SlideShare a Scribd company logo
CYBER SECURITY IN BANKS
PRESENTED BY:
TEAM CYBER AVENGERS
ANMOL TAPOL
SANISH SHRESTHA
SANJAY GAUTAM
WE MUST HAVE SEEN THESE HEADLINES 
WHAT IS CYBER SECURITY?
-Protection of “Cyber” from unwarranted threats & unauthorized
access.
CYBER COMPUTER COMPUTER
NETWORK
COMPUTER
NETWORK
VIRTUAL
REALITY
Ransomeware Phishing Hacking
Data Leakage
Insider
Threat
HEEELLPP!
WHAT HAS THE REGULATOR DONE?
Install Perimeter Defense, Access
Control, Firewall, Encryption &
Antivirus
Prepare Preventive, Detective and
Responsive IT Security Strategy
Provide information on Incident &
Attack
Conduct IT Audit and apply
International Best Practices
Circular 6/076/77
DO BANKS HAVE
OTHER LEGAL
PROTECTION?
• Electronic Transactions Act, 2063
 Formation of Controller
Supervision & access to any
computer system
Recognition of alternation of source
code as offence
Recognition of unauthorized access
as offence
• Punishments
 Fine not exceeding NPR 200,000;
or
 Imprisonment not exceeding 3
years; or
 Both
• Adequacy of Punishment???
 Minimal nature of
punishment
 Higher cases of impunity
 Financial losses are in
millions
• Suggestions….
 Include modern terminologies
 Increase capital punishment
 Compliance with extradition
 Link with BAFIA, 2073
CYBER SECURITY IN CORE BANKING SYSTEM
• Procedures to that includes security experts that monitor, prevent & detect fraud
in CBS.
• Due focus placed on cashless movements.
• General IT controls may not track down the vulnerable areas.
• Use of reputed third party vendors or in-house development.
• Common sources:
Cyber
criminals
National
States
Hacktivists
Insiders
& Service
providers
Poor back-
up or
Clouding
services
Use of
sub-
standard
tools
Cyber security ppt final
MODERNIZATION
Cyber security ppt final
TARGETS
•Financial Institutions and Banks
•Internet Service Providers
•Governments and Defense agencies
•Multinational corporations
•Everyone connected to the network
Cracker:
Computer-savvy
programmer creates
attack software
Script Kiddies:
Unsophisticated
computer users
who know how to
execute
programs
Hacker Bulletin Board
SQL Injection
Buffer overflow
Password Crackers
Password Dictionaries
Successful attacks!
Crazyman broke into …
CoolCat penetrated…
Criminals:
Create & sell bots -> spam
Sell credit card numbers,…
System Administrators
Some scripts are useful
to protect networks…
11
TYPE OF MAJOR ATTACKS
• Social Engineering
• Malware
• Phishing
• Man-In-The-Middle Attack
• Denial-of-service attack
• Password Attack
SOCIAL ENGINEERING
• Hacking of Humans
• Information
Gathering
• Relationship
Developing
• Exploitation
Phone Call:
This is John,
the System
Admin.
What is your
password?
MALWARE
• Virus
• Worm
• Trojan
• Ransomware
• Spyware
• Adware
• Botnet
PHISHIN
G
• The main aim of Phishing is to steal restricted and private
information such as credit card details, login ids, and
passwords, etc.
• By impersonating oneself as a reliable establishment in
electronic communication.
• It is usually done through email spoofing/ instant messaging/
untrusted sites
Cyber security ppt final
MAN-IN-THE-MIDDLE ATTACK
• MitM attacks are the type of attacks where the attacker
eavesdrop between two consequently communicating hosts by
putting himself in between the point of data transmission
DENIAL-OF-SERVICE ATTACK
• In denial-of-service attack (DoS attack) the offender tries to
make digital assets inaccessible to its anticipated users.
• The offender provisionally interrupts services of a host who is
linked to the Internet.
Cyber security ppt final
PASSWORD ATTACK
• Brute-force
• Dictionary attack
SYMPTOMS
 Antivirus software detects a problem
 Pop-ups suddenly appear (may sell security software)
 Disk space disappears
 Files or transactions appear that should not be there
 System slows down to a crawl
CONT..
 Unusual messages, sounds, or displays on your monitor
 Stolen laptop (1 in 10 stolen in laptop lifetime)
 Your mouse moves by itself
 Your computer shuts down and powers off by itself
 Often not recognized
HOW TO PROTECT YOURSELF FROM CYBER
ATTACK
• Upgrade Your Operating System
• Turn on Automatic Updates
• Anti-Virus Software
• Back Up Your Data
• Create Secure Passwords
CONT..
• Set up a Firewall
• Validate SSL Certificates
• Avoid Installing Bundled Freeware
• Be Careful What You Download
• What To Do If You Get Hacked
• Never Ever Pay Hackers
BACKUP DATA
NO SECURITY MEASURE IS 100%
WHAT INFORMATION IS IMPORTANT TO YOU?
IS YOUR DATA BACK-UP?
THE FLOOR IS OPEN
THANK YOU
&
HAVE A GOOD DAY 

