7
Most read
12
Most read
CYBERTHREATS AND
ATTACKS
CONTENTS
• Overview
• History
• Types of Cyberthreats
• Prevention and Cyber Security
• Conclusion
OVERVIEW
• "Cyberthreats is a rapidly expanding subset of crime. According to Interpol, an
increasing number of criminals are taking use of the Internet's convenience, speed,
and anonymity to conduct a wide variety of crimes that have no physical or virtual
borders.”
• Threats are actions taken by somebody with malicious intent in order to steal data,
harm computing systems, or otherwise cause disruption. Malware, social
engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and
injection attacks are examples of common kinds of cyberthreats.
HISTORY
• Cyberthreat truly started to take off in the early
2000s as social media started to take off. The rush of
people filling up profile databases with as much
information as they could led to a torrent of personal
data and an increase in ID theft. The data was
utilized in a number of ways by thieves to access
bank accounts, create credit cards, and commit
other types of financial theft.
• The creation of an annual worldwide criminal
operation worth about $500 billion is the new wave.
These criminals target anything and everyone with a
digital presence, operate in groups, and employ
tried-and-true strategies.
The first spam email was sent in
1978, the first cyberthreat was first
noted in 1820, and the first
malware was loaded on an Apple
computer in 1982.
DEVICES THAT ARE PORTABLE, WIRELESS, AND
HAND-HELD
1. Portable Computer: This all-purpose computer can be transported around easily, but it
cannot be used while moving because it typically needs some "setting-up" and an AC power
source.
2. Tablet PC: This computer doesn't have a keyboard, resembles a slate or paper notebook,
and has touch-screen capabilities with a stylus and handwriting recognition software.
3. Internet Tablet: Unlike a Tablet PC, the Internet tablet has a smaller selection of
applications and less processing capability.
4. Personal Digital Assistant (PDA): It provides access to contacts, an address book, notes,
email, and other capabilities and is designed to complement and synchronise with a desktop
computer.
MOBILE/CELL PHONE ATTACKS
Theft of mobile phones has increased significantly
during the past few years.
Mobile viruses are similar to computer viruses in that
they target the data or programs/applications that are
installed on mobile phones.
Vishing: Vishing is typically used to obtain credit card
numbers or other similar information from people for
use in ID theft operations.
Bluetooth hacking: Bluetooth is a short-range wireless
communication service and technology that operates in
the 2.4-GHz frequency band.
TYPES OF CYBERTHREATS
• Cyber risks are constantly evolving. Attack strategies and tactics are
constantly evolving and getting better. Cybercriminals can enter a computer
or network server in a number of ways to harm it. Another name for this is
an attack vector.
• Accessing a computer or network frequently involves:
1. Removable storage devices like flash drives
2. Web or email attacks
3. A brute force attack employing trial-and-error to decipher encrypted data
4. Unauthorized use of system privileges belonging to your company
5. Theft or loss of gadgets that carry sensitive information
Types of cyber threats your institution should be aware of include:
Malware
Ransomware
Distributed denial of service (DDoS) attacks
Spam and Phishing
Corporate Account Takeover (CATO)
Automated Teller Machine (ATM) Cash Out
MALWARE :
Malware also goes by the names malicious software or malicious code. A software called
malware is added to a system to jeopardies the availability, confidentiality, or integrity of data.
It can have an impact on your data, apps, or operating system and is done covertly. One of the
biggest external threats to systems today is malware. Malware involves significant effort from
most businesses and has the potential to cause extensive harm and disruption.
RANSOMWARE:
Malware-based ransomware restricts or prohibits users from accessing their systems.
Ransomware demands that you use online payment methods to pay a ransom in
order to recover access to your system or your data. Virtual currencies like bitcoins
are frequently used in online payment systems. One of the most popular attack types
is ransomware.
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
DDoS attacks disable an online service by saturating it with a lot of traffic from many places
and sources. During a DDoS attack, a website's response time slows down, blocking access. By
installing malware, cybercriminals create massive networks of compromised machines known
as Botnets. It's possible that a DDoS assault is not the main cybercrime. The attacks frequently
serve as a diversion while other fraud and cyber breach attempts are made.
Corporate Account Takeover (CATO)
CATO is a type of business entity theft in which online criminals send fraudulent wire and ACH
transfers while posing as the company. Unauthorized monies are transferred to accounts
under the cybercriminal's control.
Automated Teller Machine (ATM) Cash Out
ATM Cash Out is a type of large dollar value ATM fraud. Cash-outs involve simultaneous large
cash withdrawals from several ATMs in many regions. It may also include large withdrawals at
one ATM.
SPAM AND PHISING
Unwanted, uninvited, or unpleasant emails and texts are considered spam. Phishing, which
includes attempts to get sensitive information, is a type of social engineering. Phishing
attempts will look to be coming from a reliable individual or company.
Cybercriminals send you an email or text message with a warning about your account
information while posing as an official representative. Frequently, the message may request a
response by clicking a link to a phoney website or email address, where you will provide
sensitive data. Using official names and logos, the message's format will often appear
legitimate. Any data placed into the phoney link is sent to the online criminal.
PREVENTION AND CYBER SECURITY
• Firewalls
• Operating system is up‐to‐date
• Up‐to‐date anti‐virus and anti‐ spyware
• Use a pop‐up advertising blocker
• Use strong passwords
• Secure wireless network
• Reputable websites and mobile applications
• Avoid clicking on unexpected or unfamiliar links
• Use a Virtual Private Network (VPN)
• Manage Social Media Setting
• Educate children about proper internet usage.
CONCLUSION
One of the most crucial elements of the rapidly expanding digital world is
cyber security. It is essential to learn how to defend against its threats and
impart that knowledge to others because they are difficult to refute. The best
way to lower the danger of a data leak is through prevention. Individuals and
organizations may thwart hackers and protect their data by investing in cyber
security software, utilizing a VPN, and being informed of typical attack
techniques.
Thank you

