Sunteți pe pagina 1din 32

Use of a computer/internet to do

something that would be a crime in any


case.
USA
CHINA
GERMANY
BRITAIN
BRAZIL
SPAIN
ITALY
FRANCE
TURKEY
INDIA
Cyber security standards
are security standards
which enable organizations
to practice safe security
techniques to minimize the
number of successful cyber
security attacks.
RANSOMWARE ATTACKS

•Ransomware will be the primary threat, continuing being a very


significant threat until the second half of 2018all over the globe, but
they have only been getting more sophisticated and troublesome over
time. Hackers can gain access to your computer encrypt your files and
demand a payment in return for your files back.

•Ransomware‐as‐a‐service, custom ransomware for sale in dark


markets, and creative derivatives from open‐source ransomware
code will keep the security industry busy through the first half of the
year
HOW TO STAY SAFE?
•Be sure to back up your files with a high‐quality
back‐up solution to protect your personal
information. This is a great precaution to ensure
that your files are safe and accessible to you –
for free – no matter what happens.

• Exercise extreme caution when opening up email


attachments or clicking on links sent from
emails. Use a VPN to have a secured connection if
you’re ever using public Wi-Fi and be sure to
install antivirus and firewall software and
ensure it’s updated.
 Drones continue to become more and more mainstream.
What started as a fun toy for kids and a slightly expensive
hobby for enthusiasts has really taken off, if you’ll forgive
the pun.
 Drones are well on the way to becoming a major tool for
shippers, law enforcement agencies, photographers,
farmers, the news media, and more. It is hard to deny that
drones have become a lot more valuable to many types of
businesses and government agencies.
•Specialist believe in 2018 banking Trojans will reappear and
they will come from ransomware authors. This malware will
combine mobile device locks and other ransomware features with
traditional man‐in‐the‐middle attacks to steal primary and
secondary authentication factors, allowing attackers to access
banks accounts and credit cards.

•Malicious applications. The applications that allow to buy keep


your banking data and are susceptible to be hacked.

•Video game. Many of them allow online billing and payment and
are possible targets for hackers to
intercept the user's bank details.
IOT MALWARE OPENS A BACKDOOR INTO THE HOME
• Consumer electronics continues to grow at a rapid pace. One
area in particular is the consumer element of the Internet of
Things, which is expected to hit roughly 1.8 billion devices by
2019. Known colloquially as “smart home” or “connected home,”
this market includes a number of well established brands and
products, as well as a huge field of smaller companies looking
into the scene.
• Internet abduction of things (cars, refrigerators, televisions,...). A
ransomware virus can block, for example, a security camera and
hackers can request a rescue to unlock it.
 Every Internet user is bombarded with information for
making decisions: what to click, what to read, and where
to spend.
 These choices fuel a multibillion dollar online economy
and, with that much money on the line, unscrupulous
actors are constantly looking for ways to take advantage of
others.
 Reputation is key for many decision makers to feel
confident about their choices; this is the trust that some
people seek to exploit.
Virus

Password
cracking Hacker

Major
security
problems

Trojan Malware
horses
 In common a hacker is a person who breaks into
computers, usually by gaining access to
administrative controls.
•Black hat hackers are normally responsible for
creating malware, which is frequently used to
infiltrate computerized networks and systems.
You can’t
catch me
•Also known as “ethical hackers,” they’re often
employed or contracted by companies and
governmental entities, working as security
specialists looking for vulnerabilities. They imply
the same methods as black hat but are given
permissions for the following
CALL ME MR.
GREY HAT
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Password attacks are
attacks by hackers
that are able to
determine passwords
or find passwords to
different protected
electronic areas and
social network sites.
ADVANTAGE OF CYBER SECURITY
 It will defend from hacks and virus.
 The application of cyber security used in our PC
needs update every week.
 The security developers will update their database
every week once. Hence the new virus also deleted.
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information
unless required
 www.wikipedia.com
 www.google.com
 www.cyber security.com
 www.google images.com
 www.cyber threats.com

S-ar putea să vă placă și