SlideShare a Scribd company logo
2
Most read
4
Most read
6
Most read
CYBERSECURITY
• Aditya Ratnaparkhi
• Deep Talati
• Akshat Vaidya
• Shivam Raj
• Aashay Kedar
• Rushi Maniar
• Ritvik Shankar
• Harsh Patel
GROUP 1
Introduction
● What is Cybersecurity?
○ Protecting computers
○ Access authorization
○ Relevance to IS
● History
○ Creeper and Reaper
○ First dedicated antivirus company in 1987
○ Morris worm in 1989
● Why Cybersecurity
○ Personal information at stake
○ Affects companies, governments, individuals
○ Lower risk in Cyber crimes
The CIA Triad
● Confidentiality
○ Preventing unauthorized disclosure of
information
● Integrity
○ Validating that your data is trustworthy
and accurate
● Availability
○ Ensuring data is readily available for
authorized users
Cyber Threats
● DDoS (Distributed Denial of Service)
● Backdoor
● Social Engineering
Cyber Threats
● Malware
● Evil Maid
● Eavesdropping
CIA violations in Real World
• WannaCry Ransomware
o Backdoor – Availability
Encrypted data and hackers demanded for ransom
• Facebook/Google Privacy
o Social Engineering – Confidentiality & Integrity
Facebook let personal information of 87 million users
exposed to British Analytics firm to supposedly
disinform users and affect US presidential elections
• GitHub
o DDos – Availability
Hit with most powerful DDos attack ever recorded of
1.35 terabytes per second. Github having a good
cybersecurity system in place recovered in 10 minutes
• Dark Web
o Social Engineering - Confidentiality & Integrity
Since data is not indexed or encrypted, information
flow is potentially vulnerable throughout the Dark
Web
Preventive measures
● Hackers are persistent
● Key to staying ahead is staying
informed
● Various measures must be taken,
both by Enterprises and Individuals
Enterprise level
● Identify the Threats
● Educate Employees about potential
threats
● Implement Two-Factor
Authentication
● Ensure a Strong Sign-Off Policy
● Insure the Company Against
Cybercrime
Individual level
● Responsibly dispose your electronic
devices
● Maintain backups of your data
● Regularly update your antivirus
system
● Use Two/Multi-Factor Authentication
● Use encryption
● Password Management
● Discern the types WiFi networks
● Report cyber scams to FBI’s Internet
Crime Complaint Center or the
Federal Trade Commission
● 2017 – 8 billion connected devices to the internet
● 2023 – 45 billion IoT devices are expected to go online
● As the IoT continually evolves and grows, the number of cyberattacks increases.
● IoT attacks has increased from about 6,000 to 50,000 in the span of one year (2016 –
2017). Rise of 600%.
● Strategies used for IoT attacks:
-Identity compromise
-Device vulnerability
-Unprotected patches and upgrades
-Man-in-the-middle
Future – Cybersecurity with IoT
Strategies for protecting IoT
•Because IoT is a hyper-connected, and
hyper-distributed collection of resources,
there are many behaviors that need to
be monitored to keep connected IoT
devices in check.
References
● https://www.varonis.com/blog/events-that-changed-cybersecurity/
● https://www.google.com/amp/s/www.techly.com.au/2018/02/14/techly-explains-
fascinating-evolution-cybersecurity/amp/
● https://www.sentinelone.com/blog/history-of-cyber-security/
● https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-
CIA
● https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
● https://www.incapsula.com/web-application-security/social-engineering-attack.html
● https://en.m.wikipedia.org/wiki/Evil_maid_attack
● https://www.google.com/amp/s/www.csoonline.com/article/3237324/cyber-
attacks-espionage/what-is-a-cyber-attack-recent-examples-show-disturbing-
trends.amp.html
● https://www.cio.com/article/2432981/risk-management/building-an-enterprise-
security-program-in-ten-simple-steps.html

More Related Content

PDF
Cis controls v8_guide (1)
DOCX
DECISION MAKING AND TECHNIQUES OF DECISION MAKING
PPTX
Cyber security
PDF
Maritime Cyber Security
PPTX
Sdr co po ppt (4)
PPT
Cyber forensics
PPTX
Pgp pretty good privacy
PPTX
Cis controls v8_guide (1)
DECISION MAKING AND TECHNIQUES OF DECISION MAKING
Cyber security
Maritime Cyber Security
Sdr co po ppt (4)
Cyber forensics
Pgp pretty good privacy

