Cyber Security for an Organization
Presented By
Tejas C. Wasule Suraj A. Jaiwal
Govt. College of Engineering, Govt. College of Engineering,
Amravati Amravati
Contents
1. Introduction to Cyber Security
2. Need of Cyber Security
3. Types of Cyber Security
4. Types of Cyber Attacks And Preventions on it
5. Conclusion
6. References
Introduction to Cyber Security
What is Cyber Space?
•Worldwide Network of Computers
•Open to Public (Internet)
What is Cyber Security?
Technologies & Processes to Protect
• Computers
• Networks
• Data from Unauthorized Users
• Vulnerabilities
Need of Cyber Security
1. To Protect Sensitive Business & Personal
Information
2. Safeguard National Security
3. To Protect Sensitive Data of
• Government
• Military
• Corporation
• Financial Institutions
• Hospital & ETC
Types of Cyber Security
Data Security
Website
1. Personal Files
Email 2. Payment Information
3. Bank Account Details
Mobile 4. Customer’s Information
Network
Types of Cyber Security
Data Security
Website
1. To Protect Online Data on Server
Email 2. To Protect Online Operations of an
Organization
Mobile
Network
Types of Cyber Security
Data Security
Website
1. To protect Sensitive Information Sent Via Email
Email
Mobile
Network
Types of Cyber Security
Data Security
Website
1. Use Security Software on Smartphones
Email 2. Encrypt Data on Mobile Devices
3. Reporting Procedure for Lost Mobile
Mobile 4. Use Authentication
Network
Types of Cyber Security
Data Security
Website
1. Secure Internal Network & Cloud Services
Email 2. Secure & Encrypt your Organization's Wi-Fi
3. Set Safe Browsing Rule
Mobile
Network
Cyber Attacks…?
1. What is Cyber Attack?
Attempt to
• Destroy
• Expose
• Alter
• Disable Unauthorized use of an Asset
2. Why Cyber Attacks Become Possible?
• Vulnerability
• Spam
• Virus
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection
Phishing
1. SQL injection
• Code Injection Technique that Exploits a
MITM
Security Vulnerability in Application
• Occurs at the Database layer of Application
XSS
2. SQL - Structured Query Language
DOS • Used to communicate with the database
• ANSI-compliant SQL
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection Login Tricks
Phishing
• admin' --
• admin' #
MITM • admin'/*
• or 1=1--
XSS • ' or 1=1#
• ' or 1=1/*
DOS • ') or '1'='1--
• ') or ('1'='1—
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection-DEMO
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection Preventions
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing
• Is the act of attempting to acquire information such as
Phishing
Usernames, Passwords, and Credit card
• Using Fake Web-Pages identical to the legitimate
MITM one.
XSS
DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing-DEMO
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing Preventions
Phishing 1. Pay attention to the URL of a website.
2. Be suspicious of unsolicited phone calls, visits.
MITM 3. Do not provide personal information or information
about your organization
XSS 4. Do not respond to email solicitations for personal
information
5. Don't send sensitive information over the Internet
DOS
before checking a website's security
Types of Cyber Attacks & Preventions
SQL Injection Man-In-The-Middle Attack
Phishing The MITM intercepts communications between two
systems and is performed when the attacker is in control
of a router along normal point of traffic.
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
SQL Injection Cross Site Scripting(XSS) Attack
Phishing XSS is a security breach that takes advantage of
dynamically generated Web pages.
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
SQL Injection Daniel of Service(DOS) Attack
It basically means, launching an attack, which will
Phishing
temporarily make the services, offered by the Network
unusable by legitimate users.
MITM
XSS
DOS
1. The Goal of Secure Computing
•Confidentiality
Conclusion •Integrity
•Availability
[Link] to Security in
Computing
•Interception
•Interruption
•Modification
•Fabrication
3. Controls available to prevent
the threats
•Encryption & Programing Controls
•OS & Network Controls
•Administrative Controls
•Laws & Ethics
1. [Link]
References
rity_standards
2. [Link]
3. [Link]
Thank you
Any Que..??