SlideShare a Scribd company logo

Cyber Security
Awareness
Overview
 What is Cyber Security?
 RBI Framework
 Security Layers
 Security Threats
 Security Measures
 Dos and Don'ts
 Conclusion
What is Cyber Security?
 Computer security, cybersecurity or information technology
security is the protection of computer systems and networks
from information disclosure, theft of or damage to their
hardware, software, or electronic data
Security Myths
 Myths -Firewalls make your data secure. Encryption makes
your data secure. Hackers cause most security breaches.
 In fact, 80% of data loss is caused by insiders. In fact,
encryption is only one approach to securing data. Security
also requires access control, data integrity, system
availability, and auditing.
 In fact, 40% of Internet break-ins occur in spite of a firewall
being in place!!!!
Security Triad
Ensuring that data is
protected from
unauthorized access
Ensuring
that data
can be
modified
only by
appropriate
mechanisms
The degree to which authorized
users can access information for
legitimate purposes
Points of Concerns in Banking
• Letting vendors define “good security”
• Underestimating the required security expertise
•Lack of operational Security
• Assigning untrained people to maintain security
• Relying primarily on a firewall.
• Firstly think of budget concerns, neglecting the value of their
information
and organizational reputations.
• Authorizing reactive, short-term fixes so problems re-emerge
rapidly
- Risk: A possibility that a threat exploits a vulnerability in an asset and causes damage
or loss to the asset
– Threat: Something that can potentially cause damage to the organization, IT Systems
or network.
– Vulnerability: A weakness in the organization, IT Systems, or network that can be
exploited by a threat
Defining the risks , threats and vulnerabilities
Cyber Security Framework by RBI
Security Layers
Physical Security
 Physical Security is the fundamental layer of security.
 Physical security describes measures that are designed to prevent
unauthorized physical access to data, equipment, resources and
personal and protect the same from physical damage or harm.
 This includes protection from natural and man-made disasters
which includes fires, floods, theft accidents etc.
 Physical Security is often overlooked because of more technical
logical breaches.
Physical Security
Physical Security
 Preventing physical security breach is the prime concern of the administrators.
 Following are the devices that are associated with the Physical Security of the
premises.
1. Boom Barrier
2. CCTV
3. Visitor Management System (VMS)
4. RFID
5. Biometric Scanners
6. Digital Locks
LOGICAL SECURITY
Passwords
 Use Strong Passwords using combination of Uppercase Lower Case
Numerical and Special Characters
 Never use pets name, birthdates, telephone nos, names, dictionary words
etc
 Never share a password – don’t store a password on internet or on local
computer
 Good Password – S@{h!n~ -
 Make it something you can visualize. It’s easier to remember that way
 The more personal the better. “mY5orit3$hirt’sR3d” (my favorite shirt is
red)
PROTECTING DATA AND ASSETS
–Branches Perspective
• Secure your Documents and DATA
• Restrict USB Access on All Computers at Branches
• Use Your E mails Securely
• Report Any Unusual Instances to Head Office.
• Use Strong Passwords
• Never Share the Password
• Lock your computer before you leave your Desk
• Update your Antivirus Regularly – In case the Software is not getting Updated
inform IT Department
• Lock your Cabin after leaving premise.
• Keep an Eye on suspicious behavior of others at work.
Symptoms of being infected with a virus !
1. You see unexpected messages or images.
2. You hear unexpected sounds, played at random.
3. Programs start unexpectedly.
4. Your personal firewall tells you that an application has tried to
connect to the Internet (and it’s not a program that you ran).
5. Your friends tell you that they have received e-mail messages from
your address and you haven’t sent them anything.
6. Your computer ‘freezes’ frequently, or programs start running
slowly.
7. You get lots of system error messages.
8. The operating system will not load when you start your computer.
9. You notice that files or folders have been deleted or changed.