More Related Content

PPTX
Cyber Security PPT.pptx
PPTX
cyber threats introduction and cyber threats types
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
PPTX
basics of hacking- threat basics, types of attack
PPTX
Cyber Security PPT.pptx
PDF
SAMPLE ATTACKS PRESENTATION.pdf
PPTX
Cyber Security PPT.pptx
PPTX
Cyber Security PPT.pptx
Cyber Security PPT.pptx
cyber threats introduction and cyber threats types
hgfhvgggggggggggggggggggggggpresent.pptx
basics of hacking- threat basics, types of attack
Cyber Security PPT.pptx
SAMPLE ATTACKS PRESENTATION.pdf
Cyber Security PPT.pptx
Cyber Security PPT.pptx

Similar to cyber threats and attacks.pptx (20)

PPTX
Cyber Security PPT.pptx
PDF
Cyber Security
PPTX
Cysec.pptx
PPTX
Cybersecurity Explained: From Viruses to Ethical Hacking
PPTX
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
PDF
C018131821
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
CyberSecurity and Importance of cybersecurity
PDF
cyber security
PPTX
cyber security
PPTX
What is Cyber & information security.pptx
DOCX
THESIS-2(2)
PPTX
Cyberattacks.pptx
PDF
Guarding the Digital Fortress.pdf
PDF
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
PPTX
Crimes in digital marketing..pptx
PPTX
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
PPTX
Cysecc.pptx
PPTX
Training on Cyber Security & Awareness for employees
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Cyber Security PPT.pptx
Cyber Security
Cysec.pptx
Cybersecurity Explained: From Viruses to Ethical Hacking
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
C018131821
Cyber security.pptxelectronic systems, networks, and data from malicious
CyberSecurity and Importance of cybersecurity
cyber security
cyber security
What is Cyber & information security.pptx
THESIS-2(2)
Cyberattacks.pptx
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Crimes in digital marketing..pptx
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
Cysecc.pptx
Training on Cyber Security & Awareness for employees
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Ad

