You are on page 1of 22

CYBERSECURITY

By;
PRASANNA
HARIKRISHNA
Introduction to Cyber
Security

•• WHAT
WHAT IS
IS CYBER
CYBER SECURITY?
SECURITY?
•• WHY
WHY IS
IS IT
IT NEEDED?
NEEDED?
•• TERMINOLOGIES
TERMINOLOGIES ININ CYBER
CYBER SECURITY
SECURITY
•• WHAT
WHAT IS
IS HACKING?
HACKING?
Cyber Security
Vulnerabilities

• CYBER THREATS
• TYPES OF ATTACK
• CYBER CRIME
• CYBER WARFARE AND
TERRORISM
WHAT IS CYBER SECURITY?

CYBER
CYBER SECURITY
SECURITY

• CYBER: Related to the culture of computers , IT


and virtual reality.
• SECURITY: State of being free from worries
CYBER SECURITY:

• Protection of computers &


other technological devices
like data, networks ,servers
etc.

• Formal definition:
• It is a process designed to
protect networks and
networking devices from attack
,damage or unauthorized
access.
CYBER SPACE

A place that is not real, where electronic
messages exist while they are being sent
from one computer to another.


Comparatively data is less secured in
cyberspace and can be stole easily.


Thus minimal technical skills are enough to
steal data.
WHY CYBER SECURITY IS NEEDED?
• In INDIA during Lockdown 2020, 11,58,208 Cyber
attacks are happened.
• In 2021 the worst attack happened, that is
“Poly Network exploit” a group of anonymous
hackers transferred over $160 million
cryptocurrencies. All assets are eventually returned
over the following two weeks.
• On 2022 a hacker stole INR 7.3 Cr Rupees from
“RAZORPAY” over a period of three months.
2023 latest data breaches......

Slack Github account hack.

Data of 228 Million Deezer User
Stolen.

Twitter leaks data on 200 million
users.

Malware targets 30+ word press
plugins.
ASPECTS OF
CYBER SECURITY

• Three main aspects of


cybersecurity are:

• Unauthorized access
• Unauthorized deletion
• Unauthorized modification
AUTHENTICATION
• Authentication is the process of verifying the
identity of a person or device.

• Authentication is the process that determines


whether users are who they claim to be.

• Authentication is often followed by


authorization..
AUTHORIZATION
• It is a security mechanism used to determine user
privileges or access levels, related to system
resources.
• Authorization is the process that determines what
users can and cannot access.
• Authorization is often preceded by authentication.

E.g.: The password verification step in opening a


mail is authentication and if the password, that you
entered happens to be correct , you will be
CAPTCHA
HOW IT WORKS......
COMPONENTS OF
CYBER SECURITY
• Cyber security is divided into :
• Network security
• Application security
• Disaster recovery
• Operation security and
• Information security
• CYBER SECURITY:
• (i)To protect the
resources(data and devices) from
attacks in cyberspace.
• (ii)Concerned with
analyzing attacks and framing
security measures, to prevent such
attacks in future.

• INFORMATION SECURITY:
• (i)To protect data from
any sort of threats.
• (ii)Prioritizes data first
rather than concerning attacks.

CYBER
SECURITY AND
INFORMATION
SECURITY
PRINCIPLES OF CYBER SECURITY
CONFIDENTIALITY: (privacy)

It is the security principle or set of rules that control


access to information.

Integrity: (correctness, accuracy, consistency)


(i)Maintaining the accuracy and
consistency of data over its entire lifetime.
(ii)Unauthorized modifications should not
occur.

Availability:
Ability of the user to access information
or resources in the correct format as and when they
need them.
THREATS
A threat in cybersecurity is an malicious activity
by an individual organization to corrupt or steal
data, gain access to a network, or disrupts digital
life in general.

Types of threats:


Malware


Phishing


Man-in-the-middle(MITM) attack


Distriubuted denial of attack


Brute force


SQLI
3 Calculations....
Vulnerability:

Vulnerability refers to the weekness of the asset the can


be exploited by one or more attacker.

Threat:

A threat is any event that has potential to bring harm to


an organisation or induvidual.

Risk:

Risk refers to the potential for loss or damage when a


threat exploits a vunerablity.
The short Defenition........

Risk = Threat X Vulnerability


About dark WEB.......
THANK YOU!!

By:
Prasanna
Harikrishna

You might also like