What's hot (20)

PPTX
Introduction to cyber security
PPTX
PPTX
Data encryption
PDF
Introduction to Cybersecurity
PPTX
Social Media Cyber Security Awareness Briefing
PPTX
Cyber security
PPTX
CYBER SECURITY
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber security
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
Cyber crime (2018 )updated
PPTX
Cyber Security 03
PPTX
Cyber security
PPTX
Presentation on Cyber Security
PPTX
Cybercrime a growing threat of 21 st century !!!
PPTX
Ethical hacking
PPTX
Cyber Terrorism
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Social engineering
Introduction to cyber security
Data encryption
Introduction to Cybersecurity
Social Media Cyber Security Awareness Briefing
Cyber security
CYBER SECURITY
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber security
Introduction to Cybersecurity Fundamentals
Cyber crime (2018 )updated
Cyber Security 03
Cyber security
Presentation on Cyber Security
Cybercrime a growing threat of 21 st century !!!
Ethical hacking
Cyber Terrorism
Cyber Security Presentation "It Will Never Happen To Me"
Social engineering
Ad

Similar to Cybersecurity - Introduction and Preventive Measures (20)

PPTX
Cybercrime trends in last five years
PPTX
Cyber_Security_Presentation_with_Images.pptx
PPTX
Cyber_Security_Presentation_with_Images.pptx
PPTX
Cybersecurity.pptx
PPTX
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Topic – cyber security, Introduction,future scope
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PDF
cybercrime investigation and digital forensics
PDF
Cyber security
PPTX
Insider Threat Solution from GTRI
PPTX
Cybersecurity All information and topic wise
PPTX
Cybersecurity Presentation 15 slides.pptx
PDF
Practical approach to combating cyber crimes
PPTX
U-1.pptx..........................................
PDF
Cyber Security Course & Guide. X.GI. pdf
PPTX
Cybersecurity_Presentation.pptxCybersecurity_Presentation
PPTX
Cyber Security.pptx
PPTX
SIEM Fundamentals-Session 1 presentations
Cybercrime trends in last five years
Cyber_Security_Presentation_with_Images.pptx
Cyber_Security_Presentation_with_Images.pptx
Cybersecurity.pptx
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cyber Security and Data Privacy in Information Systems.pptx
Topic – cyber security, Introduction,future scope
CRI "Lessons From The Front Lines" March 26th Dublin
cybercrime investigation and digital forensics
Cyber security
Insider Threat Solution from GTRI
Cybersecurity All information and topic wise
Cybersecurity Presentation 15 slides.pptx
Practical approach to combating cyber crimes
U-1.pptx..........................................
Cyber Security Course & Guide. X.GI. pdf
Cybersecurity_Presentation.pptxCybersecurity_Presentation
Cyber Security.pptx
SIEM Fundamentals-Session 1 presentations
Ad

More from Aditya Ratnaparkhi (8)

PPTX
Network Setup in Argentina
PPTX
Firm Analysis of Progressive Corporation
PPTX
Job Application Database
PDF
Temperature Controlled Fan Project
PDF
Leveraging Data Analysis for Sales
PDF
Marketing Plan for a New Mobile App-Tripper
PDF
Boots:Hair-Care Sales Promotion
PPTX
Nike Marketing Presentation
Network Setup in Argentina
Firm Analysis of Progressive Corporation
Job Application Database
Temperature Controlled Fan Project
Leveraging Data Analysis for Sales
Marketing Plan for a New Mobile App-Tripper
Boots:Hair-Care Sales Promotion
Nike Marketing Presentation

Recently uploaded (20)

PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Introduction to Information and Communication Technology
DOCX
Unit-3 cyber security network security of internet system
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
522797556-Unit-2-Temperature-measurement-1-1.pptx
SAP Ariba Sourcing PPT for learning material
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Introuction about ICD -10 and ICD-11 PPT.pptx
presentation_pfe-universite-molay-seltan.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
QR Codes Qr codecodecodecodecocodedecodecode
SASE Traffic Flow - ZTNA Connector-1.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
RPKI Status Update, presented by Makito Lay at IDNOG 10
Module 1 - Cyber Law and Ethics 101.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Introduction to Information and Communication Technology
Unit-3 cyber security network security of internet system

