0% found this document useful (0 votes)
103 views48 pages

Cyber Security

The document discusses cybersecurity in operating systems. It covers common threats like viruses, worms, trojans and how they infect systems. It also discusses social engineering attacks and security solutions like antivirus software and firewalls. The document provides tips to help secure operating systems.

Uploaded by

Suraj Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views48 pages

Cyber Security

The document discusses cybersecurity in operating systems. It covers common threats like viruses, worms, trojans and how they infect systems. It also discusses social engineering attacks and security solutions like antivirus software and firewalls. The document provides tips to help secure operating systems.

Uploaded by

Suraj Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

CYBERSECURITY

IN OPERATING
SYSTEM
Prepared By :- Suraj Das
Roll No :- 22BCA013
OBJECTIVE
1. Raise awareness about the importance of CYBERSECURITY in operating systems and the
potential risks associated with using an unsecured system.

2. Educate the audience (viewers or students)about the different types of cyber threats that can
target operating systems and the various security features that are commonly built into operating
systems.

3. Provide practical tips and best practices for staying safe and secure when using an operating
system, such as using strong passwords, keeping software up to date, and being cautious when
opening email attachments.

4. Demonstrate the real-world consequences of cyber attacks on operating systems and the need for
strong security measures.

5. Empower the audience to take action and implement the best practices and security measures
discussed in the presentation to protect their own systems and data.
2
ROADMAP
Operating system solution Some Interesting Facts
Introduction About Cyber Security

1 3 5

2 4 6

Common Operating Best Practices For


Conclusion
System Threats Operating system
THE END

3
INTRODUCTION
⬥ Cyber security refers to the practice of protecting computer systems,
networks, and digital information from unauthorized access, theft,
damage, and other cyber threats..

⬥ With an increase amount of people getting connected to Internet, the


security threats that cause massive harm are increasing also.

⬥ Cyber security is becoming increasingly important as our reliance on


technology continues to grow.

4
Common Operating
System Threats
Trojan Horse

Virus Worms

Types Of Malware

Adware
Spyware
6
Virus
⬥ A virus is a malicious code written to damage/harm the host computer by
deleting or appending a file, occupy memory space of the computer by
replicating the copy of the code, slow down the performance of the
computer, format the host machine, etc.

⬥ It can be spread via email attachment, pen drives, digital images, e-greeting,
audio or video clips, etc.

⬥ A virus may be present in a computer but it cannot activate itself without the
human intervention. Until and unless the executable file(.exe) is execute.

7
Worms
⬥ They are a class of virus which can replicate themselves. They are different
from the virus by the fact that they does not require human intervention to
travel over the network and spread from the infected machine to the whole
network.

⬥ Worms can spread either through network, using the loopholes of the
Operating System or via email.

⬥ The replication and spreading of the worm over the network consumes the
network resources like space and bandwidth and force the network to choke.

8
Trojan Horse
⬥ Trojan horse is a malicious code that is installed in the host machine by
pretending to be useful software. The user clicks on the link or download the
file which pretends to be a useful file or software from legitimate source.

⬥ It not only damages the host computer by manipulating the data but also it
creates a backdoor in the host computer so that it could be controlled by a
remote computer.

9
Adware
⬥ It is a special type of malware which is used for
forced advertising. They either redirect the page to
some advertising page or pop-up an additional page
which promotes some product or event.

⬥ These adware are financially supported by the


organizations whose products are advertised.

10
Spyware
⬥ Spyware is a type of malware that is designed to gather information about a
user's activity on their computer or network, often with the intention of
stealing sensitive data such as login credentials or credit card numbers.

⬥ Some spyware is designed to collect information about a user's hardware and


software configuration, which can be used by advertisers to serve targeted
advertisements.

11
Social Engineering Attacks
⬥ Social engineering is the term used for a broad range of malicious
activities accomplished through human interactions.
⬥ It uses psychological manipulation to trick users into making
security mistakes or giving away sensitive information.

12
Types Of Social Engineering Attacks
1. Phishing
2. Pre-texting
3. Baiting
4. Scareware

13
Phising
⬥ Phishing is the most common type of social
engineering attack, typically using spoofed email
addresses and links to trick people into providing
login credentials, credit card numbers, or other
personal information.

14
Be Aware Of Emails And Links

15
Pre-texting
⬥ Pre-texting is a form of social engineering attack
whereby a cybercriminal stage a scenario that baits
victim into providing valuable information that
they wouldn’t otherwise.