Recently uploaded (20)

PPTX
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PPTX
Unit IILATHEACCESSORSANDATTACHMENTS.pptx
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
PDF
25AF1191PC303 MODULE-1 CHAIN SURVEYING SEMESTER III SURVEYING
PDF
PhD defense presentation in field of Computer Science
PPTX
Research Writing, Mechanical Engineering
PDF
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
PPTX
IOP Unit 1.pptx for btech 1st year students
PPTX
quantum theory on the next future in.pptx
PDF
SURVEYING BRIDGING DBATU LONERE 2025 SYLLABUS
PDF
The Journal of Finance - July 1993 - JENSEN - The Modern Industrial Revolutio...
PPTX
Unit I - Mechatronics.pptx presentation
PPTX
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
PDF
CBCN cam bien cong nghiep bach khoa da năng
PPT
UNIT-I Machine Learning Essentials for 2nd years
PDF
V2500 Owner and Operatore Guide for Airbus
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPTX
Hardware, SLAM tracking,Privacy and AR Cloud Data.
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
Unit IILATHEACCESSORSANDATTACHMENTS.pptx
Design ,Art Across Digital Realities and eXtended Reality
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
25AF1191PC303 MODULE-1 CHAIN SURVEYING SEMESTER III SURVEYING
PhD defense presentation in field of Computer Science
Research Writing, Mechanical Engineering
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
IOP Unit 1.pptx for btech 1st year students
quantum theory on the next future in.pptx
SURVEYING BRIDGING DBATU LONERE 2025 SYLLABUS
The Journal of Finance - July 1993 - JENSEN - The Modern Industrial Revolutio...
Unit I - Mechatronics.pptx presentation
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
CBCN cam bien cong nghiep bach khoa da năng
UNIT-I Machine Learning Essentials for 2nd years
V2500 Owner and Operatore Guide for Airbus
Software-Development-Life-Cycle-SDLC.pptx
Hardware, SLAM tracking,Privacy and AR Cloud Data.
Ad

