0% found this document useful (0 votes)
24 views10 pages

CA1 SouvikPal-compressed

Uploaded by

Souvik Pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views10 pages

CA1 SouvikPal-compressed

Uploaded by

Souvik Pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

NAME : SOUVIK PAL

CLASS ROLL : 60
UNIVERSITY ROLL : 10900121064
PAPER NAME : CYBER SECURITY
PAPER CODE : PEC-CS702E
Cybersecurity is the practice of protecting systems,
networks and programs from digital attacks.

Maintains privacy

Safeguards sensitive data

ensures integrity of information


Phishing: Deceptive
Malware: Viruses, worms.
emails or websites

Ransomware: Blocking access Fauget Attacks: Overwhelming


to data until a ransom is paid systems with traffic

Insider Threats: Employees


misusing access
Firewalls: Blocking unauthorized access Antivirus
Software: Detecting and removing malicious
software Encryption: Securing data in transit and at
rest Multi-Factor Authentication (MFA): Adding an
extra layer of security
Employee Training: Educating staff on security
protocols Access Controls:Restricting access based
on roles Incident Response Plan: Preparing for
potential breaches Regular Audits: Conducting
security assessments
Employee Training: Educating staff on security protocols
Access Controls: Restricting access based on roles Incident
Response Plan: Preparing for potential breaches Regular
Audits: Conducting security assessments
Artificial Intelligence (AI): Using AI for threat detection
Zero Trust Architecture: Never trust, always verify
Blockchain: Enhancing security through decentralized
ledgers IoT Security: Protecting interconnected devices
Example 1: Borcelle ransomware
attack - Overview, impact, and
lessons learned.

Example 2: Studio Shodwe


response to a phishing attack
- Steps taken and outcomes
Advancements: Predictive analytics, quantum
cryptography, and other emerging technologies.
Challenges: Increasing sophistication of cyber
attacks, evolving regulations, and maintaining
security in a connected world.
Opportunities: Growing demand for cybersecurity
professionals, innovation in security solutions, and
collaboration across sectors.

You might also like