What do weneed Cyber security?
• Protects personal data
• Protects business reputation
• Enhances productivity
• Improves cyber posture
• Help educate the workforce
• Prevents website crashes
• Maintain trust and
credibility
• Better data management
6.
What is Cybersecurity?
Cyber security is the application of technologies,
processes, and controls to protect systems, networks,
programs, devices and data from cyber attacks
7.
From business tomobile computing, and can be
divided into a few common categories.
• Application security
• Network security
• Information security
8.
Implementing effective cybersecurity measures is particularly
challenging today because there are more devices than people,
and attackers are becoming more innovative
THE CIA TRIAD
Confidentiality
Standardmeasures to establish
confidentiality include:
Data encryption
Two-factor authentication
Biometric verification
Security tokens
11.
THE CIA TRIAD
Integrity
Integrityrefers to protecting information from being
modified by unauthorized parties.
Standard measures to guarantee integrity include:
Cryptographic checksums
Using file permissions
Uninterrupted power supplies
Data backups
12.
Availability
Availability is makingsure that authorized parties are
able to access the information when needed.
Standard measures to guarantee availability include:
Backing up data to external drives
Implementing firewalls
Having backup power supplies
Data redundancy
THE CIA TRIAD
14.
THREATS
• Dishonest
employees
• Criminals
•Using The
Governments
• Terrorists
• The press
• Competitors
• Hackers
• Nature
VULNERABILITIES
• Software bugs
• Broken
processes
• Ineffective
controls
• Hardware
flaws
• Business
change
• Legacy
system
• Human error
• Inadequate
BCP
RISK
• Business
disruption
• Financial
losses
• Loss of
privacy
• Damage to
reputation
• Loss of
confidence
• Legal
penalties
• Loss of file
15.
Types of CyberAttacks
A cyber-attack is an exploitation of computer systems and
networks. It uses malicious code to alter computer code,
logic or data and lead to cybercrimes, such as information
and identity theft.
Cyber-attacks can be classified into the following
categories:
1) Web-based attacks
2) System-based attacks
16.
WHO IS DOINGTHE HACKING?
A Hacker is a person who finds and exploits the weakness
in computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
Malware
Malware is intrusivesoftware that is designed to
damage and destroy computers and computer
systems.
Malware is a short form of “Malicious
Software.”
Examples of common malware
viruses, worms, Trojan viruses, spyware, adware,
and ransomware.
19.
COMMON THREATS -RANSOMWARE
• A ransomware attack is defined as a form of malware
attack in which an attacker seizes the user’s data, folders,
or entire device until a ‘ransom’ fee is paid.
• Normally loaded onto a computer via a
download/attachment/link from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your
computer/tablet/phone it is very difficult to remove
without removing all of the data
22.
Best Solutions toPut in Place to Stop Ransomware
Attacks.
•Antivirus and anti-malware. ...
•Backup and file management. ...
•Employee training. ...
•Multi-factor authentication. ...
•Policy of least privilege. ...
•Ransomware detection. ...
•Software updates and patch management. ...
•Strong passwords.
23.
PHISHING
Phishing is anact of sending and email to a user; misleading him to
believe that it is from a frustrate person or organisation.
Phishing is a type of online fraud that involves tricking people into
providing sensitive information, such as passwords or credit card numbers,
by masquerading as a trustworthy source
How to tackle the problem
• Don’t click any links on an email unless you can guarantee who its
from.
• Use a trusted method of contacting the company via a phone number,
app or website.
• Mark the email as spam and contact the organisation.
WHAT TO LOOKOUT FOR WHEN SHOPPING
ON THE INTERNET?
• Ensure you’re on the correct website
• HTTPS and the padlock- The ‘S’
stands for secure, this means you
have a secure connection to the
website. This should prevent a ‘man
in the middle’ attack.
• It encrypts your data and the
receiver will be able to decrypt it but
if it is a fraudulent website they will
still obtain your information.
• Use a credit card/ PayPal when
conducting online transactions.
27.
PUBLIC WI-FI
• Maynot be trustworthy. They could share your information to other companies
who operate in countries without any data protection.
• You may not know who is watching you whilst you’re online.
What to do and not do to
• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
Nation Cyber Security Centre (NCSC)
28.
PASSWORDS ADVICE
• Use1 password per account.
• Three random words is the NCSC’s advice. Capitals,
special characters and numbers is your own choic.
• brute force attack.
• Password managers can be helpful to store your passwords.
29.
FIREWALLS
• A Firewallis a network security device that monitors and filters
incoming and outgoing network traffic based on an
organization’s previously established security policies.
• A firewall is essentially the barrier that sits between a private
internal network and the public Internet.
• A firewall’s main purpose is to allow non-threatening traffic in
and to keep dangerous traffic out.
