KEMBAR78
cybersecurity understanding in simple way | PPTX
COMPUTER TRAINING
FOR WBSEDCL ,
GOVT. OF WEST BENGAL ENTERPRISE
Conducted by
ACES INFOTECH PVT LIMITED
Computer Application on IT
Security,Cyber laws & Its application.
INTRODUCTION TO
CYBERSECURTY
 Why do we need Cyber security
 What is Cyber security
 The CIA Triad
Cybersecurity Protect You From
Hackers And Identity Theft
What do we need Cyber security?
• Protects personal data
• Protects business reputation
• Enhances productivity
• Improves cyber posture
• Help educate the workforce
• Prevents website crashes
• Maintain trust and
credibility
• Better data management
What is Cyber security?
Cyber security is the application of technologies,
processes, and controls to protect systems, networks,
programs, devices and data from cyber attacks
From business to mobile computing, and can be
divided into a few common categories.
• Application security
• Network security
• Information security
Implementing effective cyber security measures is particularly
challenging today because there are more devices than people,
and attackers are becoming more innovative
CIA
THE CIA TRIAD
Confidentiality
Standard measures to establish
confidentiality include:
Data encryption
 Two-factor authentication
 Biometric verification
Security tokens
THE CIA TRIAD
Integrity
Integrity refers to protecting information from being
modified by unauthorized parties.
Standard measures to guarantee integrity include:
 Cryptographic checksums
 Using file permissions
 Uninterrupted power supplies
 Data backups
Availability
Availability is making sure that authorized parties are
able to access the information when needed.
Standard measures to guarantee availability include:
 Backing up data to external drives
 Implementing firewalls
 Having backup power supplies
 Data redundancy
THE CIA TRIAD
THREATS
• Dishonest
employees
• Criminals
• Using The
Governments
• Terrorists
• The press
• Competitors
• Hackers
• Nature
VULNERABILITIES
• Software bugs
• Broken
processes
• Ineffective
controls
• Hardware
flaws
• Business
change
• Legacy
system
• Human error
• Inadequate
BCP
RISK
• Business
disruption
• Financial
losses
• Loss of
privacy
• Damage to
reputation
• Loss of
confidence
• Legal
penalties
• Loss of file
Types of Cyber Attacks
A cyber-attack is an exploitation of computer systems and
networks. It uses malicious code to alter computer code,
logic or data and lead to cybercrimes, such as information
and identity theft.
Cyber-attacks can be classified into the following
categories:
1) Web-based attacks
2) System-based attacks
WHO IS DOING THE HACKING?
A Hacker is a person who finds and exploits the weakness
in computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
HACKING
• Financial (theft, fraud, blackmail)
• Political /state (state level/ military)
• Fame/ kudos (fun/ status)
• Hacktivism (cause)
• Pen testers (legal hacking)
• Police
• Insider
• Business
Malware
Malware is intrusive software that is designed to
damage and destroy computers and computer
systems.
Malware is a short form of “Malicious
Software.”
Examples of common malware
viruses, worms, Trojan viruses, spyware, adware,
and ransomware.
COMMON THREATS - RANSOMWARE
• A ransomware attack is defined as a form of malware
attack in which an attacker seizes the user’s data, folders,
or entire device until a ‘ransom’ fee is paid.
• Normally loaded onto a computer via a
download/attachment/link from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your
computer/tablet/phone it is very difficult to remove
without removing all of the data
Best Solutions to Put in Place to Stop Ransomware
Attacks.
•Antivirus and anti-malware. ...
•Backup and file management. ...
•Employee training. ...
•Multi-factor authentication. ...
•Policy of least privilege. ...
•Ransomware detection. ...
•Software updates and patch management. ...
•Strong passwords.
PHISHING
Phishing is an act of sending and email to a user; misleading him to
believe that it is from a frustrate person or organisation.
Phishing is a type of online fraud that involves tricking people into
providing sensitive information, such as passwords or credit card numbers,
by masquerading as a trustworthy source
How to tackle the problem
• Don’t click any links on an email unless you can guarantee who its
from.
