SlideShare a Scribd company logo
2
Most read
12
Most read
13
Most read
DETECTING AND MITIGATING CYBER THREATS AND ATTACKS
NAME: N Dhruva Theja
Roll No:321710301040
SUMMER INTERNSHIP
1
CONTENTS:
I. INTRODUCTION
II. THREATS
III. TYPES OF THREATS
IV. ATTACKS
V. TYPES OF ATTACKS
VI. DETCTION TECHONOLOGIES
VII. MITIGATING THREATS AND ATTACKS
2
Detecting and Mitigating threats and attacks means:
 Threat detection is the practice of analyzing the entirety of a security ecosystem
to identify any malicious activity that could compromise the network. If a threat is
detected, then mitigation efforts must be enacted to properly neutralize the
threat before it can exploit any present vulnerabilities.
3
THREATS:
 A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt
digital life in general.
 TYPES OF THREATS
 Ransomware
 Phishing
 Data Leakage
 Insider Threat
4
RANSOMWARE:
 Ransomware is a malicious software that infects your
computer and display messages demanding a fee to be
paid in order for your system to work again.
 This class of malware is a moneymaking scheme that
can be installed through links in a e-mail messages.
PHISHING:
Phishing is the fraudulent attempt to obtain sensitive information or data,
such as usernames, passwords and credit card details,
by disguising oneself as a trustworthy entity in an
electronic communication.
5
DATA LEAKAGE:
 Data leakage threats usually occur via the web and email,
but can also occur via mobile data storage devices such
as optical media, USB keys, and laptops.
INSIDER THREAT:
An insider threat is a security risk that originates from within the targeted organization.
It typically involves a current or former employee or
business associate who has access to sensitive information
or privileged accounts within the network of an organization,
and who misuses this access
6
ATTACKS:
 A cyber attack can maliciously disable computers, steal data, or use a breached computer
as a launch point for other attacks.
 TYPES OF ATTACKS
 Password Attack
 Malware Attack
7
PASSWORD ATTACK:
 A password attack is exactly what it sounds like: a third party trying to gain access to your
systems by cracking a user's password.
 HOW DO HACKERS KNOW YOUR PASSWORD ?
 Your passwords are stored in secure systems by using some
 special algorithms known as "hashing."
 Hackers try to access these passwords using different techniques,
the most popular one is called a "Dictionary attack,“
where the computer tries over and over again.
8
MALWARE:
 Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.”
 TYPES OF MALWARE
 VIRUSES
 BOTS&BOTNETS
How does Malware Occurs?
 Malware infection occurs when malware, or malicious
software,infiltrates your computer.stealing private information
or spying on a computer without the consent of the user.
9
DETECTING THEREATS AND ATTACKS:
 WHAT IS THREAT DETECTION ?
 Threat detection is the process by which you find threats on your network, your systems
or your applications. The idea is to detect threats before they are exploited as attacks.
 HOW TO DETECT THREATS?
 DETECTION TECHONOLOGIES
Intrusion detection systems
 Network firewalls
 Honeypots
10
Intrusion detection
systems: An appliance or service that monitors network traffic for malicious activity.
 Pros: Good for detecting threats introduced via the network itself.
 Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an
intrusion prevention system (IPS) to block threats.
 NETWORK FIREWALLS:
 A physical or virtual appliance that monitors traffic for malicious activity or access and
takes appropriate action.
 Pros: Good for detecting and blocking threats via the network itself.
 Cons: Limited in scope and will not detect endpoint or cloud threats.
11
HONEYPOTS:
 A network-attached system set up as a decoy to expose threats against an
organization.
 Pros: Advanced visibility of threats against applications or resources.
 Cons: Limited in scope the specific honeypots that are deployed. If
discovered by an attacker, honeypots can be circumvented.
MITIGATING CYBER THREATS:
 Keep Software Up-to-Date
Install Anti-Virus Protection Software
Back Up Critical Data
Implement Multi-Factor Authentication
12
THANK
YOU!!
13

More Related Content

PPTX
Types of Malware (CEH v11)
PPTX
Security threats
PDF
Anatomy of a cyber attack
PDF
Ransomware and tips to prevent ransomware attacks
PPTX
Malicion software
PPTX
Ransomware: Can you protect against attacks?
PDF
What is a malware attack?
PPTX
spyware
Types of Malware (CEH v11)
Security threats
Anatomy of a cyber attack
Ransomware and tips to prevent ransomware attacks
Malicion software
Ransomware: Can you protect against attacks?
What is a malware attack?
spyware

