Professional Documents
Culture Documents
TO CYBER
SECURITY
Introduction Basics
Increase In Cybercrimes
The fast development of technology, such as fast broadband,
better gadgets, and cloud computing, has led to an increase in the
number of connected devices.
According to some surveys, there was about 21.1 billion
networked devices in the world in 2021.
This, with the development of the dark web, has created a fertile
ground for cybercrime activities.
Cyber security can, nonetheless, minimize your exposure.
Why is Cyber Security Important?
STOP
Why is Cyber Security Important?
Enables Credibility
Cyber attacks often make online platforms, like websites,
unpleasant or inaccessible.
That could result in a bad reputation, which might be difficult to
undo.
Cyber security is, hence, important for the protection of your
platform from such risks. It could also help protect customers
from potential hackers.
Why is Cyber Security Important?
Why is Cyber Security Important?
Why is Cyber Security Important?
Why is Cyber Security Important?
Botnet
Prevention
“Botnet” is a combination of the
words “robot” and “system”. Introduce trusted, powerful
antivirus applications on your
They can be contaminated with
malware that permits system
programmers to remotely Set your software settings to
assume responsibility for various update automatically
devices one after another, for the
most part without the Be cautious what you click,
information on the gadget owner. download or open
Cyber Intelligence- Top Malware
Crypto jacking
It’s the unapproved use of another
persons system to mine crypto- How to prevent
currency. Hackers do this by either 1. Ensure your OS is kept upto date.
getting the victim to tap on a vindictive
link in am email that heaps crypto 2. Try not to introduce a software
mining code on the system by unless you understand what it is
contaminating a site or online add and what it does
with JavaScript code that auto executes
3. Always have a credible antivirus
once it loads on a victims browser.
software running
It happens when you visit a site that
runs a malicious script that hijacks 4. Always backup your documents
your CPU.
You can introduce browser extensions
that prevent this from happening.
How do
you
Protect
yourself?
How to Protect Oneself
1. Regulate and limit internal and external remote connections
2. Enable strong passwords and account lockout
3. Use two factor authentication
4. Inventory and monitor all remote access applications
5. Audit your network for systems using for remote connection
service
6. Restrict and monitor vendor remote connections.
Introduction
29
STOP
40