0% found this document useful (0 votes)
46 views3 pages

Cyber - Security Report

Uploaded by

ajjukatariya2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views3 pages

Cyber - Security Report

Uploaded by

ajjukatariya2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Name : mahek Ansari

Report on cyber security

Silicon valley –

is a global center of technological innovation located in the south francisco bay area of California.

RANSOMWARE :

It is a type malicious software (malware) that threatens to publish or a blocks access to data or a
computer system usually by encrypting it until the victim pays a ransom fee to the attacker.

DARKWEB:

The dark web is a common gathering place for hackers and other cybercriminals, which can make
browsing the dark web a risky activity. Visitors to the dark web should exercise extreme caution when
downloading files, as they may infect your devices with viruses, malware, trojans, ransomware or
other malicious files. At a minimum, users should ensure that their cybersecurity defenses are activated
and up-to-date.

That said, many of the actors on the dark web are highly skilled digital adversaries who can easily
outmaneuver basic security measures. As a leading cybersecurity vendor, CrowdStrike cautions all
organizations and individuals to refrain from using the dark web.

TEKSTAC:

It is a cloud base digital skilling platform that offers learning function management and tools to help tech
professional and organization stay current with changing technologies .

CYBER SECURITY:

Cybersecurity aims to protect individuals’ and organizations’ systems, applications, computing devices,
sensitive data and financial assets against computer viruses, sophisticated and costly ransomware
attacks, and more.

Cyberattacks have the power to disrupt, damage or destroy businesses, and the cost to victims keeps
rising. For example, according to IBM's Cost of a Data Breach 2023 report,

The average cost of a data breach in 2023 was USD 4.45 million, up 15% over the last three years;

The average cost of a ransomware-related data breach in 2023 was even higher, at USD 5.13 million. This
number does not include the cost of the ransom payment, which averaged an extra USD 1,542,333, up
89% from the previous year.

BANKING POWER:
 Cybersecurity in banking brings financial services providers proactive solutions for regulatory
compliance, network security, data encryption and threat monitoring. The precautions needed to
safeguard online financial activities range from awareness and training for employees and customers to
routine risk management assessments.

SATELLITE COMMUNICATION:
Satellite cyber security encompasses the strategies, technologies, and practices to protect satellite
communications systems from cyber threats and unauthorised access. These systems facilitate a wide
range of global communications and are increasingly targeted by cyber criminals.

ETHICAL HACKER:
It is a person who has into a computer network in order test for evaluate its security rather than with
malicious or criminal intent

BLACK HAT:
A black hat hacker is someone who maliciously searches for and exploits vulnerabilities in computer
systems or networks, often using malware and other hacking techniques to do harm. These stereotypical
hackers often break laws as part of their hacking exploits, infiltrating victims' networks for monetary
gain, to steal or destroy data, to disrupt systems, to conduct cyberespionage or just to have fun.

WHITE HAT:
a white hat hacker is a security specialist hired to find vulnerabilities in software, hardware and
networks that black hats may find and target. Unlike black hats, white hats only hack networks when
legally permitted to do so. Also known as ethical hackers, white hats disclose all vulnerabilities to their
employer.

DRONE ATTACK:
Besides a major flight safety concern, drones can become a serious cybersecurity threat. Apart from
airworthiness and flight safety issues, drones affect the cyber domain and the security of data. Forbes
points out that the malicious use of these platforms in the cyber domain is an inevitable fact, and it can
no longer be pushed aside.
DEEPFAKE:
Currently, deepfakes in isolation are a small component of the overall suite of cybersecurity concerns,
but because the incidence of attacks featuring manipulated content is growing, chief information
security officers (CISOs) and their teams are taking notice.

AI CYBER ATTACK:

With dark AI, cyber threat actors are able to use AI to conduct faster, more sophisticated attacks. These
AI-enhanced threats operate at machine speed and often go undetected, using legitimate tools and valid
credentials to blend into normal enterprise activities. This new level of stealth and speed in cyberattacks
makes traditional security measures less effective, as they struggle to detect and prevent these attacks.
The need for advanced AI-driven detection and analysis has never been greater.

MESSAGE FOR YOUTH:


I tell students that hackers and cybercriminals are constantly looking for vulnerable targets to attack and
steal information from. Teenagers must keep their devices and information secure, behave appropriately
on social media and shared devices, and respect others’ digital privacy on devices and online.

You might also like