Uploaded by Priyanshi Rungta

ce ppt

advertisement
Cyberattacks
and
Cybersecurity,
Privacy Issues
Harshit Kapur
01614202022
Srishti Biswas
01714202022
Priyanshi Rungta
01814202022
Table of Contents
CYBER ATTACKS
What are cyber attacks?
TYPES OF CYBER
ATTACKS
Ransomware, Malware,
phishing, etc.
CYBER SECURITY
MEASURES
How can we make our
data secured and
authorized
01
02
03
04
PRIVACY ISSUE
How privacy is breached
for organizations and
individuals.
05
CASE STUDY
06
CONCLUSION
The infamous breach of
Aadhar details in 2018.
Concluding the
presentation with the
importance of security
and privacy.
WHAT ARE CYBER
ATTACKS?
A cyber attack is a set of
actions performed to gain
unauthorized access, steal
data or cause damage to
computers,
computer
networks.
It uses malicious code to alter
computer code, logic or data
and leads to cyber crimes
such as information or identity
theft
Types of
Cyberattacks
1. Phishing Attacks
Phishing attacks involve
tricking individuals into
revealing sensitive information,
such as passwords or credit
card details, by posing as a
trustworthy entity.
2. Malware Attacks
Malware attacks involve the
use of malicious software to
gain unauthorized access to or
damage a computer system.
Ransomware is a variant of
malware.
3. SQL injection
An SQL injection attack occurs on a
database-driven website when the
hacker manipulates a standard SQL
query.
Attacker injects a malicious code into
a vulnerable website search box,
making
the
server
reveal
crucial information.
4. DDoS attacks
DDoS (Distributed Denial of Service)
attacks involve overwhelming a target
system with a flood of internet traffic,
causing it to become inaccessible to
users.
CYBER SECURITY
Cyber security is the use of technologies, processes, and
controls to protect systems, networks, programs, devices, and
data from cyber attacks. It aims to reduce the risk of cyber
attacks.
Firewalls
Firewalls act as a barrier
between a trusted internal
network and untrusted
external networks,
monitoring and controlling
incoming and outgoing
network traffic based on
predetermined security
rules.
Antivirus Software
Antivirus software scans,
detects, and removes or
quarantines malicious
software, like viruses,
trojans, from computer
systems to protect against
Encryption
Encryption is the process of
converting data into a form
that
cannot
be
easily
understood by unauthorized
individuals.
It
protects
sensitive
information
by
making it unreadable unless
decrypted with the correct
key.
Employee Training
It
involves
educating
employees on best practices
for identifying and responding
to cyber threats, such as
phishing
attacks,
social
engineering, and password
CASE STUDY : Aadhaar Data
Breach
In 2018, the secret and sensitive
data of literally hundreds of
millions of people had been torn
open
and
exposed,
then
aggregated on various dark
web lists for sale.
Criminals were selling access to
the database at a rate of Rs500
for 10 minutes, while in March a
leak at a state-owned utility
company allowed anyone to
download names and ID
numbers. All the sensitive
information of almost 1.1 billion
Indians were found
susceptible to data breach.
Privacy Issues
Data Breaches
Data breaches pose a significant privacy risk as they
expose personal information to unauthorized
individuals or entities.
Unauthorized Access
Unauthorized access to personal information can
lead to identity theft, financial loss, and other privacy
violations.
Importance of Protecting Privacy
Protecting privacy is crucial to safeguard personal
information, maintain trust, and mitigate the risks of
cyberattacks.
CONCLUSION
In conclusion, cybersecurity and
privacy are of paramount
importance in today's digital
landscape. As technology
continues to advance, so do the
threats and risks associated
with cyberattacks. It is crucial
for individuals and
organizations to remain vigilant
and adapt to emerging threats.
Related documents
Download