0% found this document useful (0 votes)
19 views3 pages

Cyber Security

Uploaded by

inigocampbel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

Cyber Security

Uploaded by

inigocampbel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Cyber security Management


Cyber security management refers to an organization's strategic efforts to safeguard information
resources. It focuses on the ways businesses leverage their security assets, including software and IT
security solutions, to safeguard business systems.

2. Cyber security management design


Designing with security in mind means applying concepts and using techniques which make it harder
for attackers to compromise your data or systems.

3. Cyber security frameworks


Cyber security frameworks are sets of documents describing guidelines, standards, and best practices
designed for cyber security risk management. The frameworks exist to reduce an organization's
exposure to weaknesses and vulnerabilities that hackers and other cyber criminals may exploit.

4. SQL injection Anatomy


SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for
backend database manipulation to access information that was not intended to be displayed. This
information may include any number of items, including sensitive company data, user lists or private
customer details.

5. Cross-site scripting
Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to
compromise the interactions that users have with a vulnerable application. It allows an attacker to
circumvent the same origin policy, which is designed to segregate different websites from each other.

6. Types of Attacks
1. Malware. Cyber attackers use harmful software such as spyware, viruses, ransom ware, and worms
known as malware to access your system's data.
2. Phishing.
3. Spoofing.
4. Backdoor Trojan.
5. Ransom ware.
6. Password attacks.
7. Internet of Things attack.
8. Crypto jacking.

Click the icon to learn more about the cyber-attacks around the
world…………………….
7. Reason for the commission of cybercrimes
 Money
Cybercriminals may hack into banks and financial institutions to make money. They may also use cyber
extortion, such as ransom ware attacks, to extort money from their victims.

 Access to sensitive data


Hackers may target systems to gain access to sensitive data, such as bank details and home addresses.

 Socio-political purposes
Cybercriminals may hack websites to spread messages for a socio-political purpose.

 National security
Cybercriminals may attack a nation's important assets or sovereignty to upset the government and citizens.
This is known as cyber terrorism.

 Fraud
Cybercriminals may commit online payment fraud, such as non-payment, non-delivery, advance fee, and
misrepresentation.

8. Dangerous cyber security myths


1. Cyber attackers do not target small and medium-sized companies
2. Strong passwords are enough to prevent a data breach
3. Only certain industries are vulnerable to cyber attacks
4. Cyber threats come from outside
5. Data breaches should be handled first by IT teams and lawyers, and other key teams in the company
should be notified later
6. Anti-virus and anti-malware software is enough to keep us safe
7. We have implemented full cyber security, everything is ok

9. What is a network security protocol?


Network protocols are a set of rules outlining how connected devices communicate across a network to
exchange information easily and safely. Protocols serve as a common language for devices to enable
communication irrespective of differences in software, hardware, or internal processes. Examples of cyber
security protocols include SSL/TLS, IPsec, SSH, and Zero Trust. These protocols are vital for securing digital
communications, protecting data integrity, and ensuring privacy.
10.Some network security best practices for businesses:

 Firewalls: Prevent cyber-attacks and information theft with firewalls.

 Strong passwords: Use strong passwords that are at least eight characters long and include a mix of
upper- and lower-case letters, numbers, and symbols. Change passwords regularly.

 Data backups: Back up data regularly and store backups securely, both on and off-site.

 Encryption: Use encryption to keep data secure, even if there is unauthorized access.

 Multi-factor authentication: Use multi-factor authentication for transactions to protect customers


and your business from fraud.

 Antivirus software: Install and keep up-to-date antivirus software on all company devices to protect
against malware and other online threats.

 Software updates: Keep software up to date to reduce the risk of cyberattacks.

 Network security checklist: Use a network security checklist to ensure everything is secure.

 Educate employees: Educate employees about network security and social engineering attacks.

 Network infrastructure audit: Perform regular network infrastructure audits.

 Data loss prevention: Create a data loss prevention strategy.

 Identity Access Management (IAM): Use IAM to manage user privileges.

 Secure email: Consider using secure email

You might also like