Uploaded by pdfdocuments327

cyber security

advertisement
CYBERSECURITY VIRTUAL INTERNSHIP
Presented by
V Godwin (20121A12C2)
Information Technology
Under the esteemed supervision of
Ms.Chengamma Chitteti,M.Tech,(Ph.D)
Assistant Professor,
Dept. of IT,SVEC
Head of Department:
Dr. K.Ramani,M.Tech.,Ph.D
Professor and Head,
Dept. of IT, SVEC
ABSTRCT
The abstract outlines the internship structure, including training
modules, mentorship opportunities, and collaborative projects aimed at
enhancing participants' understanding of cybersecurity concepts and
their application in professional settings. As the interns navigate
diverse aspects of cybersecurity, from vulnerability assessments to
incident response, they gain valuable insights into the intricacies of
safeguarding digital assets. This abstract emphasizes the internship's
role in nurturing the next generation of cybersecurity professionals and
fostering a proactive approach to cyber threats.
Keywords: Cyber Defense, Vulnerability Assessments, Practical
Training
Introduction to Cybersecurity
• Cybersecurity refers to the technologies and processes designed to
protect the computer, networks data from unauthorized access
delivered via the internet by cyber criminals. Though, cyber it is
important for the network, data and application security.
• The objective of cyber security is to establish rules and measure to
use against attacks over the internet.
• It steal a person’s identity or illegal imports or malicious programs.
It is an activity done by using computers and the internet.
What is Cybersecurity?
• It is the protection of inter-connected systems, including hardware,
software and data, from cyberattacks.
• Information security, which is designed to maintain the
confidentiality, integrity and availability of data, is a subset of
cybersecurity
• In computing, security comprises cybersecurity and physical
security both are used to protect against unauthorized access to
data centers and other computerized systems.
Modules
• Network Security Fundamentals
• Cyber Security Fundamentals
• Cloud Security Fundamentals
Importance of cybersecurity
1
Protecting Critical Systems:
Ensuring the security of
critical systems that
organizations and
individuals rely on for daily
operations
2
Safeguarding Sensitive
Information: The role of
cybersecurity in
safeguarding sensitive data
from unauthorized access
and theft
3
Preventing Disruptions:
Cybersecurity measures help
prevent disruptions caused
by cyberattacks, ensuring
continuity in business and
personal activities
4
Maintaining Trust: Building
and maintaining trust by
assuring users and clients
that their information is
secure
5
Adapting to Evolving
Threats: Recognizing the
dynamic nature of cyber
threats and the importance
of adapting security
measures accordingly
Types of Cyber Attacks
Supply Chain Attacks
Fileless attacks use vulnerabilities in legitimate
software programs to inject malicious code directly
into a computer's memory
Spoofing is a technique through which a cybercriminal
disguises themselves as a extorting money or installing
malware or other harmful software on the device
phishing
attacks
Whale Phishing is a type ofspear
phishing that specifically targets
high-level corporate officers
Denial of Service attacks
Denial-of-service and distributed denial-of-service attacks flood a system's
resources with fraudulent traffic
12 The difference between DoS attacks and DDoS attacks is simply that DoS
attacks use a single source to generate fraudulent traffic, while DDoS attacks use
multiple sources
DDoS attacks are often carried out with a botnet, a network of internetconnected, malware-infected devices under a hacker's control
SQL injection attacks
A Structured Query Language
injection attack occurs on a
database-driven website when
the hacker manipulates a
standard SQL query
It is carried by injecting a
malicious code into a
vulnerable website search box,
thereby making the server
reveal crucial information
5 step approach
in the Cyber
Security strategy
framework
Identify: Understand what's important, what could go
wrong, and how
Protect: Put in place safeguards to keep what's
important safe
Detect: Keep an eye out for anything unusual or
suspicious
Respond: Act quickly and effectively if something goes
wrong
Recover: Learn from what happened and get back on
track
Protecting Your Data: Data
Security and Loss Prevention
Data
encryption:
At rest and in
transit
Impact of cyberattacks
Data breach:
Exposure of sensitive
information, such as
employee records,
financial data, and
project blueprints
Operational
disruption: Delay of
construction projects
due to system
outages and data
loss
Financial losses:
Costs associated
with data recovery,
remediation efforts,
and potential legal
claims
Reputational
damage: Loss of trust
from customers,
partners, and the
public
RSA Algorithm:
A Cornerstone
of
Cybersecurity
What is RSA?
Versatile: RSA
adapts to diverse
cybersecurity
needs, from
securing
communication to
managing keys
Highly
Secure: With large
key sizes, breaking
RSA is practically
impossible with
current computing
power
Widely Adopted: It's a
standardized and wellestablished technology
used across various
industries
CASE STUDY
Cybersecurity case studies often involve analyzing real-world incidents
or breaches, their causes, impact, and the strategies used for
resolution. One well-known case study is the Equifax data breach in
2017, where hackers gained unauthorized access to sensitive personal
information of nearly 147 million people. This incident highlighted
vulnerabilities in Equifax's security practices, leading to regulatory
scrutiny and significant repercussions. Analyzing such cases helps
identify weaknesses and improve cybersecurity measures for
organizations.
Safety tips for Cyber Crime
•
•
•
•
•
•
•
Use antivirus software
Insert Firewalls
Maintain Backup
Check security settings
Never give your full name or address to strangers
Uninstall unnecessary software
Learn more about the internet privacy
CERTIFICATE
Conclusion:• Cybersecurity is crucial for protecting digital assets and privacy. It’s
an ongoing effort that requires constant vigilance and proactive
measures to mitigate risks
• Also it is locking your doors and windows to keep your digital stuff
safe from online threats.
References:•
•
•
•
•
www.Wikipedia.org
www.avtest.org
www.billmullins.blogspot.com
www.digit/forum.com
www.antivirusnews.com
THANK YOU
Download