cyber security for an organization
DESCRIPTION
Cyber security for an organizationTRANSCRIPT
![Page 1: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/1.jpg)
Cyber Security for an Organization
Presented By
Tejas C. WasuleGovt. College of Engineering,Amravati
Suraj A. JaiwalGovt. College of Engineering,Amravati
![Page 2: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/2.jpg)
1. Introduction to Cyber Security
2. Need of Cyber Security
3. Types of Cyber Security
4. Types of Cyber Attacks And Preventions on it
5. Conclusion
6. References
Contents
![Page 3: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/3.jpg)
Introduction to Cyber SecurityWhat is Cyber Space?•Worldwide Network of Computers•Open to Public (Internet)
What is Cyber Security?Technologies & Processes to Protect
• Computers• Networks• Data from Unauthorized Users• Vulnerabilities
![Page 4: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/4.jpg)
Need of Cyber Security
1. To Protect Sensitive Business & Personal
Information
2. Safeguard National Security
3. To Protect Sensitive Data of• Government• Military• Corporation• Financial Institutions • Hospital & ETC
![Page 5: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/5.jpg)
Mobile
Network
Data
Website
Types of Cyber SecuritySecurity
1. Personal Files
2. Payment Information
3. Bank Account Details
4. Customer’s Information
![Page 6: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/6.jpg)
Data
Website
Mobile
Network
Types of Cyber SecuritySecurity
1. To Protect Online Data on Server
2. To Protect Online Operations of an
Organization
![Page 7: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/7.jpg)
Data
Website
Mobile
Network
Security
1. To protect Sensitive Information Sent Via
Types of Cyber Security
![Page 8: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/8.jpg)
Data
Website
Mobile
Network
Security
Types of Cyber Security
1. Use Security Software on Smartphones
2. Encrypt Data on Mobile Devices
3. Reporting Procedure for Lost Mobile
4. Use Authentication
![Page 9: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/9.jpg)
Data
Website
Mobile
Network
Security
Types of Cyber Security
1. Secure Internal Network & Cloud Services
2. Secure & Encrypt your Organization's Wi-Fi
3. Set Safe Browsing Rule
![Page 10: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/10.jpg)
Cyber Attacks…?1. What is Cyber Attack?
Attempt to • Destroy• Expose• Alter• Disable Unauthorized use of an Asset
2. Why Cyber Attacks Become Possible?• Vulnerability• Spam• Virus
![Page 11: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/11.jpg)
1. SQL injection • Code Injection Technique that Exploits a Security Vulnerability in Application• Occurs at the Database layer of Application
2. SQL - Structured Query Language• Used to communicate with the database• ANSI-compliant SQL
MITM
XSS
DOS
SQL Injection
Phishing
Types of Cyber Attacks & PreventionsSQL Injection
![Page 12: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/12.jpg)
• admin' -- • admin' # • admin'/* • or 1=1-- • ' or 1=1# • ' or 1=1/* • ') or '1'='1-- • ') or ('1'='1—
MITM
XSS
DOS
SQL Injection
Phishing
Types of Cyber Attacks & PreventionsSQL Injection Login Tricks
![Page 13: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/13.jpg)
MITM
XSS
DOS
SQL Injection
Phishing
Types of Cyber Attacks & PreventionsSQL Injection-DEMO
![Page 14: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/14.jpg)
MITM
XSS
DOS
SQL Injection
Phishing
Types of Cyber Attacks & PreventionsSQL Injection Preventions
![Page 15: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/15.jpg)
SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & PreventionsPhishing
• Is the act of attempting to acquire information such as Usernames, Passwords, and Credit card
• Using Fake Web-Pages identical to the legitimate one.
![Page 16: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/16.jpg)
SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & PreventionsPhishing-DEMO
![Page 17: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/17.jpg)
SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & PreventionsPhishing Preventions
1. Pay attention to the URL of a website.2. Be suspicious of unsolicited phone calls, visits.3. Do not provide personal information or
information about your organization 4. Do not respond to email solicitations for
personal information 5. Don't send sensitive information over the
Internet before checking a website's security
![Page 18: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/18.jpg)
SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & PreventionsMan-In-The-Middle Attack
The MITM intercepts communications between two systems and is performed when the attacker is in control of a router along normal point of traffic.
![Page 19: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/19.jpg)
SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & PreventionsCross Site Scripting(XSS)
AttackXSS is a security breach that takes advantage of dynamically generated Web pages.
![Page 20: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/20.jpg)
SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & PreventionsDaniel of Service(DOS)
AttackIt basically means, launching an attack, which will temporarily make the services, offered by the Network unusable by legitimate users.
![Page 21: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/21.jpg)
Conclusion
1. The Goal of Secure Computing•Confidentiality•Integrity•Availability
2.Threats to Security in Computing•Interception•Interruption•Modification•Fabrication3. Controls available to prevent the threats •Encryption & Programing Controls•OS & Network Controls•Administrative Controls•Laws & Ethics
![Page 22: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/22.jpg)
References1. http://en.wikipedia.org/wiki/
Cyber_security_standards
2. http://www.ccs.njit.edu/statica
3. http://www.unisys.com
![Page 23: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/23.jpg)
Thank you
![Page 24: Cyber security for an organization](https://reader035.vdocument.in/reader035/viewer/2022070313/554b9ea3b4c905b3618b489c/html5/thumbnails/24.jpg)
Any Que..??