7
Most read
12
Most read
CYBERTHREATS AND
ATTACKS
CONTENTS
• Overview
• History
• Types of Cyberthreats
• Prevention and Cyber Security
• Conclusion
OVERVIEW
• "Cyberthreats is a rapidly expanding subset of crime. According to Interpol, an
increasing number of criminals are taking use of the Internet's convenience, speed,
and anonymity to conduct a wide variety of crimes that have no physical or virtual
borders.”
• Threats are actions taken by somebody with malicious intent in order to steal data,
harm computing systems, or otherwise cause disruption. Malware, social
engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and
injection attacks are examples of common kinds of cyberthreats.
HISTORY
• Cyberthreat truly started to take off in the early
2000s as social media started to take off. The rush of
people filling up profile databases with as much
information as they could led to a torrent of personal
data and an increase in ID theft. The data was
utilized in a number of ways by thieves to access
bank accounts, create credit cards, and commit
other types of financial theft.
• The creation of an annual worldwide criminal
operation worth about $500 billion is the new wave.
These criminals target anything and everyone with a
digital presence, operate in groups, and employ
tried-and-true strategies.
The first spam email was sent in
1978, the first cyberthreat was first
noted in 1820, and the first
malware was loaded on an Apple
computer in 1982.
DEVICES THAT ARE PORTABLE, WIRELESS, AND
HAND-HELD
1. Portable Computer: This all-purpose computer can be transported around easily, but it
cannot be used while moving because it typically needs some "setting-up" and an AC power
source.
2. Tablet PC: This computer doesn't have a keyboard, resembles a slate or paper notebook,
and has touch-screen capabilities with a stylus and handwriting recognition software.
3. Internet Tablet: Unlike a Tablet PC, the Internet tablet has a smaller selection of
applications and less processing capability.
4. Personal Digital Assistant (PDA): It provides access to contacts, an address book, notes,
email, and other capabilities and is designed to complement and synchronise with a desktop
computer.
MOBILE/CELL PHONE ATTACKS
Theft of mobile phones has increased significantly
during the past few years.
Mobile viruses are similar to computer viruses in that
they target the data or programs/applications that are
installed on mobile phones.
Vishing: Vishing is typically used to obtain credit card
numbers or other similar information from people for
use in ID theft operations.
Bluetooth hacking: Bluetooth is a short-range wireless
communication service and technology that operates in
the 2.4-GHz frequency band.
TYPES OF CYBERTHREATS
• Cyber risks are constantly evolving. Attack strategies and tactics are
constantly evolving and getting better. Cybercriminals can enter a computer
or network server in a number of ways to harm it. Another name for this is
an attack vector.
• Accessing a computer or network frequently involves:
1. Removable storage devices like flash drives
2. Web or email attacks
3. A brute force attack employing trial-and-error to decipher encrypted data
4. Unauthorized use of system privileges belonging to your company
5. Theft or loss of gadgets that carry sensitive information
Types of cyber threats your institution should be aware of include:
Malware
Ransomware
Distributed denial of service (DDoS) attacks
Spam and Phishing
Corporate Account Takeover (CATO)
Automated Teller Machine (ATM) Cash Out
MALWARE :
Malware also goes by the names malicious software or malicious code. A software called
malware is added to a system to jeopardies the availability, confidentiality, or integrity of data.
It can have an impact on your data, apps, or operating system and is done covertly. One of the
biggest external threats to systems today is malware. Malware involves significant effort from
most businesses and has the potential to cause extensive harm and disruption.
RANSOMWARE:
Malware-based ransomware restricts or prohibits users from accessing their systems.
Ransomware demands that you use online payment methods to pay a ransom in
order to recover access to your system or your data. Virtual currencies like bitcoins
are frequently used in online payment systems. One of the most popular attack types
is ransomware.
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
DDoS attacks disable an online service by saturating it with a lot of traffic from many places
and sources. During a DDoS attack, a website's response time slows down, blocking access. By
installing malware, cybercriminals create massive networks of compromised machines known
as Botnets. It's possible that a DDoS assault is not the main cybercrime. The attacks frequently
serve as a diversion while other fraud and cyber breach attempts are made.
Corporate Account Takeover (CATO)
CATO is a type of business entity theft in which online criminals send fraudulent wire and ACH
transfers while posing as the company. Unauthorized monies are transferred to accounts
under the cybercriminal's control.
Automated Teller Machine (ATM) Cash Out
ATM Cash Out is a type of large dollar value ATM fraud. Cash-outs involve simultaneous large
cash withdrawals from several ATMs in many regions. It may also include large withdrawals at
one ATM.
SPAM AND PHISING
Unwanted, uninvited, or unpleasant emails and texts are considered spam. Phishing, which
includes attempts to get sensitive information, is a type of social engineering. Phishing
attempts will look to be coming from a reliable individual or company.
Cybercriminals send you an email or text message with a warning about your account
information while posing as an official representative. Frequently, the message may request a
response by clicking a link to a phoney website or email address, where you will provide
sensitive data. Using official names and logos, the message's format will often appear
legitimate. Any data placed into the phoney link is sent to the online criminal.
PREVENTION AND CYBER SECURITY
• Firewalls
• Operating system is up‐to‐date
• Up‐to‐date anti‐virus and anti‐ spyware
• Use a pop‐up advertising blocker
• Use strong passwords
• Secure wireless network
• Reputable websites and mobile applications
• Avoid clicking on unexpected or unfamiliar links
• Use a Virtual Private Network (VPN)
• Manage Social Media Setting
• Educate children about proper internet usage.
CONCLUSION
One of the most crucial elements of the rapidly expanding digital world is
cyber security. It is essential to learn how to defend against its threats and
impart that knowledge to others because they are difficult to refute. The best
way to lower the danger of a data leak is through prevention. Individuals and
organizations may thwart hackers and protect their data by investing in cyber
security software, utilizing a VPN, and being informed of typical attack
techniques.
Thank you

