Sunteți pe pagina 1din 24

Cyber Security for an Organization

Presented By

Tejas C. Wasule Suraj A. Jaiwal


Govt. College of Engineering, Govt. College of Engineering,
Amravati Amravati
Contents
1. Introduction to Cyber Security
2. Need of Cyber Security
3. Types of Cyber Security
4. Types of Cyber Attacks And Preventions on it
5. Conclusion
6. References
Introduction to Cyber Security
What is Cyber Space?
•Worldwide Network of Computers
•Open to Public (Internet)

What is Cyber Security?


Technologies & Processes to Protect
• Computers
• Networks
• Data from Unauthorized Users
• Vulnerabilities
Need of Cyber Security
1. To Protect Sensitive Business & Personal
Information
2. Safeguard National Security
3. To Protect Sensitive Data of
• Government
• Military
• Corporation
• Financial Institutions
• Hospital & ETC
Types of Cyber Security
Data Security
Website
1. Personal Files

Email 2. Payment Information


3. Bank Account Details
Mobile 4. Customer’s Information

Network
Types of Cyber Security
Data Security
Website
1. To Protect Online Data on Server

Email 2. To Protect Online Operations of an


Organization
Mobile

Network
Types of Cyber Security
Data Security
Website
1. To protect Sensitive Information Sent Via Email

Email

Mobile

Network
Types of Cyber Security
Data Security
Website
1. Use Security Software on Smartphones

Email 2. Encrypt Data on Mobile Devices


3. Reporting Procedure for Lost Mobile
Mobile 4. Use Authentication

Network
Types of Cyber Security
Data Security
Website
1. Secure Internal Network & Cloud Services

Email 2. Secure & Encrypt your Organization's Wi-Fi


3. Set Safe Browsing Rule
Mobile

Network
Cyber Attacks…?
1. What is Cyber Attack?
Attempt to
• Destroy
• Expose
• Alter
• Disable Unauthorized use of an Asset
2. Why Cyber Attacks Become Possible?
• Vulnerability
• Spam
• Virus
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection
Phishing
1. SQL injection
• Code Injection Technique that Exploits a
MITM
Security Vulnerability in Application
• Occurs at the Database layer of Application
XSS
2. SQL - Structured Query Language
DOS • Used to communicate with the database
• ANSI-compliant SQL
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection Login Tricks
Phishing
• admin' --
• admin' #
MITM • admin'/*
• or 1=1--
XSS • ' or 1=1#
• ' or 1=1/*
DOS • ') or '1'='1--
• ') or ('1'='1—
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection-DEMO
Phishing

MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection SQL Injection Preventions
Phishing

MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing
• Is the act of attempting to acquire information such as
Phishing
Usernames, Passwords, and Credit card
• Using Fake Web-Pages identical to the legitimate
MITM one.

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing-DEMO
Phishing

MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Phishing Preventions
Phishing 1. Pay attention to the URL of a website.
2. Be suspicious of unsolicited phone calls, visits.
MITM 3. Do not provide personal information or information
about your organization
XSS 4. Do not respond to email solicitations for personal
information
5. Don't send sensitive information over the Internet
DOS
before checking a website's security
Types of Cyber Attacks & Preventions
SQL Injection Man-In-The-Middle Attack
Phishing The MITM intercepts communications between two
systems and is performed when the attacker is in control
of a router along normal point of traffic.
MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Cross Site Scripting(XSS) Attack
Phishing XSS is a security breach that takes advantage of
dynamically generated Web pages.
MITM

XSS

DOS
Types of Cyber Attacks & Preventions
SQL Injection Daniel of Service(DOS) Attack
It basically means, launching an attack, which will
Phishing
temporarily make the services, offered by the Network
unusable by legitimate users.
MITM

XSS

DOS
1. The Goal of Secure Computing
•Confidentiality
Conclusion •Integrity
•Availability
2.Threats to Security in
Computing
•Interception
•Interruption
•Modification
•Fabrication
3. Controls available to prevent
the threats
•Encryption & Programing Controls
•OS & Network Controls
•Administrative Controls
•Laws & Ethics
1. http://en.wikipedia.org/wiki/Cyber_secu
References
rity_standards
2. http://www.ccs.njit.edu/statica
3. http://www.unisys.com
Thank you
Any Que..??

S-ar putea să vă placă și