More Related Content

PDF
1. introduction to cyber security
PPTX
Cyber crime and security
PPTX
Cyber Security
PPTX
Cyber Security A Challenges For Mankind
PPTX
Cyber crime and security
PPTX
Cyber crime and security
PPTX
Cyber security
PPTX
Network security
1. introduction to cyber security
Cyber crime and security
Cyber Security
Cyber Security A Challenges For Mankind
Cyber crime and security
Cyber crime and security
Cyber security
Network security

What's hot (20)

PDF
Cyber attacks
PPTX
CYBER SECURITY
PPTX
Cyber Security Presentation
PPTX
Cyber Security PPT - 2023.pptx
PPTX
CYBER SECURITY
PPTX
Cyber crime.pptx
PPTX
What is Cyber Security - Avantika University
PPTX
Cyber crime and security
PPTX
Security threats and safety measures
PPTX
Cyber security
PPTX
Introduction to cyber security amos
PDF
Cyber Security Awareness
PDF
Network Security Presentation
PDF
Cyber security
PPTX
Cyber Crime And Security
PPTX
Cyber crime ppt
PPTX
Information Security Awareness Training Open
PPTX
PPTX
Network Security ppt
PPT
cyber crime and privacy issues by varun call for assistence 8003498888
Cyber attacks
CYBER SECURITY
Cyber Security Presentation
Cyber Security PPT - 2023.pptx
CYBER SECURITY
Cyber crime.pptx
What is Cyber Security - Avantika University
Cyber crime and security
Security threats and safety measures
Cyber security
Introduction to cyber security amos
Cyber Security Awareness
Network Security Presentation
Cyber security
Cyber Crime And Security
Cyber crime ppt
Information Security Awareness Training Open
Network Security ppt
cyber crime and privacy issues by varun call for assistence 8003498888
Ad

Similar to Cyber security ppt final (20)

PPTX
cyber threats and attacks.pptx
PPTX
cyber threats introduction and cyber threats types
PPTX
Cyber crime
PPTX
Security Threats & Cyber Crimes
PPTX
Cyber security based on security of cyber
PPTX
Cyber security
PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Information cyber security
PPTX
Ppt on cyber security
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
Lesson 3 - Cybersecurity and its impact to e-commerce (32).pptx
PPTX
Cyber security detailed ppt and understand
PPTX
Cyber Crime.pptx
PPTX
Cybercrime
PPTX
Cyber crimes
PPTX
Computer Science Power point presentation PPT on Cyber Security11.pptx
PPTX
Types-of-Cyberattacks:Malware, Phishing.pptx
PPT
Dos and Dont to be followed to protect information and technology
PPTX
Cyber crime
PPTX
Cyber crime and security 1
cyber threats and attacks.pptx
cyber threats introduction and cyber threats types
Cyber crime
Security Threats & Cyber Crimes
Cyber security based on security of cyber
Cyber security
Information & cyber security, Winter training ,bsnl. online
Information cyber security
Ppt on cyber security
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
Lesson 3 - Cybersecurity and its impact to e-commerce (32).pptx
Cyber security detailed ppt and understand
Cyber Crime.pptx
Cybercrime
Cyber crimes
Computer Science Power point presentation PPT on Cyber Security11.pptx
Types-of-Cyberattacks:Malware, Phishing.pptx
Dos and Dont to be followed to protect information and technology
Cyber crime
Cyber crime and security 1
Ad

Recently uploaded (20)

PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PDF
Training And Development of Employee .pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
DOCX
Business Management - unit 1 and 2
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
HR Introduction Slide (1).pptx on hr intro
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Belch_12e_PPT_Ch18_Accessible_university.pptx
WRN_Investor_Presentation_August 2025.pdf
New Microsoft PowerPoint Presentation - Copy.pptx
340036916-American-Literature-Literary-Period-Overview.ppt
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Ôn tập tiếng anh trong kinh doanh nâng cao
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Training And Development of Employee .pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
COST SHEET- Tender and Quotation unit 2.pdf
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
unit 1 COST ACCOUNTING AND COST SHEET
Business Management - unit 1 and 2
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
HR Introduction Slide (1).pptx on hr intro

