Documente Academic
Documente Profesional
Documente Cultură
Realized by:
ERRAFIK Asmae
AMINE Safae
Summary .................................................................................................................................... 2
Abstract ...................................................................................................................................... 3
Introduction ................................................................................................................................ 3
I- Need of cyber security ........................................................................................................ 4
II– Definition of cyber security .............................................................................................. 4
1- People ............................................................................................................................. 5
2- Processes ......................................................................................................................... 5
3- Technology ..................................................................................................................... 5
III- Advantages & Disadvantages of cyber security ............................................................... 5
1- Advantages of Cyber Security ........................................................................................ 6
2- Disadvantages of Cyber Security ................................................................................... 6
IV- Types of Cyber security ................................................................................................... 6
1- Information Security ....................................................................................................... 6
2- Network Security ............................................................................................................ 6
3- Application Security ....................................................................................................... 7
4- Website Security ............................................................................................................. 7
5- Endpoint Security ........................................................................................................... 7
V- Types of Cyber security Threats and there solutions ........................................................ 7
1- Viruses ............................................................................................................................ 7
2- Identity Theft .................................................................................................................. 7
3- Password Attacks ............................................................................................................ 8
4- Malware .......................................................................................................................... 8
5- Trojan Horses ................................................................................................................. 8
VI- consequences of cyber security Threats ........................................................................... 8
VII- Steps of cyber security .................................................................................................... 9
1- Network Security ............................................................................................................ 9
2- Malware Protection ......................................................................................................... 9
3- Monitoring ...................................................................................................................... 9
4-Incident Management ...................................................................................................... 9
5- User Education and Awareness ...................................................................................... 9
6- Home and Mobile Working .......................................................................................... 10
7- Secure Configuration .................................................................................................... 10
8- Removable Media Controls .......................................................................................... 10
9- Managing User Privileges............................................................................................. 10
10- Information Risk Management Regime ..................................................................... 10
Conclusion ................................................................................................................................ 11
Webographic ............................................................................................................................ 12
2
Abstract
Governments, military, organizations, financial institutions, universities and other
businesses collect process and store a large amount of confidential information and
data on computers and transmit that data over networks to other computers. With the
continuous rapid growth of volume and sophistication of cyber attacks, quick attempts
are required to secure sensitive business and personal information, as well as to
protect national security.
In this presentation we will talking about the nature of cyberspace and show how
the internet is unsecure to transmit the confidential and financial information. We will
demonstrate that hacking is now common and harmful for global economy and
security and presented the various methods of cyber attacks in worldwide.
Introduction
Cyber security is defined as technologies and processes constructed to protect
computers, computer hardware, software, networks and data from unauthorized
access, vulnerabilities supplied through Internet by cyber criminals, terrorist groups
and hackers. Cyber security is related to protecting your internet and network based
digital equipments and information from unauthorized access and alteration. Internet
is now not only the source of information but also has established as a medium
through which we do business, to advertise and sell our products in various forms,
communicate with our customers and retailers and do our financial transactions. The
internet offers lots of benefits and provides us opportunity to advertise our business
across the globe in minimum charges and in less human efforts in very short span of
time. As internet was never constructed to track and trace the behavior of users. The
Internet was actually constructed to link autonomous computers for resource sharing
and to provide a common platform to community of researchers. As internet offers on
the one hand huge number of benefits and on the other hand it also provides equal
opportunities for cyber-terrorists and hackers. Terrorist organizations and their
supporters are using internet for a wide range of purposes such as gathering
information and dissemination of it for terrorist purpose, recruiting fresh terrorists,
funding attacks and to motivate acts of terrorism. It is often used to facilitate
communication within terrorist groups and gathering and dissemination of information
for terrorist purposes.
3
I- Need of cyber security
Cyber security is now considered as important part of individuals and families, as
well as organizations, governments, educational institutions and our business. It is
essential for families and parents to protect the children and family members from
online fraud. In terms of financial security, it is crucial to secure our financial
information that can affect our personal financial status. Internet is very important and
beneficial for faculty, student, staff and educational institutions, has provided lots of
learning opportunities with number of online risks. There is vital need for internet
users to understand how to protect themselves from online fraud and identity theft.