10.You notice hard disk access (shown by one of the small flashing
lights) when you’re not aware of any programs running.
11.Your web browser behaves erratically, e.g. you can’t close a
browser window.
Just in case if you are infected…
• Disconnect the infected computer from the Internet.
• Isolate the machine. Nothing comes in nothing goes out.
• Update anti-virus signatures (Don’t use the compromised
machine)
• Start the computer in safe mode and perform extensive
scanning
• Use anti-virus program for removing the malicious program.
• If automated removal doesn’t yield result, closely observe the
behavior of your computer.
• Make a note of all the programs which start automatically
when the computer boots up.
• Search for suspicious entries. Delete the registry entries which
correspond to suspicious entries.
• Use tools like curr ports or command like netstat to monitor
opened TCP/IP and UDP ports on the local computer.
• Terminate the processes which seems to be suspicious.
• For damage beyond repair… Reinstall OS and be vigilant !
Types f Attacks
 DoS and DDoS
it is aimed at preventing authorized, legitimate users from accessing
services on the network. A DoS attack can be initiated by sending invalid
data to applications or network services until the server hangs or simply
crashes. The most common form of a DoS attack is TCP attacks.
 A network attacker can increase the enormity of a DoS attack by initiating
the attack against a single network from multiple computers or systems.
This type of attack is known as a distributed denial of service (DDoS)
attack. Network administrators can experience great difficulty in fending
off DDoS attacks, simply because blocking all the attacking computers,
can also result in blocking authorized users.
DDos
MAN IN THE MIDDLE
 MITM
It occurs when a cracker eavesdrops on a secure communication
session and monitors, captures and controls the data being sent
between the two parties communicating. The attacker attempts
to obtain information so that he/she can impersonate the
receiver and sender.
MITM
MITM
MPLS
Internet
MPLS
Internet
Mobile 4G
Mobile Banking
Branch Computer
Firewall
Firewall
Attacker
Attacker
Attacker
Attacker
Server Server
Man in the Middle
DLP
Phishing
Vishing
Virus Malware
Trojan
Rouge Software
Network Intrusion
Credential Hack
Software Flaw
Network Sniffing
Credential Hack
Network Attack
DOS
DDOS
Port Scan and
penetration
Misconfigured Network
Wrong Routing Tables
Carrier Side Wire Tapping
SSL- HTTPS
• A PAD LOCK Represents SSL – Secure Socket Layer
• The Technology Ensures that the communication between the webserver and the Client is
Encrypted.
• The Technology Ensures that the website is 100 %Genuine
• The Technology protects the Confidential Data entered by the consumer , even the internet
service provider does not know about it.
• Its Save and protects from Man in the Middle.
User Frauds
Phishing
Phishing Sites
Identity Theft
Shoulder Surfing
Identity Stealing
Online Frauds
Nigerian Frauds
Online Lottery
Employment Frauds
Online Data Entry Frauds
Internet Frauds
Credit Card /Debit Card Frauds
Document Forgery
Phishing
Phishing
Phishing
INSIDER ATTACK
Social Engineering Do’s and Don’ts
Security Measures
 Security Awareness
 Encryption
 Strong Passwords
 Up to date Antivirus
 Next Gen Firewall / UTM
 Mobile Device Management
 Network Monitoring
 Policy Framework
Encryption
Cryptography
The field of study related to encoded information (comes from
Greek word for "secret writing")
Encryption
The process of converting plaintext into cipher text
Decryption
The process of converting cipher text into plaintext
Encryption
Digital Signature
Policy Framework
 Policy frame work ensures the integrity and
security with in the organization
 Frameworks such as ISO 27001, BSI,
PCIDSS,PADSS etc. ensure and standardize
security practices.
 It reduces the chances of loopholes in the
infrastructure.
 Policy and Procedures helps the organization to
mitigate with the security threats.
Conclusion
 Conduct Security Awareness Programs, Educate Employees.
 Secure the premises
 Deploy Antivirus software
 Deploy Firewall/UTM
 Deploy Network Monitoring Tools
 Deploy Security Frame Work
 Secure Identity and Personal Information.
 Get the It systems audited for extra loopholes and vulnerabilities.
THANK YOU