Cyber security ppt final

  • 1. CYBER SECURITY IN BANKS PRESENTED BY: TEAM CYBER AVENGERS ANMOL TAPOL SANISH SHRESTHA SANJAY GAUTAM
  • 2. WE MUST HAVE SEEN THESE HEADLINES 
  • 3. WHAT IS CYBER SECURITY? -Protection of “Cyber” from unwarranted threats & unauthorized access. CYBER COMPUTER COMPUTER NETWORK COMPUTER NETWORK VIRTUAL REALITY Ransomeware Phishing Hacking Data Leakage Insider Threat HEEELLPP!
  • 4. WHAT HAS THE REGULATOR DONE? Install Perimeter Defense, Access Control, Firewall, Encryption & Antivirus Prepare Preventive, Detective and Responsive IT Security Strategy Provide information on Incident & Attack Conduct IT Audit and apply International Best Practices Circular 6/076/77
  • 5. DO BANKS HAVE OTHER LEGAL PROTECTION? • Electronic Transactions Act, 2063  Formation of Controller Supervision & access to any computer system Recognition of alternation of source code as offence Recognition of unauthorized access as offence • Punishments  Fine not exceeding NPR 200,000; or  Imprisonment not exceeding 3 years; or  Both • Adequacy of Punishment???  Minimal nature of punishment  Higher cases of impunity  Financial losses are in millions • Suggestions….  Include modern terminologies  Increase capital punishment  Compliance with extradition  Link with BAFIA, 2073
  • 6. CYBER SECURITY IN CORE BANKING SYSTEM • Procedures to that includes security experts that monitor, prevent & detect fraud in CBS. • Due focus placed on cashless movements. • General IT controls may not track down the vulnerable areas. • Use of reputed third party vendors or in-house development. • Common sources: Cyber criminals National States Hacktivists Insiders & Service providers Poor back- up or Clouding services Use of sub- standard tools
  • 10. TARGETS •Financial Institutions and Banks •Internet Service Providers •Governments and Defense agencies •Multinational corporations •Everyone connected to the network
  • 11. Cracker: Computer-savvy programmer creates attack software Script Kiddies: Unsophisticated computer users who know how to execute programs Hacker Bulletin Board SQL Injection Buffer overflow Password Crackers Password Dictionaries Successful attacks! Crazyman broke into … CoolCat penetrated… Criminals: Create & sell bots -> spam Sell credit card numbers,… System Administrators Some scripts are useful to protect networks… 11
  • 12. TYPE OF MAJOR ATTACKS • Social Engineering • Malware • Phishing • Man-In-The-Middle Attack • Denial-of-service attack • Password Attack
  • 13. SOCIAL ENGINEERING • Hacking of Humans • Information Gathering • Relationship Developing • Exploitation Phone Call: This is John, the System Admin. What is your password?
  • 14. MALWARE • Virus • Worm • Trojan • Ransomware • Spyware • Adware • Botnet
  • 15. PHISHIN G • The main aim of Phishing is to steal restricted and private information such as credit card details, login ids, and passwords, etc. • By impersonating oneself as a reliable establishment in electronic communication. • It is usually done through email spoofing/ instant messaging/ untrusted sites
  • 17. MAN-IN-THE-MIDDLE ATTACK • MitM attacks are the type of attacks where the attacker eavesdrop between two consequently communicating hosts by putting himself in between the point of data transmission
  • 18. DENIAL-OF-SERVICE ATTACK • In denial-of-service attack (DoS attack) the offender tries to make digital assets inaccessible to its anticipated users. • The offender provisionally interrupts services of a host who is linked to the Internet.
  • 21. SYMPTOMS  Antivirus software detects a problem  Pop-ups suddenly appear (may sell security software)  Disk space disappears  Files or transactions appear that should not be there  System slows down to a crawl
  • 22. CONT..  Unusual messages, sounds, or displays on your monitor  Stolen laptop (1 in 10 stolen in laptop lifetime)  Your mouse moves by itself  Your computer shuts down and powers off by itself  Often not recognized
  • 23. HOW TO PROTECT YOURSELF FROM CYBER ATTACK • Upgrade Your Operating System • Turn on Automatic Updates • Anti-Virus Software • Back Up Your Data • Create Secure Passwords
  • 24. CONT.. • Set up a Firewall • Validate SSL Certificates • Avoid Installing Bundled Freeware • Be Careful What You Download • What To Do If You Get Hacked • Never Ever Pay Hackers
  • 25. BACKUP DATA NO SECURITY MEASURE IS 100% WHAT INFORMATION IS IMPORTANT TO YOU? IS YOUR DATA BACK-UP?
  • 26. THE FLOOR IS OPEN
  • 27. THANK YOU & HAVE A GOOD DAY 

Editor's Notes

  • #26: Backup should be done (at least)once a week. If possible, store to a removable media. The removable media should be big enough to hold 52 weeks of backup (e.g., 500GB). Do a full backup once a month and store it in offsite location. This would be useful in case of a disaster in your office (fire, theft, flood, etc). On the removable media create 12 folders for each month. Backup data should be tested periodically to ensure reliability.