Cyberattacks and Cybersecurity, Privacy Issues Harshit Kapur 01614202022 Srishti Biswas 01714202022 Priyanshi Rungta 01814202022 Table of Contents CYBER ATTACKS What are cyber attacks? TYPES OF CYBER ATTACKS Ransomware, Malware, phishing, etc. CYBER SECURITY MEASURES How can we make our data secured and authorized 01 02 03 04 PRIVACY ISSUE How privacy is breached for organizations and individuals. 05 CASE STUDY 06 CONCLUSION The infamous breach of Aadhar details in 2018. Concluding the presentation with the importance of security and privacy. WHAT ARE CYBER ATTACKS? A cyber attack is a set of actions performed to gain unauthorized access, steal data or cause damage to computers, computer networks. It uses malicious code to alter computer code, logic or data and leads to cyber crimes such as information or identity theft Types of Cyberattacks 1. Phishing Attacks Phishing attacks involve tricking individuals into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity. 2. Malware Attacks Malware attacks involve the use of malicious software to gain unauthorized access to or damage a computer system. Ransomware is a variant of malware. 3. SQL injection An SQL injection attack occurs on a database-driven website when the hacker manipulates a standard SQL query. Attacker injects a malicious code into a vulnerable website search box, making the server reveal crucial information. 4. DDoS attacks DDoS (Distributed Denial of Service) attacks involve overwhelming a target system with a flood of internet traffic, causing it to become inaccessible to users. CYBER SECURITY Cyber security is the use of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber attacks. It aims to reduce the risk of cyber attacks. Firewalls Firewalls act as a barrier between a trusted internal network and untrusted external networks, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Antivirus Software Antivirus software scans, detects, and removes or quarantines malicious software, like viruses, trojans, from computer systems to protect against Encryption Encryption is the process of converting data into a form that cannot be easily understood by unauthorized individuals. It protects sensitive information by making it unreadable unless decrypted with the correct key. Employee Training It involves educating employees on best practices for identifying and responding to cyber threats, such as phishing attacks, social engineering, and password CASE STUDY : Aadhaar Data Breach In 2018, the secret and sensitive data of literally hundreds of millions of people had been torn open and exposed, then aggregated on various dark web lists for sale. Criminals were selling access to the database at a rate of Rs500 for 10 minutes, while in March a leak at a state-owned utility company allowed anyone to download names and ID numbers. All the sensitive information of almost 1.1 billion Indians were found susceptible to data breach. Privacy Issues Data Breaches Data breaches pose a significant privacy risk as they expose personal information to unauthorized individuals or entities. Unauthorized Access Unauthorized access to personal information can lead to identity theft, financial loss, and other privacy violations. Importance of Protecting Privacy Protecting privacy is crucial to safeguard personal information, maintain trust, and mitigate the risks of cyberattacks. CONCLUSION In conclusion, cybersecurity and privacy are of paramount importance in today's digital landscape. As technology continues to advance, so do the threats and risks associated with cyberattacks. It is crucial for individuals and organizations to remain vigilant and adapt to emerging threats.