Done by Nalin sin Suma Neeha Gajula Nikitah Sinha Swetha Rupesh Pava WHAT IS IT
• Refers to the body of technologies, processes,
and practices designed to protect networks, devices programs and data from attack, damage, or any unauthorized access. WHAT IS THE PURPOSE • cybersecurity is used to protect the data of and small large individuals and organizations. • It protects an organization’s data assets from any kind of digital attacks that could damage the organization or individual • Government, corporate, Medical and financial records all hold personal information, any security incidents can lead to losses in terms of reputation, money, theft of data and deletion of data • Prevents data breaches and theft COMMON CYBERSECURITY THREATS • Infected website • Orphan accounts • Malvertisements • Online quizzes and personality tests • Portable storage devices • Unsupported browser extension INFECTED WEBSITE UNSUPPORTED BROWSER EXTENSION MALVERSTISEMENT • Malverstising is the practice of using web ad to spread malware( a software with intent of damaging devices or stealing data). • Cybercrimianls use the same advertising strategies as legitimate companies • Malverstising will make the user either to downalod malware directly on vistors’s device or to send visistors to website that distributes viruses and any other malicious program. • Criminals use redirect to send clickers to a malicious site and on while on the site, code will be runt in the background(which ill download the malware into the device) MALVERTISING PORTABLE STORAGE DEVICES • 25% of malware is spread today through USB devices • The USB port of your PC may contain malware that you copy unknowingly • Once the malware infects your PC t steal or corrupt data, it might spread to others • How to minimize it • - Install anti-virus software, that will scan any device that is connected to your PC • - keep personal and business data separate • - after transferring sensitive data from a USB drive, delete it BENEFITS
• Protection for data and networks
• Prevention of unauthorized users accessing digital assets • Protection of personal information