0% found this document useful (0 votes)
104 views38 pages

Cyber Security Awareness

Cyber security involves protecting computer systems, networks, and data from unauthorized access and cyber threats. Common cyber threats include denial of service attacks, malware infections, and man-in-the-middle attacks where hackers intercept communications. It is important for organizations to implement strong security measures like encryption, firewalls, and multi-factor authentication to protect against these threats. Physical security, access controls, data security, and user awareness training are also critical parts of a comprehensive cyber security strategy.

Uploaded by

sathesachin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views38 pages

Cyber Security Awareness

Cyber security involves protecting computer systems, networks, and data from unauthorized access and cyber threats. Common cyber threats include denial of service attacks, malware infections, and man-in-the-middle attacks where hackers intercept communications. It is important for organizations to implement strong security measures like encryption, firewalls, and multi-factor authentication to protect against these threats. Physical security, access controls, data security, and user awareness training are also critical parts of a comprehensive cyber security strategy.

Uploaded by

sathesachin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 38

Cyber Security Awareness


Overview
 What is Cyber Security?
 RBI Framework
 Security Layers
 Security Threats
 Security Measures
 Dos and Don'ts
 Conclusion
What is Cyber Security?

 Computer security, cybersecurity or information technology


security is the protection of computer systems and networks from
information disclosure, theft of or damage to their hardware,
software, or electronic data
Security Myths

 Myths -Firewalls make your data secure. Encryption makes


your data secure. Hackers cause most security breaches.
 In fact, 80% of data loss is caused by insiders. In fact,
encryption is only one approach to securing data. Security also
requires access control, data integrity, system availability, and
auditing.
 In fact, 40% of Internet break-ins occur in spite of a firewall
being in place!!!!
Security Triad

Ensuring
that data
can be Ensuring that data is
modified protected from
only by unauthorized access
appropriate
mechanisms

The degree to which authorized


users can access information for
legitimate purposes
Defining the risks , threats and vulnerabilities

- Risk: A possibility that a threat exploits a vulnerability in an asset and causes damage or
loss to the asset

– Threat: Something that can potentially cause damage to the organization, IT Systems or
network.

– Vulnerability: A weakness in the organization, IT Systems, or network that can be


exploited by a threat
Points of Concerns in Banking

 Lack of Cyber Security Awareness


 Weakness in Security Framework
 Weak Physical and logical security
 Unable to explain and answer to queries of Customers.
 Dependency on the vendors
 weak record keeping practices and incident response
mechanism.
 Lack of vigilance
Cyber Security Framework by RBI
Security Layers
Physical Security

 Physical Security is the fundamental layer of security.

 Physical security describes measures that are designed to prevent


unauthorized physical access to data, equipment, resources and
personal and protect the same from physical damage or harm.

 This includes protection from natural and man-made disasters which


includes fires, floods, theft accidents etc.

 Physical Security is often overlooked because of more technical


logical breaches.
Physical Security
Physical Security

 Preventing physical security breach is the prime concern of the administrators.

 Following are the devices that are associated with the Physical Security of the
premises.

1. Boom Barrier

2. CCTV

3. Visitor Management System (VMS)

4. RFID

5. Biometric Scanners

6. Digital Locks
LOGICAL SECURITY
Passwords

 Use Strong Passwords using combination of Uppercase Lower Case


Numerical and Special Characters
 Never use pets name, birthdates, telephone nos, names, dictionary words etc
 Never share a password – don’t store a password on internet or on local
computer
 Good Password – S@{h!n~ -
 Make it something you can visualize. It’s easier to remember that way
 The more personal the better. “mY5orit3$hirt’sR3d” (my favorite shirt is red)
PROTECTING DATA AND ASSETS
–Branches Perspective

• Secure your Documents and DATA


• Restrict USB Access on All Computers at Branches
• Use of Mutli Factor Authentication
• Use Your E mails Securely
• Report Any Unusual Instances to Head Office.
• Use Strong Passwords
• Never Share the Password
• Lock your computer before you leave your Desk
• Update your Antivirus Regularly – In case the Software is not
getting Updated inform IT Department
• Lock your Cabin after leaving premise.
• Keep an Eye on suspicious behavior of others at work.
Symptoms of being infected with a virus !

