Project 1

Project 1

Published on 14 October 2020
ad
aryaman dhoundiyal
aryaman's Personal Gallery
Transcript
00:00
CYBER SECURITY
00:05
INTRODUCTION
00:10
WHAT'S CYBER SECURITY ?
00:15
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
00:20
TYPES OF CYBER CRIMES
00:22
- PHISING - RANSOMWARE - MOBILE MALWARE
00:26
PHISING
00:28
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware Depending on scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.
00:33
RANSOMWARE
00:37
Types of Ransomware
00:39
crypto malware or encryptors Locker Scareware Doxware or leakware
00:44
MOBILE MALWARE
00:47
Mobile malware, as its name suggests is malicious software that specifically targets the operating systems on mobile phones. There are many types of mobile malware variants and different methods of distribution and infection. For organizations that depend on mobile phones to do business or who allow employees and visitors to use their own devices as part of a BYOD policy, the threat is very real and needs to be addressed.
00:52
Different Types of Mobile Malware
00:55
BENEFITS OF CYBERSECURITY
00:55
1. Spyware and Madware 2. Drive-by Downloads 3. Viruses and Trojans 4. Mobile Phishing
01:01
business protection against malware, ransomware and fishing improvement of recovery time after a breach improvement of confidence in the organization.
01:07
CYBERSECURITY CHALLENGES
01:14
Cybersecurity is continually challenged by hackers, data loss, privacy, risk management and changing cybersecurity strategies. Nothing currently indicates that cyberattacks will decrease. Moreover, with an increased number of entry points for attacks, more strategies for securing digital assets are needed to protect networks and devices.
01:21
THANK YOU