NAME : SOUVIK PAL
CLASS ROLL : 60
UNIVERSITY ROLL : 10900121064
PAPER NAME : CYBER SECURITY
PAPER CODE : PEC-CS702E
Cybersecurity is the practice of protecting systems,
networks and programs from digital attacks.
Maintains privacy
Safeguards sensitive data
ensures integrity of information
Phishing: Deceptive
Malware: Viruses, worms.
emails or websites
Ransomware: Blocking access Fauget Attacks: Overwhelming
to data until a ransom is paid systems with traffic
Insider Threats: Employees
misusing access
Firewalls: Blocking unauthorized access Antivirus
Software: Detecting and removing malicious
software Encryption: Securing data in transit and at
rest Multi-Factor Authentication (MFA): Adding an
extra layer of security
Employee Training: Educating staff on security
protocols Access Controls:Restricting access based
on roles Incident Response Plan: Preparing for
potential breaches Regular Audits: Conducting
security assessments
Employee Training: Educating staff on security protocols
Access Controls: Restricting access based on roles Incident
Response Plan: Preparing for potential breaches Regular
Audits: Conducting security assessments
Artificial Intelligence (AI): Using AI for threat detection
Zero Trust Architecture: Never trust, always verify
Blockchain: Enhancing security through decentralized
ledgers IoT Security: Protecting interconnected devices
Example 1: Borcelle ransomware
attack - Overview, impact, and
lessons learned.
Example 2: Studio Shodwe
response to a phishing attack
- Steps taken and outcomes
Advancements: Predictive analytics, quantum
cryptography, and other emerging technologies.
Challenges: Increasing sophistication of cyber
attacks, evolving regulations, and maintaining
security in a connected world.
Opportunities: Growing demand for cybersecurity
professionals, innovation in security solutions, and
collaboration across sectors.