More Related Content

PPTX
cyber threats introduction and cyber threats types
PPTX
Cybercrime
PPTX
Cyber crime
PPTX
Cyper crime
PPTX
Cyber crime
PPTX
Cyber Crime and Security
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PDF
Different Types Of Cyber Security Threats
cyber threats introduction and cyber threats types
Cybercrime
Cyber crime
Cyper crime
Cyber crime
Cyber Crime and Security
ccs12-18022310494mghmgmyy3 (1).pdf
Different Types Of Cyber Security Threats

Similar to cyber threats and attacks.pptx (20)

PPTX
Kinds of cybercrime (Social Networking for Social integration .pptx
PPTX
Introduction Of Cyber Security in 2024.pptx
PPTX
Cybersecurity2021
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PPTX
Cyber security
PPTX
Name parul
PPTX
Name parul
PPTX
Cyber security ppt final
PPT
cyber terrorism
PPT
cyber terrorism
PPTX
Cyber crime and security 1
PPTX
Cyber crime & security
PPTX
Rishabhcyber security.pptx
PDF
Cyber Security
PPT
CYBER CRIME AND SECURITY
PPTX
Cybercrime
PPTX
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
PDF
ppt pdf ajay.pdf
PPTX
cyber security
PPTX
Cyber crimes
Kinds of cybercrime (Social Networking for Social integration .pptx
Introduction Of Cyber Security in 2024.pptx
Cybersecurity2021
Top 5 Cybersecurity Threats in Retail Industry
Cyber security
Name parul
Name parul
Cyber security ppt final
cyber terrorism
cyber terrorism
Cyber crime and security 1
Cyber crime & security
Rishabhcyber security.pptx
Cyber Security
CYBER CRIME AND SECURITY
Cybercrime
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
ppt pdf ajay.pdf
cyber security
Cyber crimes
Ad

Recently uploaded (20)

PPTX
chapter 1.pptx dotnet technology introduction
PDF
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
PDF
Mechanics of materials week 2 rajeshwari
PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PPTX
Solar energy pdf of gitam songa hemant k
PDF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
PDF
Cryptography and Network Security-Module-I.pdf
PDF
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
PPT
Programmable Logic Controller PLC and Industrial Automation
PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
PDF
IAE-V2500 Engine Airbus Family A319/320
DOCX
An investigation of the use of recycled crumb rubber as a partial replacement...
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PDF
Research on ultrasonic sensor for TTU.pdf
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PDF
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
chapter 1.pptx dotnet technology introduction
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
Mechanics of materials week 2 rajeshwari
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
Solar energy pdf of gitam songa hemant k
Project_Mgmt_Institute_-Marc Marc Marc .pdf
Cryptography and Network Security-Module-I.pdf
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
Programmable Logic Controller PLC and Industrial Automation
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
IAE-V2500 Engine Airbus Family A319/320
An investigation of the use of recycled crumb rubber as a partial replacement...
Principles of operation, construction, theory, advantages and disadvantages, ...
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
Research on ultrasonic sensor for TTU.pdf
Agentic Artificial Intelligence (Agentic AI).pptx
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
Design ,Art Across Digital Realities and eXtended Reality
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
Ad