• Use a trusted method of contacting the company via a phone number,
app or website.
• Mark the email as spam and contact the organisation.
How to Phishing…..
WHAT TO LOOK OUT FOR WHEN SHOPPING
ON THE INTERNET?
• Ensure you’re on the correct website
• HTTPS and the padlock- The ‘S’
stands for secure, this means you
have a secure connection to the
website. This should prevent a ‘man
in the middle’ attack.
• It encrypts your data and the
receiver will be able to decrypt it but
if it is a fraudulent website they will
still obtain your information.
• Use a credit card/ PayPal when
conducting online transactions.
PUBLIC WI-FI
• May not be trustworthy. They could share your information to other companies
who operate in countries without any data protection.
• You may not know who is watching you whilst you’re online.
What to do and not do to
• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
Nation Cyber Security Centre (NCSC)
PASSWORDS ADVICE
• Use 1 password per account.
• Three random words is the NCSC’s advice. Capitals,
special characters and numbers is your own choic.
• brute force attack.
• Password managers can be helpful to store your passwords.
FIREWALLS
• A Firewall is a network security device that monitors and filters
incoming and outgoing network traffic based on an
organization’s previously established security policies.
• A firewall is essentially the barrier that sits between a private
internal network and the public Internet.
• A firewall’s main purpose is to allow non-threatening traffic in
and to keep dangerous traffic out.
• Nmap, short for Network Mapper, is a free and open source
tool used for vulnerability checking, port scanning and, of
course, network mapping.
• It is used to scan IP addresses and ports in a network and
to detect installed applications.
• Nmap allows network admins to find which devices are
running on their network, discover open ports and services,
and detect vulnerabilities.
NMAP
Step 1: Visit the official website using the URL https://nmap.org/download.html
on any web browser the click on nmap-7.92-setup.exe
Step 2: Now check for the executable file in downloads in your system and
run it.
Step 3: It will
prompt confirmation
to make changes to
your system. Click
on Yes.
Step 4: The next
screen will be of
License Agreement,
click on I Agree.
Step 5: Next screen
is of choosing
components, all
components are
already marked so
don’t change
anything just click
on the Next button.
Step 6: In this step, we choose
the installation location of
Nmap. By default, it uses the C
drive but you can change it into
another drive that will have
sufficient memory space for
installation. It requires 84.3
MB of memory space.
Step 7: After this
installation process
it will take a few
minutes to complete
the installation.
Step 8: Npcap
installation will also occur
with it, the screen of
License Agreement will
appear, click on I Agree.
Step 9: Next screen is
of installation options
don’t change anything
and click on
the Install button.
Step 10: After
this installation
process it will take
a few minutes to
complete the
installation.
Step 11: After
completion of
installation click on
the Next button.
Step 12: Click on
the Finish button to
finish the installation of
Npcap.
CYBER ETHICS
Cyberethics is a branch of computer technology behavior
that defines the best practices that must be adopted by a
user when he uses the computer system.
In simple terms, cyberethics refers to the basic ethics and
etiquette that must be followed while using a computer
system.
 Cyberspace can be defined as an intricate environment that
involves interactions between people, software, and services. It
is maintained by the worldwide distribution of information
and communication technology devices and networks.
 With the benefits carried by the technological advancements,
the cyberspace today has become a common pool used by
citizens, businesses, critical information infrastructure,
military and governments in a fashion that makes it hard to
induce clear boundaries among these different groups. The
cyberspace is anticipated to become even more complex in the
upcoming years, with the increase in networks and devices
connected to it.
What is Cyberspace?
REGULATIONS OF CYBERSPACE
Rules Offence Punishment
Section 43 Applicable to people who
damage the computer systems
without permission from the
owner
The owner can fully claim
compensation for the entire
damage in such cases.