More Related Content

PPTX
Cyber security
PPTX
Unit 1 Network Fundamentals and Security .pptx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PPTX
Cyber security
PPTX
iIIBF Cyber Security Presentation 2.pptx
PPT
Chapter1 intro network_security_sunorganised
PPTX
Cyber security
Cyber security
Unit 1 Network Fundamentals and Security .pptx
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
Cyber security
iIIBF Cyber Security Presentation 2.pptx
Chapter1 intro network_security_sunorganised
Cyber security

Similar to Dos and Dont to be followed to protect information and technology (20)

PPT
chapter 1 security.ppt
PPTX
Network Security Basics in networking to learn
DOCX
Seguridad web -articulo completo- ingles
PPTX
Security Architectures and Models.pptx
PPTX
LIS3353 SP12 Week 9
PPTX
Lecture 2.pptx
PPT
Essentials Of Security
 
PDF
Sec0001 .pdf
PPTX
It security the condensed version
PPTX
Lecture 2.pptx
PPT
2.4.1 - Intro to Cyber Security for students.ppt
PPT
Security - Chapter 1.ppt
PPTX
Cyber Security Briefing
PPT
Security Of Information Assets and why it matters.ppt
PPT
IT-Security Awareness and Training session
PPTX
Cyber Security Awareness Program.pptx
PDF
Cyber Security.pdf
PPTX
Data security
PPTX
Computer security and
PPTX
Information Systems.pptx
chapter 1 security.ppt
Network Security Basics in networking to learn
Seguridad web -articulo completo- ingles
Security Architectures and Models.pptx
LIS3353 SP12 Week 9
Lecture 2.pptx
Essentials Of Security
 
Sec0001 .pdf
It security the condensed version
Lecture 2.pptx
2.4.1 - Intro to Cyber Security for students.ppt
Security - Chapter 1.ppt
Cyber Security Briefing
Security Of Information Assets and why it matters.ppt
IT-Security Awareness and Training session
Cyber Security Awareness Program.pptx
Cyber Security.pdf
Data security
Computer security and
Information Systems.pptx
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Ad