What's hot (19)

PDF
What is threat intelligence ?
PPTX
Cyber security
DOCX
Portfolio 7
DOCX
8 threats that even antivirus cannot catch
PPTX
Network security and viruses
PPTX
Dickmaster
PPTX
Computer Security
PPTX
Types of Attack in Information and Network Security
PPTX
Computer security
PPTX
Preventing lateral spread of ransomware
PPT
Internet threats and defence mechanism
 
PPT
Windows network security
PPTX
What's new in​ CEHv11?
PPT
Spyware
PPTX
PDF
Introduction to cyber security i
PPTX
Basics of System Security and Tools
PPTX
Break the chain - 7 phases of Advanced Persistent Threats
PPTX
Online safety
What is threat intelligence ?
Cyber security
Portfolio 7
8 threats that even antivirus cannot catch
Network security and viruses
Dickmaster
Computer Security
Types of Attack in Information and Network Security
Computer security
Preventing lateral spread of ransomware
Internet threats and defence mechanism
 
Windows network security
What's new in​ CEHv11?
Spyware
Introduction to cyber security i
Basics of System Security and Tools
Break the chain - 7 phases of Advanced Persistent Threats
Online safety
Ad

Similar to Detecting and mitigating cyber threats and attacks1 (20)

PPTX
Cybersecurity Explained: From Viruses to Ethical Hacking
PPTX
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
PPTX
cyber threats introduction and cyber threats types
PPTX
cyber threats and attacks.pptx
PPTX
basics of hacking- threat basics, types of attack
PDF
Cyber Security.pdf
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PDF
cyber security
PPTX
PPTX
cybersecurity and Cybersecurity aims to protect individuals’ and organization...
PDF
Cybersecurity Threats & Trends: Key Insights for Businesses
PPTX
An An Exploration Into the Cyber Security
PPTX
Information system security Unit 1.pptx
PPTX
Cyber security
PPTX
Computer security
PDF
Exploring Cyber Attack Types: Understanding the Threat Landscape
PPTX
unit 5 FCS efujhgdkkifevnurdviutfjiutdffgii
PPTX
Cyber Sequrity.pptx is life of cyber security
Cybersecurity Explained: From Viruses to Ethical Hacking
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
cyber threats introduction and cyber threats types
cyber threats and attacks.pptx
basics of hacking- threat basics, types of attack
Cyber Security.pdf
Cyber security.pptxelectronic systems, networks, and data from malicious
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
cyber security
cybersecurity and Cybersecurity aims to protect individuals’ and organization...
Cybersecurity Threats & Trends: Key Insights for Businesses
An An Exploration Into the Cyber Security
Information system security Unit 1.pptx
Cyber security
Computer security
Exploring Cyber Attack Types: Understanding the Threat Landscape
unit 5 FCS efujhgdkkifevnurdviutfjiutdffgii
Cyber Sequrity.pptx is life of cyber security
Ad

Recently uploaded (20)

PDF
MCQ Practice CBT OL Official Language 1.pptx.pdf
PDF
L-0018048598visual cloud book for PCa-pdf.pdf
PPTX
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...
PPTX
Principles of Inheritance and variation class 12.pptx
PPTX
FINAL PPT.pptx cfyufuyfuyuy8ioyoiuvy ituyc utdfm v
PPT
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
PPT
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
PPTX
DPT-MAY24.pptx for review and ucploading
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
PPTX
Sports and Dance -lesson 3 powerpoint presentation
PPT
APPROACH TO DEVELOPMENTALlllllllllllllllll
PPTX
Autonomic_Nervous_SystemM_Drugs_PPT.pptx
DOC
field study for teachers graduating samplr
PPTX
Cerebral_Palsy_Detailed_Presentation.pptx
PDF
Biography of Mohammad Anamul Haque Nayan
PDF
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
PPTX
The Stock at arrangement the stock and product.pptx
PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
DOCX
How to Become a Criminal Profiler or Behavioural Analyst.docx
MCQ Practice CBT OL Official Language 1.pptx.pdf
L-0018048598visual cloud book for PCa-pdf.pdf
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...
Principles of Inheritance and variation class 12.pptx
FINAL PPT.pptx cfyufuyfuyuy8ioyoiuvy ituyc utdfm v
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
DPT-MAY24.pptx for review and ucploading
1751884730-Visual Basic -Unitj CS B.pptx
Sports and Dance -lesson 3 powerpoint presentation
APPROACH TO DEVELOPMENTALlllllllllllllllll
Autonomic_Nervous_SystemM_Drugs_PPT.pptx
field study for teachers graduating samplr
Cerebral_Palsy_Detailed_Presentation.pptx
Biography of Mohammad Anamul Haque Nayan
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
The Stock at arrangement the stock and product.pptx
Overview Planner of Soft Skills in a single ppt
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
How to Become a Criminal Profiler or Behavioural Analyst.docx