Section 66A Applicable in case a person is
found to dishonestly or
fraudulently committing any
act referred to in section 43
The imprisonment term in
such instances can mount up
to three years or a fine of up
to Rs. 5 lakh.
Section 66B Incorporates the punishments
for fraudulently receiving
stolen communication devices
or computers, which confirms
a probable three years
imprisonment.
This term can also be topped
by Rs. 1 lakh fine, depending
upon the severity.
REGULATIONS OF CYBERSPACE
REGULATIONS OF CYBERSPACE
Rules Offence Punishment
Section 66D Phishing, i.e., punishment
for cheating by personation
by the use of computer’s
resources
Imprisonment which may
extend up to 3 years along
with a fine that may
extend up to rupee 1 lakh.
Section 66E Voyeurism, i.e. punishment
for violating privacy of an
individual
Imprisonment for 3 years
along with a fine which
may be extended up to 2
lakh rupees or both.
Section 66F Cyber Terrorism Life imprisonment
Rules Offence Punishment
Section 67A Publishing/ or
transmitting material in
electronic form
containing sexually
explicit contents
Imprisonment up to 5
years along with a fine
that could extend up to
10 lakh rupees in the
first convict; and
imprisonment can be
extended up to 7 years
with fine of 20 lakh
rupees in the second
conviction
REGULATIONS OF CYBERSPACE
ADVICE
• Update and migrate Data
• Create strong password
• Make transaction in secure way
• Clear personal data from web bowser
• Use antivirus
• Activate your firewall
• Staff awareness
• Prepare Plan
YOU ARE THE BEST DEFENCE!
• Technology is only a small part of Cyber Defence
• You are the most important person – protect yourself
• For businesses the most important and best defence is Cyber Security
Aware employees – train your staff
Always be aware!
Always be on your guard!
REPORTING CYBERCRIME
• Online fraud is to be reported to Action Fraud. They’re the national
reporting mechanism for fraud. Via;
www.actionfraud.police.uk
Or 0300 123 2040
• Can be reported 24/7 via the website.
NATION CYBER SECURITY CENTRE (NCSC)
National Cyber Security Centre
https://www.ncsc.gov.uk/
https://www.ncsc.gov.uk/smallbusiness
●
51

cybersecurity understanding in simple way

  • 1.
    COMPUTER TRAINING FOR WBSEDCL, GOVT. OF WEST BENGAL ENTERPRISE Conducted by ACES INFOTECH PVT LIMITED
  • 2.
    Computer Application onIT Security,Cyber laws & Its application.
  • 3.
    INTRODUCTION TO CYBERSECURTY  Whydo we need Cyber security  What is Cyber security  The CIA Triad
  • 4.
    Cybersecurity Protect YouFrom Hackers And Identity Theft
  • 5.
    What do weneed Cyber security? • Protects personal data • Protects business reputation • Enhances productivity • Improves cyber posture • Help educate the workforce • Prevents website crashes • Maintain trust and credibility • Better data management
  • 6.
    What is Cybersecurity? Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
  • 7.
    From business tomobile computing, and can be divided into a few common categories. • Application security • Network security • Information security
  • 8.
    Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative
  • 9.
  • 10.
    THE CIA TRIAD Confidentiality Standardmeasures to establish confidentiality include: Data encryption  Two-factor authentication  Biometric verification Security tokens
  • 11.
    THE CIA TRIAD Integrity Integrityrefers to protecting information from being modified by unauthorized parties. Standard measures to guarantee integrity include:  Cryptographic checksums  Using file permissions  Uninterrupted power supplies  Data backups
  • 12.
    Availability Availability is makingsure that authorized parties are able to access the information when needed. Standard measures to guarantee availability include:  Backing up data to external drives  Implementing firewalls  Having backup power supplies  Data redundancy THE CIA TRIAD
  • 14.