Dos and Dont to be followed to protect information and technology

  • 2. Overview  What is Cyber Security?  RBI Framework  Security Layers  Security Threats  Security Measures  Dos and Don'ts  Conclusion
  • 3. What is Cyber Security?  Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data
  • 4. Security Myths  Myths -Firewalls make your data secure. Encryption makes your data secure. Hackers cause most security breaches.  In fact, 80% of data loss is caused by insiders. In fact, encryption is only one approach to securing data. Security also requires access control, data integrity, system availability, and auditing.  In fact, 40% of Internet break-ins occur in spite of a firewall being in place!!!!
  • 5. Security Triad Ensuring that data is protected from unauthorized access Ensuring that data can be modified only by appropriate mechanisms The degree to which authorized users can access information for legitimate purposes
  • 6. Points of Concerns in Banking • Letting vendors define “good security” • Underestimating the required security expertise •Lack of operational Security • Assigning untrained people to maintain security • Relying primarily on a firewall. • Firstly think of budget concerns, neglecting the value of their information and organizational reputations. • Authorizing reactive, short-term fixes so problems re-emerge rapidly
  • 7. - Risk: A possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset – Threat: Something that can potentially cause damage to the organization, IT Systems or network. – Vulnerability: A weakness in the organization, IT Systems, or network that can be exploited by a threat Defining the risks , threats and vulnerabilities
  • 10. Physical Security  Physical Security is the fundamental layer of security.  Physical security describes measures that are designed to prevent unauthorized physical access to data, equipment, resources and personal and protect the same from physical damage or harm.  This includes protection from natural and man-made disasters which includes fires, floods, theft accidents etc.  Physical Security is often overlooked because of more technical logical breaches.
  • 12. Physical Security  Preventing physical security breach is the prime concern of the administrators.  Following are the devices that are associated with the Physical Security of the premises. 1. Boom Barrier 2. CCTV 3. Visitor Management System (VMS) 4. RFID 5. Biometric Scanners 6. Digital Locks
  • 14. Passwords  Use Strong Passwords using combination of Uppercase Lower Case Numerical and Special Characters  Never use pets name, birthdates, telephone nos, names, dictionary words etc  Never share a password – don’t store a password on internet or on local computer  Good Password – S@{h!n~ -  Make it something you can visualize. It’s easier to remember that way  The more personal the better. “mY5orit3$hirt’sR3d” (my favorite shirt is red)
  • 15. PROTECTING DATA AND ASSETS –Branches Perspective • Secure your Documents and DATA • Restrict USB Access on All Computers at Branches • Use Your E mails Securely • Report Any Unusual Instances to Head Office. • Use Strong Passwords • Never Share the Password • Lock your computer before you leave your Desk • Update your Antivirus Regularly – In case the Software is not getting Updated inform IT Department • Lock your Cabin after leaving premise. • Keep an Eye on suspicious behavior of others at work.
  • 16. Symptoms of being infected with a virus ! 1. You see unexpected messages or images. 2. You hear unexpected sounds, played at random. 3. Programs start unexpectedly. 4. Your personal firewall tells you that an application has tried to connect to the Internet (and it’s not a program that you ran). 5. Your friends tell you that they have received e-mail messages from your address and you haven’t sent them anything. 6. Your computer ‘freezes’ frequently, or programs start running slowly. 7. You get lots of system error messages. 8. The operating system will not load when you start your computer. 9. You notice that files or folders have been deleted or changed. 10.You notice hard disk access (shown by one of the small flashing lights) when you’re not aware of any programs running. 11.Your web browser behaves erratically, e.g. you can’t close a browser window.
  • 17. Just in case if you are infected… • Disconnect the infected computer from the Internet. • Isolate the machine. Nothing comes in nothing goes out. • Update anti-virus signatures (Don’t use the compromised machine) • Start the computer in safe mode and perform extensive scanning • Use anti-virus program for removing the malicious program. • If automated removal doesn’t yield result, closely observe the behavior of your computer. • Make a note of all the programs which start automatically when the computer boots up. • Search for suspicious entries. Delete the registry entries which correspond to suspicious entries. • Use tools like curr ports or command like netstat to monitor opened TCP/IP and UDP ports on the local computer. • Terminate the processes which seems to be suspicious. • For damage beyond repair… Reinstall OS and be vigilant !
  • 18. Types f Attacks  DoS and DDoS it is aimed at preventing authorized, legitimate users from accessing services on the network. A DoS attack can be initiated by sending invalid data to applications or network services until the server hangs or simply crashes. The most common form of a DoS attack is TCP attacks.  A network attacker can increase the enormity of a DoS attack by initiating the attack against a single network from multiple computers or systems. This type of attack is known as a distributed denial of service (DDoS) attack. Network administrators can experience great difficulty in fending off DDoS attacks, simply because blocking all the attacking computers, can also result in blocking authorized users.
  • 19. DDos
  • 20. MAN IN THE MIDDLE  MITM It occurs when a cracker eavesdrops on a secure communication session and monitors, captures and controls the data being sent between the two parties communicating. The attacker attempts to obtain information so that he/she can impersonate the receiver and sender.
  • 21. MITM
  • 22. MITM
  • 23. MPLS Internet MPLS Internet Mobile 4G Mobile Banking Branch Computer Firewall Firewall Attacker Attacker Attacker Attacker Server Server Man in the Middle DLP Phishing Vishing Virus Malware Trojan Rouge Software Network Intrusion Credential Hack Software Flaw Network Sniffing Credential Hack Network Attack DOS DDOS Port Scan and penetration Misconfigured Network Wrong Routing Tables Carrier Side Wire Tapping
  • 24. SSL- HTTPS • A PAD LOCK Represents SSL – Secure Socket Layer • The Technology Ensures that the communication between the webserver and the Client is Encrypted. • The Technology Ensures that the website is 100 %Genuine • The Technology protects the Confidential Data entered by the consumer , even the internet service provider does not know about it. • Its Save and protects from Man in the Middle.
  • 25. User Frauds Phishing Phishing Sites Identity Theft Shoulder Surfing Identity Stealing Online Frauds Nigerian Frauds Online Lottery Employment Frauds Online Data Entry Frauds Internet Frauds Credit Card /Debit Card Frauds Document Forgery
  • 31. Security Measures  Security Awareness  Encryption  Strong Passwords  Up to date Antivirus  Next Gen Firewall / UTM  Mobile Device Management  Network Monitoring  Policy Framework
  • 32. Encryption Cryptography The field of study related to encoded information (comes from Greek word for "secret writing") Encryption The process of converting plaintext into cipher text Decryption The process of converting cipher text into plaintext
  • 35. Policy Framework  Policy frame work ensures the integrity and security with in the organization  Frameworks such as ISO 27001, BSI, PCIDSS,PADSS etc. ensure and standardize security practices.  It reduces the chances of loopholes in the infrastructure.  Policy and Procedures helps the organization to mitigate with the security threats.
  • 36. Conclusion  Conduct Security Awareness Programs, Educate Employees.  Secure the premises  Deploy Antivirus software  Deploy Firewall/UTM  Deploy Network Monitoring Tools  Deploy Security Frame Work  Secure Identity and Personal Information.  Get the It systems audited for extra loopholes and vulnerabilities.