Appropriate learning about the online behavior and system protection results
reduction in vulnerabilities and safer online environment. Small and medium-sized
organizations also experience various security related challenges because of limited
resources and appropriate cyber security skills. The rapid expansion of technologies
is also creating and making the cyber security more challenging as we do not present
permanent solutions for concerned problem. Although, we are actively fighting and
presenting various frameworks or technologies to protect our network and information
but all of these providing protection for short term only. However, better security
understanding and appropriate strategies can help us to protect intellectual property
and trade secrets and reduce financial and reputation loss. Central, state and local
governments hold large amount of data and confidential records online in digital form
that becomes primary target for a cyber attack. Most of time governments face
difficulties due to inappropriate infrastructure, lack of awareness and sufficient
funding. It is important for the government bodies to provide reliable services to
society, maintain healthy citizen- to-government communications and protection of
confidential information.
4
1- People
Users must understand and comply with basic data security principles like
choosing strong passwords, being wary of attachments in email, and backing up
data.
Organizations must have a framework for how they deal with both attempted and
successful cyber attacks.
3- Technology
Figure 2 : the protection against malware, antivirus software and email security
solutions.
5
1- Advantages of Cyber Security
1- Information Security
2- Network Security
Network security aims to protect the usability, integrity, and safety of a network,
associated components, and data shared over the network. (When a network is
secured, potential threats gets blocked from entering or spreading on that network.
Examples of Network Security includes Antivirus programs, Firewall that block
6
unauthorized access to a network and VPNs (Virtual Private Networks) used for
secure remote access.)
3- Application Security
4- Website Security
This is used to prevent and protect websites from cyber security risks on the
internet.
5- Endpoint Security
There are many different types of cyber security threats, some of the most
common types of threats are listed below:
1- Viruses
Viruses are a type of malware programs that are specially designed to cause
damage to the victim’s computer. Viruses can self-replicate under the right conditions
and can infect a computer system without the permission or knowledge of the user.
Install a security suite that protects the computer against threats such as
viruses and worms.
2- Identity Theft
7
information is gathered it could allow the cybercriminal to pretend as you in some
way.
In some cases, hackers may steal the bank details of the victims and use it for
their personal gain.
Malware is any software that infects and damages a computer system without the
owner's knowledge or permission.
Trojan horses are email viruses that can duplicate themselves, steal information,
or harm the computer system;
Security suites, such as Avast Internet Security, will prevent you from
downloading Trojan Horses.
VI- consequences of cyber security Threats
8
Identity theft, fraud, extortion;
Breach of access;
Password sniffing;
System infiltration.
1- Network Security
9
Produce user policies covering acceptable and secure use of the
organisation’s systems;
Establish a staff training programme;
Maintain user awareness of the cyber risks.
6- Home and Mobile Working
Apply security patches and ensure that the secure configuration of all ICT
systems is maintained;
Create a system inventory & define a base line build for all ICT devices.
8- Removable Media Controls
Establish and effective governance structure and determine your risk appetite;
Maintain boards engagement with cyber risk;
Produce supporting information risk management policies.
10
Conclusion
11
Webographic
https://pdfs.semanticscholar.org/5cfb/7a5bd2e6c181e8a69ebd49b1dadb795f493b.pd
f
http://www.asmltd.com/wp-content/uploads/2017/04/CyberSecurity-1.pdf
http://asmartc.blogspot.com/2015/04/cyber-security-advantages-and_18.html
https://sites.google.com/site/xinyicyber/the-disadvantages-and-advantages-of-cyber-
security
https://searchsecurity.techtarget.com/definition/cybersecurity
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
https://one.comodo.com/blog/cyber-security/what-is-cyber-security.php
http://niti.gov.in/writereaddata/files/document_publication/CyberSecurityConclaveAtVi
gyanBhavanDelhi_1.pdf
12