SlideShare a Scribd company logo
What is Cyber Security?
Cyber security is the practice of protecting computer systems and
networks from unauthorized access, use, disclosure, disruption,
modification, or destruction.
It encompasses various technologies, processes, and controls to ensure
confidentiality, integrity, and availability of sensitive information and
critical infrastructure.
key concepts
Integrity
Ensuring data accuracy and
reliability, preventing unauthorised
modifications or deletions.
Availability
Guaranteeing access to systems
and data when needed, preventing
disruptions and downtime.
Confidentiality
Protecting sensitive information
from unauthorised access,
ensuring privacy and secrecy.
Popular attacks
Botnet Attacks: Networks of compromised computers controlled by attackers to launch distributed denial-of-service attacks
or spread malware.
Social Engineering Attacks: Exploiting human psychology to gain access to sensitive information, often through phishing
emails or fake websites.
Cryptocurrency Hijacking: Stealing cryptocurrency by hijacking wallets or mining resources for profit.
Phishing: Deceitful attempts to obtain sensitive information through emails, text messages, or fake websites disguised as
legitimate sources.
Ransomware
Ransomware is a type of malicious software that encrypts a victim's
files, rendering them inaccessible.
Attackers demand a ransom payment in cryptocurrency, typically
Bitcoin, to decrypt the files.
Botnet Attacks
A botnet is a network of compromised computers controlled by attackers. These computers, known as bots, are infected with malware and used
for malicious purposes.
Attackers can use a botnet to launch distributed denial-of-service (DDoS) attacks, spam campaigns, and steal data.
Phishing Attacks
Phishing is a common cyberattack where attackers disguise themselves as trusted entities, like banks or government agencies. They send
deceptive emails or messages containing malicious links or attachments, aiming to trick victims into revealing sensitive information like
passwords, credit card details, or personal data.
Security Goals and its implmentation
Authentication
Ensures the identity of users before granting access to systems or data. This protects against unauthorized access and data breaches.
Authorization
Determines the level of access users have to specific resources based on their roles and responsibilities. This helps maintain data integrity
and confidentiality.
Confidentiality
Guarantees that sensitive information is protected from unauthorized disclosure. This protects privacy and intellectual property.
Accountability
Tracks actions and decisions made by users, allowing for auditing and tracing any malicious activities. This helps in identifying and
responding to security breaches.
Designing a Secure System
Assess Risks
Identify potential threats and vulnerabilities. Prioritize risks based on their likelihood and impact.
Implement Controls
Employ security measures like strong passwords, encryption, firewalls, and intrusion detection systems.
Continuously Monitor
Regularly review and update security policies and procedures. Monitor for suspicious activity and promptly address any security
incidents.
Train Users
Educate users about cybersecurity best practices. Promote awareness of phishing attacks and other common threats.
Buffer Overflow and its Vulnerabilities
Buffer overflow is a common vulnerability where a program writes more data into a buffer than it can hold.
This overwrites adjacent memory, potentially corrupting data or even executing
malicious code.
Attackers exploit this vulnerability by injecting malicious code into a buffer, causing the
program to execute it.
This can lead to various consequences, including system crashes, data breaches, and
even full system takeove
r.
WhatsApp Buffer Overflow
Case Study
A buffer overflow vulnerability was found in WhatsApp's code. This
vulnerability allowed attackers to remotely execute code on users'
devices. Attackers could send specially crafted messages that, when
processed by WhatsApp, would overwrite memory buffers and execute
malicious code.
This vulnerability highlighted the importance of thorough code review
and security testing to prevent such exploitable flaws. WhatsApp
addressed the vulnerability with a security update, urging users to
update their apps to mitigate the risk.
Importance of Cyber Security
Protection of Personal
Data
Cyber security safeguards
personal information such as
financial details, medical records,
and social media accounts,
preventing identity theft and
privacy violations.
Safeguarding Business
Operations
Cyber security is crucial for
businesses to protect their
infrastructure, intellectual
property, and customer data,
minimizing disruptions and
ensuring business continuity.
Maintaining National Security
Cyber security is vital for governments to protect critical infrastructure,
such as power grids, transportation systems, and communication
networks, from cyberattacks.
Best Practices for Cyber Security
Strong Passwords
Use unique, complex passwords for all your accounts and avoid using the same password across multiple platforms.
Two-Factor Authentication
Enable two-factor authentication for sensitive accounts, adding an extra layer of security by requiring an additional code, typically sent to your phone.
Regular Software Updates
Keep all software, including operating systems, applications, and antivirus software, updated to patch vulnerabilities and ensure security.
Be Cautious of Suspicious Emails and Links
Avoid clicking on suspicious links or opening attachments from unknown senders, as they could contain malware or phishing attempts.
Use Secure Wi-Fi Networks
When connecting to public Wi-Fi, use a VPN (Virtual Private Network) to encrypt your traffic and protect your data from eavesdropping.
Cyber Security Awareness Training
1 Identify Potential Threats
Understanding common cyber threats, such as malware, phishing
attacks, and ransomware, is essential for recognizing potential dangers
and taking appropriate precautions.
2 Practice Safe Online Habits
Learning about safe online practices, such as strong passwords, two-
factor authentication, and avoiding suspicious links, can significantly
reduce the risk of cyberattacks.
3 Recognize Social Engineering Tactics
Awareness training helps employees identify and avoid social
engineering techniques used by attackers to manipulate individuals
into divulging sensitive information.
The Future of Cyber Security
Artificial Intelligence (AI)
AI-powered security solutions are increasingly being used for threat detection,
anomaly analysis, and proactive defense mechanisms.
Blockchain Technology
Blockchain offers secure and transparent data storage and transaction processing,
enhancing data security and preventing tampering.
Quantum Computing
Quantum computing has the potential to revolutionize cryptography and develop
more robust security solutions against advanced cyber threats.
What-is-Cyber-Security (2).pptxfile cybe