cyber threats and attacks.pptx

  • 2. CONTENTS • Overview • History • Types of Cyberthreats • Prevention and Cyber Security • Conclusion
  • 3. OVERVIEW • "Cyberthreats is a rapidly expanding subset of crime. According to Interpol, an increasing number of criminals are taking use of the Internet's convenience, speed, and anonymity to conduct a wide variety of crimes that have no physical or virtual borders.” • Threats are actions taken by somebody with malicious intent in order to steal data, harm computing systems, or otherwise cause disruption. Malware, social engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and injection attacks are examples of common kinds of cyberthreats.
  • 4. HISTORY • Cyberthreat truly started to take off in the early 2000s as social media started to take off. The rush of people filling up profile databases with as much information as they could led to a torrent of personal data and an increase in ID theft. The data was utilized in a number of ways by thieves to access bank accounts, create credit cards, and commit other types of financial theft. • The creation of an annual worldwide criminal operation worth about $500 billion is the new wave. These criminals target anything and everyone with a digital presence, operate in groups, and employ tried-and-true strategies. The first spam email was sent in 1978, the first cyberthreat was first noted in 1820, and the first malware was loaded on an Apple computer in 1982.
  • 5. DEVICES THAT ARE PORTABLE, WIRELESS, AND HAND-HELD 1. Portable Computer: This all-purpose computer can be transported around easily, but it cannot be used while moving because it typically needs some "setting-up" and an AC power source. 2. Tablet PC: This computer doesn't have a keyboard, resembles a slate or paper notebook, and has touch-screen capabilities with a stylus and handwriting recognition software. 3. Internet Tablet: Unlike a Tablet PC, the Internet tablet has a smaller selection of applications and less processing capability. 4. Personal Digital Assistant (PDA): It provides access to contacts, an address book, notes, email, and other capabilities and is designed to complement and synchronise with a desktop computer.
  • 6. MOBILE/CELL PHONE ATTACKS Theft of mobile phones has increased significantly during the past few years. Mobile viruses are similar to computer viruses in that they target the data or programs/applications that are installed on mobile phones. Vishing: Vishing is typically used to obtain credit card numbers or other similar information from people for use in ID theft operations. Bluetooth hacking: Bluetooth is a short-range wireless communication service and technology that operates in the 2.4-GHz frequency band.
  • 7. TYPES OF CYBERTHREATS • Cyber risks are constantly evolving. Attack strategies and tactics are constantly evolving and getting better. Cybercriminals can enter a computer or network server in a number of ways to harm it. Another name for this is an attack vector. • Accessing a computer or network frequently involves: 1. Removable storage devices like flash drives 2. Web or email attacks 3. A brute force attack employing trial-and-error to decipher encrypted data 4. Unauthorized use of system privileges belonging to your company 5. Theft or loss of gadgets that carry sensitive information
  • 8. Types of cyber threats your institution should be aware of include: Malware Ransomware Distributed denial of service (DDoS) attacks Spam and Phishing Corporate Account Takeover (CATO) Automated Teller Machine (ATM) Cash Out
  • 9. MALWARE : Malware also goes by the names malicious software or malicious code. A software called malware is added to a system to jeopardies the availability, confidentiality, or integrity of data. It can have an impact on your data, apps, or operating system and is done covertly. One of the biggest external threats to systems today is malware. Malware involves significant effort from most businesses and has the potential to cause extensive harm and disruption. RANSOMWARE: Malware-based ransomware restricts or prohibits users from accessing their systems. Ransomware demands that you use online payment methods to pay a ransom in order to recover access to your system or your data. Virtual currencies like bitcoins are frequently used in online payment systems. One of the most popular attack types is ransomware.
  • 10. DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DDoS attacks disable an online service by saturating it with a lot of traffic from many places and sources. During a DDoS attack, a website's response time slows down, blocking access. By installing malware, cybercriminals create massive networks of compromised machines known as Botnets. It's possible that a DDoS assault is not the main cybercrime. The attacks frequently serve as a diversion while other fraud and cyber breach attempts are made. Corporate Account Takeover (CATO) CATO is a type of business entity theft in which online criminals send fraudulent wire and ACH transfers while posing as the company. Unauthorized monies are transferred to accounts under the cybercriminal's control. Automated Teller Machine (ATM) Cash Out ATM Cash Out is a type of large dollar value ATM fraud. Cash-outs involve simultaneous large cash withdrawals from several ATMs in many regions. It may also include large withdrawals at one ATM.
  • 11. SPAM AND PHISING Unwanted, uninvited, or unpleasant emails and texts are considered spam. Phishing, which includes attempts to get sensitive information, is a type of social engineering. Phishing attempts will look to be coming from a reliable individual or company. Cybercriminals send you an email or text message with a warning about your account information while posing as an official representative. Frequently, the message may request a response by clicking a link to a phoney website or email address, where you will provide sensitive data. Using official names and logos, the message's format will often appear legitimate. Any data placed into the phoney link is sent to the online criminal.
  • 12. PREVENTION AND CYBER SECURITY • Firewalls • Operating system is up‐to‐date • Up‐to‐date anti‐virus and anti‐ spyware • Use a pop‐up advertising blocker • Use strong passwords • Secure wireless network • Reputable websites and mobile applications • Avoid clicking on unexpected or unfamiliar links • Use a Virtual Private Network (VPN) • Manage Social Media Setting • Educate children about proper internet usage.
  • 13. CONCLUSION One of the most crucial elements of the rapidly expanding digital world is cyber security. It is essential to learn how to defend against its threats and impart that knowledge to others because they are difficult to refute. The best way to lower the danger of a data leak is through prevention. Individuals and organizations may thwart hackers and protect their data by investing in cyber security software, utilizing a VPN, and being informed of typical attack techniques. Thank you