cyber threats and attacks.pptx

  • 2. CONTENTS • Overview • History • Types of Cyberthreats • Prevention and Cyber Security • Conclusion
  • 3. OVERVIEW • "Cyberthreats is a rapidly expanding subset of crime. According to Interpol, an increasing number of criminals are taking use of the Internet's convenience, speed, and anonymity to conduct a wide variety of crimes that have no physical or virtual borders.” • Threats are actions taken by somebody with malicious intent in order to steal data, harm computing systems, or otherwise cause disruption. Malware, social engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and injection attacks are examples of common kinds of cyberthreats.
  • 4. HISTORY • Cyberthreat truly started to take off in the early 2000s as social media started to take off. The rush of people filling up profile databases with as much information as they could led to a torrent of personal data and an increase in ID theft. The data was utilized in a number of ways by thieves to access bank accounts, create credit cards, and commit other types of financial theft. • The creation of an annual worldwide criminal operation worth about $500 billion is the new wave. These criminals target anything and everyone with a digital presence, operate in groups, and employ tried-and-true strategies. The first spam email was sent in 1978, the first cyberthreat was first noted in 1820, and the first malware was loaded on an Apple computer in 1982.
  • 5. DEVICES THAT ARE PORTABLE, WIRELESS, AND HAND-HELD 1. Portable Computer: This all-purpose computer can be transported around easily, but it cannot be used while moving because it typically needs some "setting-up" and an AC power source. 2. Tablet PC: This computer doesn't have a keyboard, resembles a slate or paper notebook, and has touch-screen capabilities with a stylus and handwriting recognition software. 3. Internet Tablet: Unlike a Tablet PC, the Internet tablet has a smaller selection of applications and less processing capability. 4. Personal Digital Assistant (PDA): It provides access to contacts, an address book, notes, email, and other capabilities and is designed to complement and synchronise with a desktop computer.
  • 6. MOBILE/CELL PHONE ATTACKS Theft of mobile phones has increased significantly during the past few years. Mobile viruses are similar to computer viruses in that they target the data or programs/applications that are installed on mobile phones. Vishing: Vishing is typically used to obtain credit card numbers or other similar information from people for use in ID theft operations. Bluetooth hacking: Bluetooth is a short-range wireless communication service and technology that operates in the 2.4-GHz frequency band.
  • 7. TYPES OF CYBERTHREATS • Cyber risks are constantly evolving. Attack strategies and tactics are constantly evolving and getting better. Cybercriminals can enter a computer or network server in a number of ways to harm it. Another name for this is an attack vector. • Accessing a computer or network frequently involves: 1. Removable storage devices like flash drives 2. Web or email attacks 3. A brute force attack employing trial-and-error to decipher encrypted data 4. Unauthorized use of system privileges belonging to your company 5. Theft or loss of gadgets that carry sensitive information
  • 8. Types of cyber threats your institution should be aware of include: Malware Ransomware Distributed denial of service (DDoS) attacks Spam and Phishing Corporate Account Takeover (CATO) Automated Teller Machine (ATM) Cash Out
  • 9. MALWARE : Malware also goes by the names malicious software or malicious code. A software called malware is added to a system to jeopardies the availability, confidentiality, or integrity of data. It can have an impact on your data, apps, or operating system and is done covertly. One of the biggest external threats to systems today is malware. Malware involves significant effort from most businesses and has the potential to cause extensive harm and disruption. RANSOMWARE: Malware-based ransomware restricts or prohibits users from accessing their systems. Ransomware demands that you use online payment methods to pay a ransom in order to recover access to your system or your data. Virtual currencies like bitcoins are frequently used in online payment systems. One of the most popular attack types is ransomware.
  • 10. DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DDoS attacks disable an online service by saturating it with a lot of traffic from many places and sources. During a DDoS attack, a website's response time slows down, blocking access. By installing malware, cybercriminals create massive networks of compromised machines known as Botnets. It's possible that a DDoS assault is not the main cybercrime. The attacks frequently serve as a diversion while other fraud and cyber breach attempts are made. Corporate Account Takeover (CATO) CATO is a type of business entity theft in which online criminals send fraudulent wire and ACH transfers while posing as the company. Unauthorized monies are transferred to accounts under the cybercriminal's control. Automated Teller Machine (ATM) Cash Out ATM Cash Out is a type of large dollar value ATM fraud. Cash-outs involve simultaneous large cash withdrawals from several ATMs in many regions. It may also include large withdrawals at one ATM.
  • 11. SPAM AND PHISING Unwanted, uninvited, or unpleasant emails and texts are considered spam. Phishing, which includes attempts to get sensitive information, is a type of social engineering. Phishing attempts will look to be coming from a reliable individual or company. Cybercriminals send you an email or text message with a warning about your account information while posing as an official representative. Frequently, the message may request a response by clicking a link to a phoney website or email address, where you will provide sensitive data. Using official names and logos, the message's format will often appear legitimate. Any data placed into the phoney link is sent to the online criminal.
  • 12. PREVENTION AND CYBER SECURITY • Firewalls • Operating system is up‐to‐date • Up‐to‐date anti‐virus and anti‐ spyware • Use a pop‐up advertising blocker • Use strong passwords • Secure wireless network • Reputable websites and mobile applications • Avoid clicking on unexpected or unfamiliar links • Use a Virtual Private Network (VPN) • Manage Social Media Setting • Educate children about proper internet usage.
  • 13. CONCLUSION One of the most crucial elements of the rapidly expanding digital world is cyber security. It is essential to learn how to defend against its threats and impart that knowledge to others because they are difficult to refute. The best way to lower the danger of a data leak is through prevention. Individuals and organizations may thwart hackers and protect their data by investing in cyber security software, utilizing a VPN, and being informed of typical attack techniques. Thank you