More Related Content

PDF
What-is-Cyber-Security.pdf n
PPTX
CYBERSECURITYcoll[1].pptx
PPTX
Cyber Security awareness of cyber security
PDF
Cybersecurity awareness.pdf
PPTX
Shubham IT Project on cyber security & awareness
PDF
Ciberseguridad inglés ppt trabajo PDF inglés
PPTX
IMPORTANCE OF IN THE WORLD Cyber security.pptx
PPTX
Cyber Security_ Protecting the Digital World.pptx
What-is-Cyber-Security.pdf n
CYBERSECURITYcoll[1].pptx
Cyber Security awareness of cyber security
Cybersecurity awareness.pdf
Shubham IT Project on cyber security & awareness
Ciberseguridad inglés ppt trabajo PDF inglés
IMPORTANCE OF IN THE WORLD Cyber security.pptx
Cyber Security_ Protecting the Digital World.pptx

Similar to What-is-Cyber-Security (2).pptxfile cybe (20)

PDF
The Importance of Cyber Security.pptx (1).pdf
PDF
The Importance of Cyber Security.pptx.pdf
PPTX
A presentation on cyber security Introduction
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx
PPTX
Cybersecurity Awareness Theme-PowerPoint-Templates (1).pptx
PDF
Cyber Security Course & Guide. X.GI. pdf
PPTX
Cyber Security.pptx report or a seminar internship
PPTX
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
PDF
Introduction to Cyber Security presentation
PPTX
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
PPTX
What is Cyber & information security.pptx
PDF
Cyber Ethics Notes.pdf
PPTX
Cysecc.pptx
PDF
Cyber Security The Essential Guide to Keeping Your Data Safe.pdf
PPTX
Cyber crime and Information Security.pptx
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PDF
Introduction-to-Cyber-Security presentation.pdf
PPTX
Ceferov Cefer Intelectual Technologies
PPTX
Introduction to Cyber Security and its importance
PPTX
Cybersecurity_Training_Government_Employees.pptx
The Importance of Cyber Security.pptx (1).pdf
The Importance of Cyber Security.pptx.pdf
A presentation on cyber security Introduction
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx
Cybersecurity Awareness Theme-PowerPoint-Templates (1).pptx
Cyber Security Course & Guide. X.GI. pdf
Cyber Security.pptx report or a seminar internship
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
Introduction to Cyber Security presentation
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
What is Cyber & information security.pptx
Cyber Ethics Notes.pdf
Cysecc.pptx
Cyber Security The Essential Guide to Keeping Your Data Safe.pdf
Cyber crime and Information Security.pptx
Cyber Security Awareness (Reduce Personal & Business Risk)
Introduction-to-Cyber-Security presentation.pdf
Ceferov Cefer Intelectual Technologies
Introduction to Cyber Security and its importance
Cybersecurity_Training_Government_Employees.pptx
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
Internet___Basics___Styled_ presentation
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
DOCX
Unit-3 cyber security network security of internet system
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Testing WebRTC applications at scale.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
innovation process that make everything different.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Funds Management Learning Material for Beg
Digital Literacy And Online Safety on internet
Internet___Basics___Styled_ presentation
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
international classification of diseases ICD-10 review PPT.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Sims 4 Historia para lo sims 4 para jugar
Unit-3 cyber security network security of internet system
QR Codes Qr codecodecodecodecocodedecodecode
Unit-1 introduction to cyber security discuss about how to secure a system
Testing WebRTC applications at scale.pdf
SAP Ariba Sourcing PPT for learning material
Job_Card_System_Styled_lorem_ipsum_.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Cloud-Scale Log Monitoring _ Datadog.pdf
innovation process that make everything different.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
SASE Traffic Flow - ZTNA Connector-1.pdf
Funds Management Learning Material for Beg
Ad