1. You see unexpected messages or images.


2. You hear unexpected sounds, played at random.
3. Programs start unexpectedly.
4. Your personal firewall tells you that an application has tried to
connect to the Internet (and it’s not a program that you ran).
5. Your friends tell you that they have received e-mail messages from
your address and you haven’t sent them anything.
6. Your computer ‘freezes’ frequently, or programs start running
slowly.
7. You get lots of system error messages.
8. The operating system will not load when you start your computer.
9. You notice that files or folders have been deleted or changed.
10. You notice hard disk access (shown by one of the small flashing
lights) when you’re not aware of any programs running.
11. Your web browser behaves erratically, e.g. you can’t close a browser
window.
Just in case if you are infected…
• Disconnect the infected computer from the Internet.
• Isolate the machine. Nothing comes in nothing goes out.
• Update anti-virus signatures (Don’t use the compromised
machine)
• Start the computer in safe mode and perform extensive scanning
• Use anti-virus program for removing the malicious program.
• If automated removal doesn’t yield result, closely observe the
behavior of your computer.
• Make a note of all the programs which start automatically when
the computer boots up.
• Search for suspicious entries. Delete the registry entries which
correspond to suspicious entries.
• Use tools like curr ports or command like netstat to monitor
opened TCP/IP and UDP ports on the local computer.
• Terminate the processes which seems to be suspicious.
• For damage beyond repair… Reinstall OS and be vigilant !
Types f Attacks

 DoS and DDoS


it is aimed at preventing authorized, legitimate users from accessing services
on the network. A DoS attack can be initiated by sending invalid data to
applications or network services until the server hangs or simply crashes. The
most common form of a DoS attack is TCP attacks.
 A network attacker can increase the enormity of a DoS attack by initiating the
attack against a single network from multiple computers or systems. This type
of attack is known as a distributed denial of service (DDoS) attack. Network
administrators can experience great difficulty in fending off DDoS attacks,
simply because blocking all the attacking computers, can also result in
blocking authorized users.
DDos
DDOS & BOT NET
Face Book DDOS ATTACK BY CHINESE HACKERS
MAN IN THE MIDDLE

 MITM

It occurs when a cracker eavesdrops on a secure communication


session and monitors, captures and controls the data being sent
between the two parties communicating. The attacker attempts to
obtain information so that he/she can impersonate the receiver
and sender.
MITM
Rouge Software
Network Sniffing
Network Intrusion Attacker
Credential Hack Credential Hack
Software Flaw Network Attack
DOS
DDOS
Port Scan and
penetration

Internet Internet

Mobile BankingMobile 4G
Firewall

Attacker Server Server

MPLS MPLS

Man in the Middle Firewall


DLP
Phishing
Vishing
Virus Malware
Trojan
Misconfigured Network
Branch Computer
Wrong Routing Tables
Carrier Side Wire Tapping

Attacker Attacker
SSL- HTTPS

• A PAD LOCK Represents SSL – Secure Socket Layer

• The Technology Ensures that the communication between the webserver and the Client is
Encrypted.
• The Technology Ensures that the website is 100 %Genuine
• The Technology protects the Confidential Data entered by the consumer , even the internet
service provider does not know about it.
• Its Save and protects from Man in the Middle.
User Frauds

Phishing
Phishing Sites
Identity Theft
Shoulder Surfing
Identity Stealing
Online Frauds
Nigerian Frauds
Online Lottery
Employment Frauds
Online Data Entry Frauds
Internet Frauds
Credit Card /Debit Card Frauds
Document Forgery
Phishing

What is Phishing ?
the fraudulent practice of sending emails ostensibly from a known or trusted
sender in order to induce targeted individuals to reveal
confidential information.

Types of Phishing
•Spear Phishing.
•Whaling.
•Vishing.
•Email Phishing.
Phishing
Phishing
INSIDER ATTACK
PREVENT INSIDER ATTACK

• STAY VIGILANT
• Give Access permissions on Need to do and need to Know Basis
• Ensure Antivirus, EDR on each end point.
• Secure physical security of documents, and other valuable things.
Social Engineering Do’s and Don’ts
Security Measures

 Security Awareness

 Encryption

 Strong Passwords

 Up to date Antivirus

 Next Gen Firewall / UTM

 Mobile Device Management

 Network Monitoring

 Policy Framework
Encryption

Cryptography
The field of study related to encoded information (comes from
Greek word for "secret writing")
Encryption
The process of converting plaintext into cipher text
Decryption
The process of converting cipher text into plaintext
Encryption
Digital Signature
Policy Framework

 Policy frame work ensures the integrity and


security with in the organization
 Frameworks such as ISO 27001, BSI,
PCIDSS,PADSS etc. ensure and standardize
security practices.
 It reduces the chances of loopholes in the
infrastructure.
 Policy and Procedures helps the organization to
mitigate with the security threats.
Conclusion

 Conduct Security Awareness Programs, Educate Employees.

 Secure the premises

 Deploy Antivirus software

 Deploy Firewall/UTM

 Deploy Network Monitoring Tools

 Deploy Security Frame Work

 Secure Identity and Personal Information.

 Get the It systems audited for extra loopholes and vulnerabilities.

You might also like