Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
41 views51 pages

Cybersecurity WBSEDCL

The document provides a comprehensive overview of cybersecurity, its importance, and various measures to protect against cyber threats. It covers topics such as the CIA Triad (Confidentiality, Integrity, Availability), types of cyber attacks, and best practices for individuals and businesses to enhance their cybersecurity posture. Additionally, it outlines relevant laws and regulations regarding cyber offenses and emphasizes the need for employee training and awareness in maintaining cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views51 pages

Cybersecurity WBSEDCL

The document provides a comprehensive overview of cybersecurity, its importance, and various measures to protect against cyber threats. It covers topics such as the CIA Triad (Confidentiality, Integrity, Availability), types of cyber attacks, and best practices for individuals and businesses to enhance their cybersecurity posture. Additionally, it outlines relevant laws and regulations regarding cyber offenses and emphasizes the need for employee training and awareness in maintaining cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 51

COMPUTER TRAINING

FOR WBSEDCL ,
GOVT. OF WEST BENGAL ENTERPRISE

Conducted by
ACES INFOTECH PVT LIMITED
Computer Application on IT
Security,Cyber laws & Its application.
INTRODUCTION TO
CYBERSECURTY

 Why do we need Cyber security


 What is Cyber security
 The CIA Triad
Cybersecurity Protect You From
Hackers And Identity Theft
What do we need Cyber security?

• Protects personal data


• Protects business reputation
• Enhances productivity
• Improves cyber posture
• Help educate the workforce
• Prevents website crashes
• Maintain trust and
credibility
• Better data management
What is Cyber security?

Cyber security is the application of technologies,


processes, and controls to protect systems, networks,
programs, devices and data from cyber attacks
From business to mobile computing, and can be
divided into a few common categories.

• Application security
• Network security
• Information security
Implementing effective cyber security measures is particularly
challenging today because there are more devices than people,
and attackers are becoming more innovative
CIA
THE CIA TRIAD

Confidentiality

Standard measures to establish


confidentiality include:

Data encryption
 Two-factor authentication
 Biometric verification
Security tokens
THE CIA TRIAD

Integrity

Integrity refers to protecting information from being


modified by unauthorized parties.

Standard measures to guarantee integrity include:

 Cryptographic checksums
 Using file permissions
 Uninterrupted power supplies
 Data backups
THE CIA TRIAD

Availability

Availability is making sure that authorized parties are


able to access the information when needed.

Standard measures to guarantee availability include:

 Backing up data to external drives


 Implementing firewalls
 Having backup power supplies
 Data redundancy
THREATS VULNERABILITIE RISK
S

• Software • Business
• Dishonest bugs disruption
employees • Broken • Financial
• Criminals processes losses
• Using The • Ineffective • Loss of
Government controls privacy
s • Hardware • Damage to
• Terrorists flaws reputation
• The press • Business • Loss of
• Competitors change confidence
• Hackers • Legacy • Legal
• Nature system penalties
• Human error • Loss of file
• Inadequate
BCP
Types of Cyber Attacks

A cyber-attack is an exploitation of computer systems and


networks. It uses malicious code to alter computer code,
logic or data and lead to cybercrimes, such as information
and identity theft.

Cyber-attacks can be classified into the following


categories:

1) Web-based attacks
2) System-based attacks
WHO IS DOING THE HACKING?

A Hacker is a person who finds and exploits the weakness


in computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
HACKING

• Financial (theft, fraud, blackmail)


• Political /state (state level/ military)
• Fame/ kudos (fun/ status)
• Hacktivism (cause)
• Pen testers (legal hacking)
• Police
• Insider
• Business
Malware
 Malware is intrusive software that is designed to
damage and destroy computers and computer
systems.

 Malware is a short form of “Malicious


Software.”

 Examples of common malware

viruses, worms, Trojan viruses, spyware, adware,


and ransomware.
COMMON THREATS - RANSOMWARE

• A ransomware attack is defined as a form of malware


attack in which an attacker seizes the user’s data, folders,
or entire device until a ‘ransom’ fee is paid.
• Normally loaded onto a computer via a
download/attachment/link from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your
computer/tablet/phone it is very difficult to remove
without removing all of the data
Best Solutions to Put in Place to Stop Ransomware
Attacks.

•Antivirus and anti-malware. ...

•Backup and file management. ...

•Employee training. ...

•Multi-factor authentication. ...

•Policy of least privilege. ...

•Ransomware detection. ...

•Software updates and patch management. ...

•Strong passwords.
PHISHING
Phishing is an act of sending and email to a user; misleading him to
believe that it is from a frustrate person or organisation.

Phishing is a type of online fraud that involves tricking people into


providing sensitive information, such as passwords or credit card numbers,
by masquerading as a trustworthy source

How to tackle the problem


• Don’t click any links on an email unless you can guarantee who its
from.
• Use a trusted method of contacting the company via a phone number,
app or website.
• Mark the email as spam and contact the organisation.
How to Phishing…..
WHAT TO LOOK OUT FOR WHEN SHOPPING
ON THE INTERNET?
• Ensure you’re on the correct website

• HTTPS and the padlock- The ‘S’


stands for secure, this means you
have a secure connection to the
website. This should prevent a ‘man
in the middle’ attack.

• It encrypts your data and the


receiver will be able to decrypt it but
if it is a fraudulent website they will
still obtain your information.

