Cyber security refers to the body of technologies,
processes, and practices designed to protect
networks, devices, programs, and data from attack,
damage, or unauthorized access. Cyber security
may also be referred to as information technology security.
00:20
TYPES OF CYBER CRIMES
00:22
- PHISING
- RANSOMWARE
- MOBILE MALWARE
00:26
PHISING
00:28
Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers. It occurs
when an attacker, masquerading as a trusted
entity, dupes a victim into opening an email,
instant message, or text message. The
recipient is then tricked into clicking a
malicious link, which can lead to the installation of
malware Depending on scope, a phishing
attempt might escalate into a security incident
from which a business will have a difficult time
recovering.
00:33
RANSOMWARE
00:37
Types of Ransomware
00:39
crypto malware or encryptors
Locker
Scareware
Doxware or leakware
00:44
MOBILE MALWARE
00:47
Mobile malware, as its name suggests is malicious
software that
specifically targets the operating systems on
mobile phones. There are many types of mobile
malware variants and
different methods of distribution and infection.
For organizations that depend on mobile phones
to do business or who allow employees and
visitors to use their own devices as part of
a BYOD policy, the threat is very real and needs
to be addressed.
00:52
Different Types of Mobile Malware
00:55
BENEFITS OF CYBERSECURITY
00:55
1. Spyware and Madware
2. Drive-by Downloads
3. Viruses and Trojans
4. Mobile Phishing
01:01
business protection against malware,
ransomware and fishing
improvement of recovery time after a breach
improvement of confidence in the organization.
01:07
CYBERSECURITY CHALLENGES
01:14
Cybersecurity is continually challenged by hackers,
data loss, privacy, risk management and changing
cybersecurity strategies. Nothing currently
indicates that cyberattacks will decrease.
Moreover, with an increased number of entry
points for attacks, more strategies for
securing digital assets are needed to
protect networks and devices.