You are on page 1of 11

DIGITAL EMPOWERMENT

POWERPOINT PRESENTATION
TOPIC: THREATS IN THE DIGITAL WORLD:
DATA BREACH AND CYBER ATTACKS
GROUP-8
NAMES: ROLL NO.
AKANSHA 22330503059
KHUSHI 22330503060
SEJAL CHAUHAN 22330503061
HARSHITA GUPTA 22330503062
SEJAL SINGH 22330503063
ISHA GARG 22330503064
AISHWARIYA 22330503065
ARSHIYA GOEL 22330503066
CONTENTS
1. Threats in digital world
2. Types of digital threats
3. Data Breach
4. Phases of Breach
5. Reporting a Breach
6. Cyber Attacks
7. Types of Cyber Attacks
8. Web Based Attacks
9. Team Contribution
THREATS IN DIGITAL WORLD
• Cyber threats are harmful activities committed with the intent of destroying, stealing, or
disrupting data and digital life in general. Computer viruses, data breaches, and Denial of
Service (DoS) assaults are examples of these risks.
• As we depend more on technology, cyber dangers have progressed and grown more
pervasive, presenting a substantial risk to persons and enterprises. Understanding cyber
risks is the first step in defending yourself from them.

ARSHIYA GOEL
TYPES OF DIGITAL THREATS

Below are some of the most common


types of cyber-attacks:
•Malware.
•Phishing.
•Man-in-the-middle attack (MITM)
•Distributed Denial-of-Service (DDoS)
attack.
•SQL injection.
•Zero-day exploit.
•DNS Tunnelling.
•Business Email Compromise (BEC)

ARSHIYA GOEL
DATA BREACH
A data breach is an incident where information is stolen or taken from a system without the
knowledge or authorization of the system’s owner. A small company or large organization
may suffer a data breach. Stolen data may involve sensitive, proprietary, or confidential
information such as credit card numbers, customer data, trade secrets, or matters of
national security.
Most data breaches are attributed to hacking or malware attacks. Other frequently observed
breach methods include the following:
• Insider leak: A trusted individual or person of authority with access privileges steals data.
• Payment card fraud: Payment card data is stolen using physical skimming devices.
• Loss or theft: Portable drives, laptops, office computers, files, and other physical
properties are lost or stolen.
• Unintended disclosure: Through mistakes or negligence, sensitive data is exposed.
• Unknown: In a small of number of cases, the actual breach method is unknown or
undisclosed.

AKANSHA
PHASES OF DATA BREACH
• Research: The cybercriminal looks for weaknesses in the company’s security (people,
systems, or network).
• Attack: The cybercriminal makes initial contact using either a network or social attack.
• Network/Social attack: A network attack occurs when a cybercriminal uses
infrastructure, system, and application weaknesses to infiltrate an organization’s network.
Social attacks involve tricking or baiting employees into giving access to the company’s
network. An employee can be duped into giving his/her login credentials or may be fooled
into opening a malicious attachment.
• Exfiltration: Once the cybercriminal gets into one computer, he/she can then attack the
network and tunnel his/her way to confidential company data.

KHUSHI
Reporting a Breach
• A description of the nature of the personal data breach including, where possible: the
categories and approximate number of individuals concerned; and the categories and
approximate number of personal data records concerned

• The name and contact details of the data protection officer (if your organisation has
one) or other contact point where more information can be obtained

• A description of the likely consequences of the personal data breach and

• A description of the measures taken, or proposed to be taken, to deal with the personal
data breach, including, where appropriate, the measures taken to mitigate any possible
adverse effects.

ISHA
CYBER ATTACKS
• A cyberattack is a malicious and deliberate
attempt by an individual or organization to
breach the information system of another
individual or organization. Usually, the attacker
seeks some type of benefit from disrupting the
victim’s network.
• A cyber attack is an attempt to disable
computers, steal data, or use a breached
computer system to launch additional attacks.
Cybercriminals use different methods to launch
a cyber attack that includes malware,
phishing, ransomware, man-in-the-middle
attack, or other methods.

HARSHITA GUPTA
TYPES OF CYBER ATTACKS
• Malware-Malware breaches a network through a
vulnerability, typically when a user clicks a
dangerous link or email attachment that then
installs risky software.
• Phishing-Phishing is the practice of sending
fraudulent communications that appear to come
from a reputable source, usually through email.
• Denial-of-service attack-A denial-of-service
attack floods systems, servers, or networks with
traffic to exhaust resources and bandwidth.
• Zero-day exploit-A zero-day exploit hits after a
network vulnerability is announced but before a
patch or solution is implemented. Attackers target
the disclosed vulnerability during this window of
time.

HARSHITA GUPTA
CYBER BASED ATTACKS
During a cyber attack, the attacker gains unauthorized access to a computer system, network,
or device for stealing, modifying, or destroying data. The attacker may use a variety of tactics,
including malware, social engineering, or exploiting vulnerabilities in software or systems.
Common Types of Web Application Attacks
• Cross-site scripting (XSS): In an XSS attack, an attacker injects a piece of malicious code
onto a trusted website or web-based app. Because the user’s browser thinks the script came
from a trusted source, it will execute the script. XSS attacks can be used to steal data or
perform other malicious acts on the visitor’s computer. While this method is considered
unsophisticated, it’s common and can do significant harm.
• SQL injection (SQLI): SQLIs occur when an attacker meddles with the queries that a web
application makes to its database. An SQLI can allow intruders to get sensitive data from the
database. An attacker might modify or delete this data, or inject code that can change the
web application's content or behavior.

AISHWARIYA
TEAM CONTRIBUTION:
NAME RESPONSE
AKANSHA YES
KHUSHI YES

THANK YOU
SEJAL CHAHUAN NO
HARSHITA YES
SEJAL SINGH NO
ISHA YES
AISHWARIYA YES
ARSHIYA YES

You might also like