30.
• Nmap, shortfor Network Mapper, is a free and open source
tool used for vulnerability checking, port scanning and, of
course, network mapping.
• It is used to scan IP addresses and ports in a network and
to detect installed applications.
• Nmap allows network admins to find which devices are
running on their network, discover open ports and services,
and detect vulnerabilities.
NMAP
31.
Step 1: Visitthe official website using the URL https://nmap.org/download.html
on any web browser the click on nmap-7.92-setup.exe
32.
Step 2: Nowcheck for the executable file in downloads in your system and
run it.
33.
Step 3: Itwill
prompt confirmation
to make changes to
your system. Click
on Yes.
Step 4: The next
screen will be of
License Agreement,
click on I Agree.
34.
Step 5: Nextscreen
is of choosing
components, all
components are
already marked so
don’t change
anything just click
on the Next button.
35.
Step 6: Inthis step, we choose
the installation location of
Nmap. By default, it uses the C
drive but you can change it into
another drive that will have
sufficient memory space for
installation. It requires 84.3
MB of memory space.
36.
Step 7: Afterthis
installation process
it will take a few
minutes to complete
the installation.
37.
Step 8: Npcap
installationwill also occur
with it, the screen of
License Agreement will
appear, click on I Agree.
38.
Step 9: Nextscreen is
of installation options
don’t change anything
and click on
the Install button.
39.
Step 10: After
thisinstallation
process it will take
a few minutes to
complete the
installation.
Step 12: Clickon
the Finish button to
finish the installation of
Npcap.
42.
CYBER ETHICS
Cyberethics isa branch of computer technology behavior
that defines the best practices that must be adopted by a
user when he uses the computer system.
In simple terms, cyberethics refers to the basic ethics and
etiquette that must be followed while using a computer
system.
43.
Cyberspace canbe defined as an intricate environment that
involves interactions between people, software, and services. It
is maintained by the worldwide distribution of information
and communication technology devices and networks.
With the benefits carried by the technological advancements,
the cyberspace today has become a common pool used by
citizens, businesses, critical information infrastructure,
military and governments in a fashion that makes it hard to
induce clear boundaries among these different groups. The
cyberspace is anticipated to become even more complex in the
upcoming years, with the increase in networks and devices
connected to it.
What is Cyberspace?
44.
REGULATIONS OF CYBERSPACE
RulesOffence Punishment
Section 43 Applicable to people who
damage the computer systems
without permission from the
owner
The owner can fully claim
compensation for the entire
damage in such cases.
Section 66A Applicable in case a person is
found to dishonestly or
fraudulently committing any
act referred to in section 43
The imprisonment term in
such instances can mount up
to three years or a fine of up
to Rs. 5 lakh.
Section 66B Incorporates the punishments
for fraudulently receiving
stolen communication devices
or computers, which confirms
a probable three years
imprisonment.
This term can also be topped
by Rs. 1 lakh fine, depending
upon the severity.
REGULATIONS OF CYBERSPACE
45.
REGULATIONS OF CYBERSPACE
RulesOffence Punishment
Section 66D Phishing, i.e., punishment
for cheating by personation
by the use of computer’s
resources
Imprisonment which may
extend up to 3 years along
with a fine that may
extend up to rupee 1 lakh.
Section 66E Voyeurism, i.e. punishment
for violating privacy of an
individual
Imprisonment for 3 years
along with a fine which
may be extended up to 2
lakh rupees or both.
Section 66F Cyber Terrorism Life imprisonment
46.
Rules Offence Punishment
Section67A Publishing/ or
transmitting material in
electronic form
containing sexually
explicit contents
Imprisonment up to 5
years along with a fine
that could extend up to
10 lakh rupees in the
first convict; and
imprisonment can be
extended up to 7 years
with fine of 20 lakh
rupees in the second
conviction
REGULATIONS OF CYBERSPACE
47.
ADVICE
• Update andmigrate Data
• Create strong password
• Make transaction in secure way
• Clear personal data from web bowser
• Use antivirus
• Activate your firewall
• Staff awareness
• Prepare Plan
48.
YOU ARE THEBEST DEFENCE!
• Technology is only a small part of Cyber Defence
• You are the most important person – protect yourself
• For businesses the most important and best defence is Cyber Security
Aware employees – train your staff
Always be aware!
Always be on your guard!
49.
REPORTING CYBERCRIME
• Onlinefraud is to be reported to Action Fraud. They’re the national
reporting mechanism for fraud. Via;
www.actionfraud.police.uk
Or 0300 123 2040
• Can be reported 24/7 via the website.
50.
NATION CYBER SECURITYCENTRE (NCSC)
National Cyber Security Centre
https://www.ncsc.gov.uk/
https://www.ncsc.gov.uk/smallbusiness