Professional Documents
Culture Documents
By;
PRASANNA
HARIKRISHNA
Introduction to Cyber
Security
•• WHAT
WHAT IS
IS CYBER
CYBER SECURITY?
SECURITY?
•• WHY
WHY IS
IS IT
IT NEEDED?
NEEDED?
•• TERMINOLOGIES
TERMINOLOGIES ININ CYBER
CYBER SECURITY
SECURITY
•• WHAT
WHAT IS
IS HACKING?
HACKING?
Cyber Security
Vulnerabilities
• CYBER THREATS
• TYPES OF ATTACK
• CYBER CRIME
• CYBER WARFARE AND
TERRORISM
WHAT IS CYBER SECURITY?
CYBER
CYBER SECURITY
SECURITY
• Formal definition:
• It is a process designed to
protect networks and
networking devices from attack
,damage or unauthorized
access.
CYBER SPACE
A place that is not real, where electronic
messages exist while they are being sent
from one computer to another.
Comparatively data is less secured in
cyberspace and can be stole easily.
Thus minimal technical skills are enough to
steal data.
WHY CYBER SECURITY IS NEEDED?
• In INDIA during Lockdown 2020, 11,58,208 Cyber
attacks are happened.
• In 2021 the worst attack happened, that is
“Poly Network exploit” a group of anonymous
hackers transferred over $160 million
cryptocurrencies. All assets are eventually returned
over the following two weeks.
• On 2022 a hacker stole INR 7.3 Cr Rupees from
“RAZORPAY” over a period of three months.
2023 latest data breaches......
Slack Github account hack.
Data of 228 Million Deezer User
Stolen.
Twitter leaks data on 200 million
users.
Malware targets 30+ word press
plugins.
ASPECTS OF
CYBER SECURITY
• Unauthorized access
• Unauthorized deletion
• Unauthorized modification
AUTHENTICATION
• Authentication is the process of verifying the
identity of a person or device.
• INFORMATION SECURITY:
• (i)To protect data from
any sort of threats.
• (ii)Prioritizes data first
rather than concerning attacks.
CYBER
SECURITY AND
INFORMATION
SECURITY
PRINCIPLES OF CYBER SECURITY
CONFIDENTIALITY: (privacy)
Availability:
Ability of the user to access information
or resources in the correct format as and when they
need them.
THREATS
A threat in cybersecurity is an malicious activity
by an individual organization to corrupt or steal
data, gain access to a network, or disrupts digital
life in general.
Types of threats:
Malware
Phishing
Man-in-the-middle(MITM) attack
Distriubuted denial of attack
Brute force
SQLI
3 Calculations....
Vulnerability:
Threat:
Risk:
By:
Prasanna
Harikrishna