Cybersecurity - Introduction and Preventive Measures

  • 1. CYBERSECURITY • Aditya Ratnaparkhi • Deep Talati • Akshat Vaidya • Shivam Raj • Aashay Kedar • Rushi Maniar • Ritvik Shankar • Harsh Patel GROUP 1
  • 2. Introduction ● What is Cybersecurity? ○ Protecting computers ○ Access authorization ○ Relevance to IS ● History ○ Creeper and Reaper ○ First dedicated antivirus company in 1987 ○ Morris worm in 1989 ● Why Cybersecurity ○ Personal information at stake ○ Affects companies, governments, individuals ○ Lower risk in Cyber crimes
  • 3. The CIA Triad ● Confidentiality ○ Preventing unauthorized disclosure of information ● Integrity ○ Validating that your data is trustworthy and accurate ● Availability ○ Ensuring data is readily available for authorized users
  • 4. Cyber Threats ● DDoS (Distributed Denial of Service) ● Backdoor ● Social Engineering
  • 5. Cyber Threats ● Malware ● Evil Maid ● Eavesdropping
  • 6. CIA violations in Real World • WannaCry Ransomware o Backdoor – Availability Encrypted data and hackers demanded for ransom • Facebook/Google Privacy o Social Engineering – Confidentiality & Integrity Facebook let personal information of 87 million users exposed to British Analytics firm to supposedly disinform users and affect US presidential elections • GitHub o DDos – Availability Hit with most powerful DDos attack ever recorded of 1.35 terabytes per second. Github having a good cybersecurity system in place recovered in 10 minutes • Dark Web o Social Engineering - Confidentiality & Integrity Since data is not indexed or encrypted, information flow is potentially vulnerable throughout the Dark Web
  • 7. Preventive measures ● Hackers are persistent ● Key to staying ahead is staying informed ● Various measures must be taken, both by Enterprises and Individuals
  • 8. Enterprise level ● Identify the Threats ● Educate Employees about potential threats ● Implement Two-Factor Authentication ● Ensure a Strong Sign-Off Policy ● Insure the Company Against Cybercrime
  • 9. Individual level ● Responsibly dispose your electronic devices ● Maintain backups of your data ● Regularly update your antivirus system ● Use Two/Multi-Factor Authentication ● Use encryption ● Password Management ● Discern the types WiFi networks ● Report cyber scams to FBI’s Internet Crime Complaint Center or the Federal Trade Commission
  • 10. ● 2017 – 8 billion connected devices to the internet ● 2023 – 45 billion IoT devices are expected to go online ● As the IoT continually evolves and grows, the number of cyberattacks increases. ● IoT attacks has increased from about 6,000 to 50,000 in the span of one year (2016 – 2017). Rise of 600%. ● Strategies used for IoT attacks: -Identity compromise -Device vulnerability -Unprotected patches and upgrades -Man-in-the-middle Future – Cybersecurity with IoT
  • 11. Strategies for protecting IoT •Because IoT is a hyper-connected, and hyper-distributed collection of resources, there are many behaviors that need to be monitored to keep connected IoT devices in check.
  • 12. References ● https://www.varonis.com/blog/events-that-changed-cybersecurity/ ● https://www.google.com/amp/s/www.techly.com.au/2018/02/14/techly-explains- fascinating-evolution-cybersecurity/amp/ ● https://www.sentinelone.com/blog/history-of-cyber-security/ ● https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability- CIA ● https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/ ● https://www.incapsula.com/web-application-security/social-engineering-attack.html ● https://en.m.wikipedia.org/wiki/Evil_maid_attack ● https://www.google.com/amp/s/www.csoonline.com/article/3237324/cyber- attacks-espionage/what-is-a-cyber-attack-recent-examples-show-disturbing- trends.amp.html ● https://www.cio.com/article/2432981/risk-management/building-an-enterprise- security-program-in-ten-simple-steps.html

Editor's Notes

  • #4: Bank account statements, personal information, credit card numbers, trade secrets, government documents are some examples of sensitive information. Corrupted or manipulated. human error or intentional tampering, banks are more concerned about the integrity of financial records Information can be erased or become inaccessible.