You are on page 1of 17

Cyber

Security
By: Vaibhav Nikunj
Class: VI
Section : C
Definition of Cyber Security
Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
It's also known as information technology security or electronic
information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common
categories.
Cyber Threat Categories
Common categories of cyber threats include malware, social
engineering, man in the middle (MitM) attacks, denial of service
(DoS), and injection attacks—we describe each of these categories in
more detail below.
Cyber threats can originate from a variety of sources, from hostile
nation states and terrorist groups, to individual hackers, to trusted
individuals like employees or contractors, who abuse their privileges
to perform malicious acts.
Common Sources of Cyber Threats
Here are several common sources of cyber threats against organizations:
Nation states
Hostile countries can launch cyber attacks against local companies and institutions,
aiming to interfere with communications, cause disorder, and inflict damage.
Terrorist organizations
Terrorists conduct cyber attacks aimed at destroying or abusing critical infrastructure,
threaten national security, disrupt economies, and cause bodily harm to citizens.
Criminal groups
Organized groups of hackers aim to break into computing systems for economic
benefit. These groups use phishing, spam, spyware and malware for extortion, theft of
private information, and online scams.
Hackers
Individual hackers target organizations using a variety of attack techniques. They are
usually motivated by personal gain, revenge, financial gain, or political activity.
Hackers often develop new threats, to advance their criminal ability and improve their
personal standing in the hacker community.

Malicious insiders
An employee who has legitimate access to company assets and abuses their privileges to
steal information or damage computing systems for economic or personal gain. Insiders
may be employees, contractors, suppliers, or partners of the target organization. They
can also be outsiders who have compromised a privileged account and are
impersonating its owner.
Cyber Security is required for our computer and phone security
There are many types of Cyber Security

Note: Cybersecurity is important because it protects


all categories of data from theft and damage. This
includes sensitive data, personally identifiable
information (PII), protected health information
Need for (PHI), personal information, intellectual property,
data, and governmental and industry information
Cyber systems.

Security 1. Data is Everywhere


2. Regulatory Requirements
3. Popularity of BYOD
4. The Changing Cyber Security Threat Landscape
5. It's Important to Your Board
6. Your Employees Need to be Aware
Major Cyber Threats
There 6 Types of Cyber Security Threats
1. IOT Hacking
2. Cloud Jacking
3. API Breaches
4. Machine Learning Threat
5. Network Vulnerabilities
6. Socially Engineered Attacks
IOT Hacking
IoT (Internet kind Of Thing hacking) tools entail a wide range of activities, including
gathering data on payloads, suspicious behavior,
etc. IoT hacking tools are software or programs
that help in exploiting computer security or
networks. These tools can identify security
patches in the networks, servers, systems, and
applications.
Cloud Jacking
Cloud jacking is when a cloud account is taken over by a hacker. They will generally get in
through a compromised user credential, which gives them all the same privileges as that
user.
API Breaches
An API attack is hostile usage, or attempted hostile usage, of an API. Below are some of the
many ways that attackers can abuse an API endpoint.
Machine Learning Threat
Now, the security threats to machine learning systems can be categorized into two types
according to the learning model's training status. These two categories are, Threats Before
or during the training of the model and Threats After the machine learning model has been
trained.
Network Vulnerabilities
A network vulnerability is a weakness or
flaw in software, hardware, or
organizational processes, which when
compromised by a threat, can result in a
security breach.
Nonphysical network vulnerabilities
typically involve software or data.
Socially Engineered Attacks
Social engineering is the term used for a broad range of malicious activities accomplished
through human interactions. It uses psychological manipulation to trick users into making
security mistakes or giving away sensitive information.

Socially Engineered
Attacks
Steps to be taken for prevention of
Cybercrime
11 ways to help protect yourself against cybercrime
1. Use a full-service internet security suite.
2. Use strong passwords. *****************
3. Keep your software updated.
4. Manage your social media settings.
5. Strengthen your home network.
6. Keep up to date on major security breaches.
7. Take measures to help protect yourself against identity theft.
8. Know that identity theft can happen anywhere.
9. Know what to do if you become a victim.
Special thanks to
1. Norton
2. UND (University of North Dakota)
3. Imperva
4.
And all known and unknown websites

You might also like