    THREATS • Dishonest employees • Criminals •Using The Governments • Terrorists • The press • Competitors • Hackers • Nature VULNERABILITIES • Software bugs • Broken processes • Ineffective controls • Hardware flaws • Business change • Legacy system • Human error • Inadequate BCP RISK • Business disruption • Financial losses • Loss of privacy • Damage to reputation • Loss of confidence • Legal penalties • Loss of file
  • 15.
    Types of CyberAttacks A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to alter computer code, logic or data and lead to cybercrimes, such as information and identity theft. Cyber-attacks can be classified into the following categories: 1) Web-based attacks 2) System-based attacks
  • 16.
    WHO IS DOINGTHE HACKING? A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
  • 17.
    HACKING • Financial (theft,fraud, blackmail) • Political /state (state level/ military) • Fame/ kudos (fun/ status) • Hacktivism (cause) • Pen testers (legal hacking) • Police • Insider • Business
  • 18.
    Malware Malware is intrusivesoftware that is designed to damage and destroy computers and computer systems. Malware is a short form of “Malicious Software.” Examples of common malware viruses, worms, Trojan viruses, spyware, adware, and ransomware.
  • 19.
    COMMON THREATS -RANSOMWARE • A ransomware attack is defined as a form of malware attack in which an attacker seizes the user’s data, folders, or entire device until a ‘ransom’ fee is paid. • Normally loaded onto a computer via a download/attachment/link from an email or website. • Will either lock the screen or encrypt your data. • Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data
  • 22.
    Best Solutions toPut in Place to Stop Ransomware Attacks. •Antivirus and anti-malware. ... •Backup and file management. ... •Employee training. ... •Multi-factor authentication. ... •Policy of least privilege. ... •Ransomware detection. ... •Software updates and patch management. ... •Strong passwords.
  • 23.
    PHISHING Phishing is anact of sending and email to a user; misleading him to believe that it is from a frustrate person or organisation. Phishing is a type of online fraud that involves tricking people into providing sensitive information, such as passwords or credit card numbers, by masquerading as a trustworthy source How to tackle the problem • Don’t click any links on an email unless you can guarantee who its from. • Use a trusted method of contacting the company via a phone number, app or website. • Mark the email as spam and contact the organisation.
  • 24.
  • 25.
    WHAT TO LOOKOUT FOR WHEN SHOPPING ON THE INTERNET? • Ensure you’re on the correct website • HTTPS and the padlock- The ‘S’ stands for secure, this means you have a secure connection to the website. This should prevent a ‘man in the middle’ attack. • It encrypts your data and the receiver will be able to decrypt it but if it is a fraudulent website they will still obtain your information. • Use a credit card/ PayPal when conducting online transactions.
  • 27.
    PUBLIC WI-FI • Maynot be trustworthy. They could share your information to other companies who operate in countries without any data protection. • You may not know who is watching you whilst you’re online. What to do and not do to • Don’t use online banking. Use your own data. • Don’t conduct any purchases • Use a virtual private network (VPN) Nation Cyber Security Centre (NCSC)
  • 28.
    PASSWORDS ADVICE • Use1 password per account. • Three random words is the NCSC’s advice. Capitals, special characters and numbers is your own choic. • brute force attack. • Password managers can be helpful to store your passwords.
  • 29.
    FIREWALLS • A Firewallis a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. • A firewall is essentially the barrier that sits between a private internal network and the public Internet. • A firewall’s main purpose is to allow non-threatening traffic in and to keep dangerous traffic out.
  • 30.
    • Nmap, shortfor Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. • It is used to scan IP addresses and ports in a network and to detect installed applications. • Nmap allows network admins to find which devices are running on their network, discover open ports and services, and detect vulnerabilities. NMAP
  • 31.
    Step 1: Visitthe official website using the URL https://nmap.org/download.html on any web browser the click on nmap-7.92-setup.exe
  • 32.
    Step 2: Nowcheck for the executable file in downloads in your system and run it.
  • 33.
    Step 3: Itwill prompt confirmation to make changes to your system. Click on Yes. Step 4: The next screen will be of License Agreement, click on I Agree.
  • 34.
