0% found this document useful (0 votes)
54 views24 pages

Cyber Security For An Organization: Presented by

Cyber security is important to protect organizations, individuals, and governments from unauthorized access to sensitive data. The presentation discusses the need for cyber security to safeguard business information, personal data, critical infrastructure, and national security. It covers different types of cyber security including data, email, mobile device, and network security. Common cyber attacks like SQL injection, phishing, man-in-the-middle, cross-site scripting, and denial of service attacks are explained along with associated prevention methods. The goal of cyber security is to maintain confidentiality, integrity, and availability of digital systems and data.

Uploaded by

yimer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views24 pages

Cyber Security For An Organization: Presented by

Cyber security is important to protect organizations, individuals, and governments from unauthorized access to sensitive data. The presentation discusses the need for cyber security to safeguard business information, personal data, critical infrastructure, and national security. It covers different types of cyber security including data, email, mobile device, and network security. Common cyber attacks like SQL injection, phishing, man-in-the-middle, cross-site scripting, and denial of service attacks are explained along with associated prevention methods. The goal of cyber security is to maintain confidentiality, integrity, and availability of digital systems and data.

Uploaded by

yimer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cyber Security for an Organization

Presented By

Tejas C. Wasule Suraj A. Jaiwal


Govt. College of Engineering, Govt. College of Engineering,
Amravati Amravati
Contents
1. Introduction to Cyber Security
2. Need of Cyber Security
3. Types of Cyber Security
4. Types of Cyber Attacks And Preventions on it
5. Conclusion
6. References
Introduction to Cyber Security
What is Cyber Space?
•Worldwide Network of Computers
•Open to Public (Internet)

What is Cyber Security?


Technologies & Processes to Protect
• Computers
• Networks
• Data from Unauthorized Users
• Vulnerabilities
Need of Cyber Security
1. To Protect Sensitive Business & Personal
Information
2. Safeguard National Security
3. To Protect Sensitive Data of
• Government
• Military
• Corporation
• Financial Institutions
• Hospital & ETC
Types of Cyber Security
Data Security
Website
1. Personal Files

Email 2. Payment Information


3. Bank Account Details
Mobile 4. Customer’s Information

Network
Types of Cyber Security
Data Security
Website
1. To Protect Online Data on Server

Email 2. To Protect Online Operations of an


Organization
Mobile

Network
Types of Cyber Security
Data Security
Website
1. To protect Sensitive Information Sent Via Email

Email

Mobile

Network
Types of Cyber Security
Data Security
Website
1. Use Security Software on Smartphones

Email 2. Encrypt Data on Mobile Devices


3. Reporting Procedure for Lost Mobile
Mobile 4. Use Authentication

Network
Types of Cyber Security
Data Security
Website
1. Secure Internal Network & Cloud Services

Email 2. Secure & Encrypt your Organization's Wi-Fi


3. Set Safe Browsing Rule
Mobile

Network
Cyber Attacks…?
1. What is Cyber Attack?
Attempt to
• Destroy
• Expose
• Alter
• Disable Unauthorized use of an Asset
2. Why Cyber Attacks Become Possible?
• Vulnerability
• Spam
• Virus
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection
Phishing
1. SQL injection
• Code Injection Technique that Exploits a
MITM
Security Vulnerability in Application
• Occurs at the Database layer of Application
XSS
2. SQL - Structured Query Language
DOS • Used to communicate with the database
• ANSI-compliant SQL
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection Login Tricks
Phishing
• admin' --
• admin' #
MITM • admin'/*
• or 1=1--
XSS • ' or 1=1#
• ' or 1=1/*
DOS • ') or '1'='1--
• ') or ('1'='1—
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection-DEMO
Phishing

MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection Preventions
Phishing

MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing
• Is the act of attempting to acquire information such as
Phishing
Usernames, Passwords, and Credit card
• Using Fake Web-Pages identical to the legitimate
MITM one.

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing-DEMO
Phishing

MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing Preventions
Phishing 1. Pay attention to the URL of a website.
2. Be suspicious of unsolicited phone calls, visits.
MITM 3. Do not provide personal information or information
about your organization
XSS 4. Do not respond to email solicitations for personal
information
5. Don't send sensitive information over the Internet
DOS
before checking a website's security
Types of Cyber Attacks & Preventions
SQL Injection Man-In-The-Middle Attack
Phishing The MITM intercepts communications between two
systems and is performed when the attacker is in control
of a router along normal point of traffic.
MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Cross Site Scripting(XSS) Attack
Phishing XSS is a security breach that takes advantage of
dynamically generated Web pages.
MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Daniel of Service(DOS) Attack
It basically means, launching an attack, which will
Phishing
temporarily make the services, offered by the Network
unusable by legitimate users.
MITM

XSS

DOS
1. The Goal of Secure Computing
•Confidentiality
Conclusion •Integrity
•Availability
[Link] to Security in
Computing
•Interception
•Interruption
•Modification
•Fabrication
3. Controls available to prevent
the threats
•Encryption & Programing Controls
•OS & Network Controls
•Administrative Controls
•Laws & Ethics
1. [Link]
References
rity_standards
2. [Link]
3. [Link]
Thank you
Any Que..??

You might also like