What-is-Cyber-Security (2).pptxfile cybe

  • 1. What is Cyber Security? Cyber security is the practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It encompasses various technologies, processes, and controls to ensure confidentiality, integrity, and availability of sensitive information and critical infrastructure.
  • 2. key concepts Integrity Ensuring data accuracy and reliability, preventing unauthorised modifications or deletions. Availability Guaranteeing access to systems and data when needed, preventing disruptions and downtime. Confidentiality Protecting sensitive information from unauthorised access, ensuring privacy and secrecy.
  • 3. Popular attacks Botnet Attacks: Networks of compromised computers controlled by attackers to launch distributed denial-of-service attacks or spread malware. Social Engineering Attacks: Exploiting human psychology to gain access to sensitive information, often through phishing emails or fake websites. Cryptocurrency Hijacking: Stealing cryptocurrency by hijacking wallets or mining resources for profit. Phishing: Deceitful attempts to obtain sensitive information through emails, text messages, or fake websites disguised as legitimate sources.
  • 4. Ransomware Ransomware is a type of malicious software that encrypts a victim's files, rendering them inaccessible. Attackers demand a ransom payment in cryptocurrency, typically Bitcoin, to decrypt the files.
  • 5. Botnet Attacks A botnet is a network of compromised computers controlled by attackers. These computers, known as bots, are infected with malware and used for malicious purposes. Attackers can use a botnet to launch distributed denial-of-service (DDoS) attacks, spam campaigns, and steal data. Phishing Attacks Phishing is a common cyberattack where attackers disguise themselves as trusted entities, like banks or government agencies. They send deceptive emails or messages containing malicious links or attachments, aiming to trick victims into revealing sensitive information like passwords, credit card details, or personal data. Security Goals and its implmentation Authentication Ensures the identity of users before granting access to systems or data. This protects against unauthorized access and data breaches. Authorization Determines the level of access users have to specific resources based on their roles and responsibilities. This helps maintain data integrity and confidentiality. Confidentiality Guarantees that sensitive information is protected from unauthorized disclosure. This protects privacy and intellectual property. Accountability Tracks actions and decisions made by users, allowing for auditing and tracing any malicious activities. This helps in identifying and responding to security breaches.
  • 6. Designing a Secure System Assess Risks Identify potential threats and vulnerabilities. Prioritize risks based on their likelihood and impact. Implement Controls Employ security measures like strong passwords, encryption, firewalls, and intrusion detection systems. Continuously Monitor Regularly review and update security policies and procedures. Monitor for suspicious activity and promptly address any security incidents. Train Users Educate users about cybersecurity best practices. Promote awareness of phishing attacks and other common threats.
  • 7. Buffer Overflow and its Vulnerabilities Buffer overflow is a common vulnerability where a program writes more data into a buffer than it can hold. This overwrites adjacent memory, potentially corrupting data or even executing malicious code. Attackers exploit this vulnerability by injecting malicious code into a buffer, causing the program to execute it. This can lead to various consequences, including system crashes, data breaches, and even full system takeove r.
  • 8. WhatsApp Buffer Overflow Case Study A buffer overflow vulnerability was found in WhatsApp's code. This vulnerability allowed attackers to remotely execute code on users' devices. Attackers could send specially crafted messages that, when processed by WhatsApp, would overwrite memory buffers and execute malicious code. This vulnerability highlighted the importance of thorough code review and security testing to prevent such exploitable flaws. WhatsApp addressed the vulnerability with a security update, urging users to update their apps to mitigate the risk.
  • 9. Importance of Cyber Security Protection of Personal Data Cyber security safeguards personal information such as financial details, medical records, and social media accounts, preventing identity theft and privacy violations. Safeguarding Business Operations Cyber security is crucial for businesses to protect their infrastructure, intellectual property, and customer data, minimizing disruptions and ensuring business continuity. Maintaining National Security Cyber security is vital for governments to protect critical infrastructure, such as power grids, transportation systems, and communication networks, from cyberattacks.
  • 10. Best Practices for Cyber Security Strong Passwords Use unique, complex passwords for all your accounts and avoid using the same password across multiple platforms. Two-Factor Authentication Enable two-factor authentication for sensitive accounts, adding an extra layer of security by requiring an additional code, typically sent to your phone. Regular Software Updates Keep all software, including operating systems, applications, and antivirus software, updated to patch vulnerabilities and ensure security. Be Cautious of Suspicious Emails and Links Avoid clicking on suspicious links or opening attachments from unknown senders, as they could contain malware or phishing attempts. Use Secure Wi-Fi Networks When connecting to public Wi-Fi, use a VPN (Virtual Private Network) to encrypt your traffic and protect your data from eavesdropping.
  • 11. Cyber Security Awareness Training 1 Identify Potential Threats Understanding common cyber threats, such as malware, phishing attacks, and ransomware, is essential for recognizing potential dangers and taking appropriate precautions. 2 Practice Safe Online Habits Learning about safe online practices, such as strong passwords, two- factor authentication, and avoiding suspicious links, can significantly reduce the risk of cyberattacks. 3 Recognize Social Engineering Tactics Awareness training helps employees identify and avoid social engineering techniques used by attackers to manipulate individuals into divulging sensitive information.
  • 12. The Future of Cyber Security Artificial Intelligence (AI) AI-powered security solutions are increasingly being used for threat detection, anomaly analysis, and proactive defense mechanisms. Blockchain Technology Blockchain offers secure and transparent data storage and transaction processing, enhancing data security and preventing tampering. Quantum Computing Quantum computing has the potential to revolutionize cryptography and develop more robust security solutions against advanced cyber threats.