    Step 5: Nextscreen is of choosing components, all components are already marked so don’t change anything just click on the Next button.
  • 35.
    Step 6: Inthis step, we choose the installation location of Nmap. By default, it uses the C drive but you can change it into another drive that will have sufficient memory space for installation. It requires 84.3 MB of memory space.
  • 36.
    Step 7: Afterthis installation process it will take a few minutes to complete the installation.
  • 37.
    Step 8: Npcap installationwill also occur with it, the screen of License Agreement will appear, click on I Agree.
  • 38.
    Step 9: Nextscreen is of installation options don’t change anything and click on the Install button.
  • 39.
    Step 10: After thisinstallation process it will take a few minutes to complete the installation.
  • 40.
    Step 11: After completionof installation click on the Next button.
  • 41.
    Step 12: Clickon the Finish button to finish the installation of Npcap.
  • 42.
    CYBER ETHICS Cyberethics isa branch of computer technology behavior that defines the best practices that must be adopted by a user when he uses the computer system. In simple terms, cyberethics refers to the basic ethics and etiquette that must be followed while using a computer system.
  • 43.
     Cyberspace canbe defined as an intricate environment that involves interactions between people, software, and services. It is maintained by the worldwide distribution of information and communication technology devices and networks.  With the benefits carried by the technological advancements, the cyberspace today has become a common pool used by citizens, businesses, critical information infrastructure, military and governments in a fashion that makes it hard to induce clear boundaries among these different groups. The cyberspace is anticipated to become even more complex in the upcoming years, with the increase in networks and devices connected to it. What is Cyberspace?
  • 44.
    REGULATIONS OF CYBERSPACE RulesOffence Punishment Section 43 Applicable to people who damage the computer systems without permission from the owner The owner can fully claim compensation for the entire damage in such cases. Section 66A Applicable in case a person is found to dishonestly or fraudulently committing any act referred to in section 43 The imprisonment term in such instances can mount up to three years or a fine of up to Rs. 5 lakh. Section 66B Incorporates the punishments for fraudulently receiving stolen communication devices or computers, which confirms a probable three years imprisonment. This term can also be topped by Rs. 1 lakh fine, depending upon the severity. REGULATIONS OF CYBERSPACE
  • 45.
    REGULATIONS OF CYBERSPACE RulesOffence Punishment Section 66D Phishing, i.e., punishment for cheating by personation by the use of computer’s resources Imprisonment which may extend up to 3 years along with a fine that may extend up to rupee 1 lakh. Section 66E Voyeurism, i.e. punishment for violating privacy of an individual Imprisonment for 3 years along with a fine which may be extended up to 2 lakh rupees or both. Section 66F Cyber Terrorism Life imprisonment
  • 46.
    Rules Offence Punishment Section67A Publishing/ or transmitting material in electronic form containing sexually explicit contents Imprisonment up to 5 years along with a fine that could extend up to 10 lakh rupees in the first convict; and imprisonment can be extended up to 7 years with fine of 20 lakh rupees in the second conviction REGULATIONS OF CYBERSPACE
  • 47.
    ADVICE • Update andmigrate Data • Create strong password • Make transaction in secure way • Clear personal data from web bowser • Use antivirus • Activate your firewall • Staff awareness • Prepare Plan
  • 48.
    YOU ARE THEBEST DEFENCE! • Technology is only a small part of Cyber Defence • You are the most important person – protect yourself • For businesses the most important and best defence is Cyber Security Aware employees – train your staff Always be aware! Always be on your guard!
  • 49.
    REPORTING CYBERCRIME • Onlinefraud is to be reported to Action Fraud. They’re the national reporting mechanism for fraud. Via; www.actionfraud.police.uk Or 0300 123 2040 • Can be reported 24/7 via the website.
  • 50.
    NATION CYBER SECURITYCENTRE (NCSC) National Cyber Security Centre https://www.ncsc.gov.uk/ https://www.ncsc.gov.uk/smallbusiness
  • 51.