• Use a credit card/ PayPal when


conducting online transactions.
PUBLIC WI-FI

• May not be trustworthy. They could share your information to other companies
who operate in countries without any data protection.
• You may not know who is watching you whilst you’re online.

Nation Cyber Security Centre (NCSC)

What to do and not do to

• Don’t use online banking. Use your own data.


• Don’t conduct any purchases
• Use a virtual private network (VPN)
PASSWORDS ADVICE

• Use 1 password per account.


• Three random words is the NCSC’s advice. Capitals,
special characters and numbers is your own choic.
• brute force attack.
• Password managers can be helpful to store your passwords.
FIREWALLS

• A Firewall is a network security device that monitors and filters


incoming and outgoing network traffic based on an
organization’s previously established security policies.

• A firewall is essentially the barrier that sits between a private


internal network and the public Internet.

• A firewall’s main purpose is to allow non-threatening traffic in


and to keep dangerous traffic out.
NMAP

• Nmap, short for Network Mapper, is a free and open source


tool used for vulnerability checking, port scanning and, of
course, network mapping.

• It is used to scan IP addresses and ports in a network and


to detect installed applications.

• Nmap allows network admins to find which devices are


running on their network, discover open ports and services,
and detect vulnerabilities.
Step 1: Visit the official website using the URL https://nmap.org/download.html
on any web browser the click on nmap-7.92-setup.exe
Step 2: Now check for the executable file in downloads in your system and
run it.
Step 3: It will
prompt confirmation
to make changes to
your system. Click
on Yes.

Step 4: The next


screen will be of
License Agreement,
click on I Agree.
Step 5: Next screen
is of choosing
components, all
components are
already marked so
don’t change
anything just click
on the Next button.
Step 6: In this step, we choose
the installation location of
Nmap. By default, it uses the C
drive but you can change it into
another drive that will have
sufficient memory space for
installation. It requires 84.3
MB of memory space.
Step 7: After this
installation process
it will take a few
minutes to complete
the installation.
Step 8: Npcap
installation will also occur
with it, the screen of
License Agreement will
appear, click on I Agree.
Step 9: Next screen is
of installation options
don’t change anything
and click on
the Install button.
Step 10: After
this installation
process it will take
a few minutes to
complete the
installation.
Step 11: After
completion of
installation click on
the Next button.
Step 12: Click on
the Finish button to
finish the installation of
Npcap.
CYBER ETHICS

Cyberethics is a branch of computer technology behavior


that defines the best practices that must be adopted by a
user when he uses the computer system.

In simple terms, cyberethics refers to the basic ethics and


etiquette that must be followed while using a computer
system.
What is Cyberspace?

 Cyberspace can be defined as an intricate environment that


involves interactions between people, software, and services. It
is maintained by the worldwide distribution of information
and communication technology devices and networks.
 With the benefits carried by the technological advancements,
the cyberspace today has become a common pool used by
citizens, businesses, critical information infrastructure,
military and governments in a fashion that makes it hard to
induce clear boundaries among these different groups. The
cyberspace is anticipated to become even more complex in the
upcoming years, with the increase in networks and devices
connected to it.
REGULATIONS OF CYBERSPACE
Rules Offence
REGULATIONS Punishment
OF CYBERSPACE
Section 43 Applicable to people who The owner can fully claim
damage the computer systems compensation for the entire
without permission from the damage in such cases.
owner

Section 66A Applicable in case a person is The imprisonment term in


found to dishonestly or such instances can mount up
fraudulently committing any to three years or a fine of up
act referred to in section 43 to Rs. 5 lakh.

Section 66B Incorporates the punishments This term can also be topped
for fraudulently receiving by Rs. 1 lakh fine, depending
stolen communication devices upon the severity.
or computers, which confirms
a probable three years
imprisonment.
REGULATIONS OF CYBERSPACE

Rules Offence Punishment

Section 66D Phishing, i.e., punishment Imprisonment which may


for cheating by personation extend up to 3 years along
by the use of computer’s with a fine that may
resources extend up to rupee 1 lakh.

Section 66E Voyeurism, i.e. punishment Imprisonment for 3 years


for violating privacy of an along with a fine which
individual may be extended up to 2
lakh rupees or both.

Section 66F Cyber Terrorism Life imprisonment


REGULATIONS OF CYBERSPACE

Rules Offence Punishment

Section 67A Publishing/ or Imprisonment up to 5


transmitting material in years along with a fine
electronic form that could extend up to
containing sexually 10 lakh rupees in the
explicit contents first convict; and
imprisonment can be
extended up to 7 years
with fine of 20 lakh
rupees in the second
conviction
ADVICE

• Update and migrate Data


• Create strong password
• Make transaction in secure way
• Clear personal data from web bowser
• Use antivirus
• Activate your firewall
• Staff awareness
• Prepare Plan
YOU ARE THE BEST DEFENCE!

• Technology is only a small part of Cyber Defence


• You are the most important person – protect yourself
• For businesses the most important and best defence is Cyber Security
Aware employees – train your staff

Always be aware!
Always be on your guard!
REPORTING CYBERCRIME

• Online fraud is to be reported to Action Fraud. They’re the national


reporting mechanism for fraud. Via;
www.actionfraud.police.uk
Or 0300 123 2040
• Can be reported 24/7 via the website.
NATION CYBER SECURITY CENTRE (NCSC)

National Cyber Security Centre


https://www.ncsc.gov.uk/
https://www.ncsc.gov.uk/smallbusiness

51

You might also like