the exploitation of some vulnerability to gain access to the systems
  • 32. Malicious and accidental damage ♦ Cybersecurity is most concerned with – Cyber attacks ♦ Cyber-accidents – Accidental events that can cause loss or damage to to an individual, business or public body. ♦ Many of the same technologies used to protect against external attack also protect against cyber-accidents. ♦ However, sometimes protecting against cyber attacks increases the probability of cyber-accidents.
  • 33. Analysis of Information Security Threats • WHO – 98% from external agents – 4% from implicated internal employees – < 1% by Business Partners & – 58% of all data thefts linked to activist groups • WHO – 98% from external agents – 4% from implicated internal employees – < 1% by Business Partners & – 58% of all data thefts linked to activist groups
  • 34. Latest Trends – Information Security Threats Hacktivism - Hack + Activism = Hacktivism - the use of legal and/or illegal digital tools in pursuit of a political / personal objective - Tools and Attacks are used for - Web-site defacements - Redirects - Denial Of Service Attacks - Identity Theft - E-mail Bombing - Web-Site Mirroring - Doxing – To gather information using sourced on the internet
  • 35. Web Site Defacement ♦ Web Site Defacements – Hacking and altering the website of a company’s website.
  • 36. Identity Fraud / Identity Theft ♦ Stealing someone's identity in which someone pretends to be someone else by assuming that person's identity
  • 37. Doxing ♦ Process of Gathering and releasing Personally Identifiable information
  • 38. Denial Of Service Attack • Attempt to make a machine or network resource unavailable to its intended users • typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
  • 39. Key Techniques Used ♦ Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity in an electronic communication  You get an email that looks like it comes from your bank, credit card company, etc.  Asking you to “update their records” may be due to potential fraud, other reasons  Provides a hyperlink to a web page where you enter your personal information  The link takes you to a thief’s website that is disguised to look like the company’s.
  • 40. Key Technique Used • Step 1 - Preparation – Setup fake website • Step 2 - Luring the users – Send Email with fake link • Step 3 - Steal the details – User gives away id/password • Step 4 - Use the details – Commit fraud Real Web SiteReal Web Site PhisherPhisher VictimVictim Phishing email User’s response (id/password) Use of stolen (id/password) information Phishing How-to
  • 41. Most common security mistakes • Poor password management • Not locking the computer while unattended • Opening email attachments from unknown addressees • Not running anti-virus programs • Sharing information (and machines) • Not reporting security violations • Unattended Paper Documents • Unprotected Electronic Data (while at rest and in motion).E.g: Emails, USB’s, CD’s, etc.. • Improper Information Handling • Passing of information over Phone.
  • 42. Information Security Responsibilities • Engage Information Security teams to support the line of business, enabling secure solutions for new processes and technology • Work with Information Security teams RISO, RISI to drive line of business-specific information security metrics reporting • Support Regional Information Security teams in mitigating security risks from Internal Audit report findings • Follow business continuity plans given by bank, in case of any disaster/ emergency. • Report Security Violations and security incidents • Adhere to Bank’s Information Security Policy and guidelines • Maintain and update Asset register of your office/dept • Extend support to RISO during Risk Assessment and Business Impact Analysis of your office/dept
  • 43. • Implement and act in accordance with the organization’s information security policies and procedures • Protect assets from unauthorized access, disclosure, modification, destruction, or interference • Execute defined security processes or activities • Report security events, potential events, or other security risks by following approved processes • Do not use systems or access information without authorization • Adheres to controls put in place to protect assets
  • 44. Standards & Regulations  ISO 27001 (Information Security Management System)  ISO 22301 (Business Continuity Management System)  PCI- DSS (Payment Card Industry - Data Security Standard)  IT Act 2000 & ITAA 2008 (Information Technology Act, India)  RBI Guidelines (Reserve Bank of India)
  • 45. Cyber Security Is Everyone’s Responsibility Robert Statica – Cybersecurity
  • 46. India stands 10th in the cyber crime in the world
  • 47. Conclusion ♦ I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to protect the information assets.