16
Be Aware Of Fraud Calls

17
Baiting
⬥ A type of social engineering attack where a
scammer uses a false promise to lure a victim into
a trap which may steal personal and financial
information or inflict the system with malware.
The trap could be in the form of a malicious
attachment with an enticing name.

18
Be Aware Of Using Malware Infected Items

Attacker Have Malware USB ,CD , Offers Free


Infected Items movie/music downloads

The malware is installed Once The item is inserted or


and provides access to the downloaded file is into
computer and networks your computer

19
Scareware
⬥ Scareware is a sort of malware that uses pop-up
advertising and social engineering techniques to
trick web user into thinking they need to buy or
download unnecessary or hazardous software.

20
Be Aware Of Fake Advertising

21

“If it sounds too good to be
true ,it probably is
fraudlent.”

22
Exploits And Vulnerabilities In OS

Exploits are software programs or code that take


advantage of vulnerabilities in operating systems
to gain unauthorized access or control.

Vulnerabilities are weaknesses or flaws in


operating systems that can be exploited by
attackers to compromise the system's security.

23
How Attacker’s Target Vulnerabilities

24
Solution ??

25
Operating System Solutions
Anti-Virus Software
⬥ An antivirus product is a program designed to
detect and remove viruses and other kinds of
malicious software from your computer or laptop.

27
How do antivirus products work?
⬥ Antivirus products work by detecting, quarantining and/or
deleting malicious code, to prevent malware from causing
damage to your device. Modern antivirus products update
themselves automatically, to provide protection against the
latest viruses and other types of malware.

28
What about
Smartphone ??

29
Do I need antivirus products on my
smartphone and tablet?
⬥ No, provided that you only install apps and software from
official stores such as Google Play and the Apple App Store.
You should also set your apps (and the tablet/smartphone
itself) to update automatically.

30
There are many different types of devices and
mechanisms within the security environment to
provide a layered approach of defense.

This is so that if an attacker is able to bypass one layer,


another layer stands in the way to protect the network.
Two of the most popular and significant tools used to secure
networks are Firewalls and Intrusion Detection Systems (IDS)

31
Firewall
⬥ A firewall is a network security device that
monitors traffic to or from your network. It allows
or blocks traffic based on a defined set of security
rules.

32
Intrusion Detection Systems
⬥ A system called an intrusion detection system (IDS) observes
network traffic for malicious transactions and sends
immediate alerts when it is observed. It is software that
checks a network or system for malicious activities or policy
violations.

33
Best Practices For Operating System
Security
Password hygiene and password managers
⬥ A ForgeRock report found attacks involving
passwords increased 450% from 2019 to 2020.

35
Two-factor authentication (2FA)
⬥ Two-factor authentication (2FA) is a specific type of
multi-factor authentication (MFA) that strengthens access
security by requiring two methods (also referred to as
authentication factors) to verify your identity.

36
Web Browsing Security
⬥ Web browsers are a commonly used software application to
access web resources and pages using the Internet. A browser
can also be used to access information provided by web
servers in private networks or files in file systems.

37
6 Best Practices for Secure Browsers

⬥ Keep Browsers Up-to-Date


⬥ Use HTTPS
⬥ Use Unique Passwords
⬥ Disable Auto-Complete for Forms
⬥ Block Pop-ups and Ads
⬥ Limit the Use of Cookies

38
Some Interesting Facts About Cyber Security
FACTS !!
⬥ Human error accounts for 95% of all data breaches

⬥ Every 39 seconds there is a cyber attack(world wide)

⬥ 43% of cyber attacks target small business

⬥ 75% of cyber attacks start with an email

⬥ The Netherlands has the lowest cyber crime rate, whilst Russia has the
highest

40
LET’S MOVE TO INDIA

INDIA

41
42
Value of cyber security market in India from 2018 to 2021,
with estimates until 2023 (in billion U.S. dollars)

43
WORLDWIDE DATA BREACH

44
Number of compromised data records in selected data breaches as of August 2022
(in millions)

45
Conclusion
In conclusion, cyber security is an essential aspect of our modern digital world.
With the ever-increasing reliance on technology and the internet,
the risk of cyber threats such as malware, hacking, and social engineering attacks
has become a pressing concern. It is crucial to be aware of these
threats and take proactive measures to protect ourselves and our organizations
from potential harm.

As technology continues to evolve, the threats and risks will continue to evolve as
well . Therefore, it is important to stay informed and up to date
on the latest cyber security threats and solutions to ensure a safe and secure
digital environment.

47
48

You might also like