Detecting and mitigating cyber threats and attacks1

  • 1. DETECTING AND MITIGATING CYBER THREATS AND ATTACKS NAME: N Dhruva Theja Roll No:321710301040 SUMMER INTERNSHIP 1
  • 2. CONTENTS: I. INTRODUCTION II. THREATS III. TYPES OF THREATS IV. ATTACKS V. TYPES OF ATTACKS VI. DETCTION TECHONOLOGIES VII. MITIGATING THREATS AND ATTACKS 2
  • 3. Detecting and Mitigating threats and attacks means:  Threat detection is the practice of analyzing the entirety of a security ecosystem to identify any malicious activity that could compromise the network. If a threat is detected, then mitigation efforts must be enacted to properly neutralize the threat before it can exploit any present vulnerabilities. 3
  • 4. THREATS:  A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.  TYPES OF THREATS  Ransomware  Phishing  Data Leakage  Insider Threat 4
  • 5. RANSOMWARE:  Ransomware is a malicious software that infects your computer and display messages demanding a fee to be paid in order for your system to work again.  This class of malware is a moneymaking scheme that can be installed through links in a e-mail messages. PHISHING: Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. 5
  • 6. DATA LEAKAGE:  Data leakage threats usually occur via the web and email, but can also occur via mobile data storage devices such as optical media, USB keys, and laptops. INSIDER THREAT: An insider threat is a security risk that originates from within the targeted organization. It typically involves a current or former employee or business associate who has access to sensitive information or privileged accounts within the network of an organization, and who misuses this access 6
  • 7. ATTACKS:  A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.  TYPES OF ATTACKS  Password Attack  Malware Attack 7
  • 8. PASSWORD ATTACK:  A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.  HOW DO HACKERS KNOW YOUR PASSWORD ?  Your passwords are stored in secure systems by using some  special algorithms known as "hashing."  Hackers try to access these passwords using different techniques, the most popular one is called a "Dictionary attack,“ where the computer tries over and over again. 8
  • 9. MALWARE:  Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”  TYPES OF MALWARE  VIRUSES  BOTS&BOTNETS How does Malware Occurs?  Malware infection occurs when malware, or malicious software,infiltrates your computer.stealing private information or spying on a computer without the consent of the user. 9
  • 10. DETECTING THEREATS AND ATTACKS:  WHAT IS THREAT DETECTION ?  Threat detection is the process by which you find threats on your network, your systems or your applications. The idea is to detect threats before they are exploited as attacks.  HOW TO DETECT THREATS?  DETECTION TECHONOLOGIES Intrusion detection systems  Network firewalls  Honeypots 10
  • 11. Intrusion detection systems: An appliance or service that monitors network traffic for malicious activity.  Pros: Good for detecting threats introduced via the network itself.  Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an intrusion prevention system (IPS) to block threats.  NETWORK FIREWALLS:  A physical or virtual appliance that monitors traffic for malicious activity or access and takes appropriate action.  Pros: Good for detecting and blocking threats via the network itself.  Cons: Limited in scope and will not detect endpoint or cloud threats. 11
  • 12. HONEYPOTS:  A network-attached system set up as a decoy to expose threats against an organization.  Pros: Advanced visibility of threats against applications or resources.  Cons: Limited in scope the specific honeypots that are deployed. If discovered by an attacker, honeypots can be circumvented. MITIGATING CYBER THREATS:  Keep Software Up-to-Date Install Anti-Virus Protection Software Back Up Critical Data Implement Multi-Factor Authentication 12