SlideShare a Scribd company logo
1 of 34
Download to read offline
CYBER SECURITY
-WHYISITIMPORTANT?
OBJECTIVE
This presentation aims to educate
and create awareness amongst
the community on the use of
Technology, Internet Media and
its implications on possible cyber
crimes
Evolution of technology, usage and value
Evolution of security problems and solutions
Evolution never stops…
4
5
Cyber Security
Cyber Security is a set of principles and
practices designed to safeguard your
computing assets and online information
against threats. It is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and data from malicious
attacks.
6
What is a Secure System?
• Confidentiality – restrict
access to authorized
individuals
• Integrity – data has not been
altered in an unauthorized
manner
• Availability – information can
be accessed and modified by
authorized individuals in an
appropriate timeframe
7
Confidentiality
Example: Protection from Criminal stealing
customers’ usernames, passwords, or credit card information.
Protecting information from unauthorized access and disclosure
8
Integrity
Protecting information from
unauthorized modification
Example:
Only authorized personel can alter payroll information or a
proposed product design
9
Availability
Example: Protection from Criminal stealing
customers’ usernames, passwords, or credit card information.
Protecting information from unauthorized access and disclosure
10
Threats and Vulnerabilities
What are we protecting our and our stakeholder’s information
from?
Threats: Any circumstances or events that can potentially harm an
information system by destroying it, disclosing the information
stored on the system, adversely modifying data, or making the
system unavailable
Vulnerabilities: Weakness in an information system or its
components that could be exploited.
11
What kinds of threats are there?
• Phishing and Spear- phishing Attacks
• Social Engineering Scams
• Common Malware and Ransomware
• Business Email Compromise
• Fake websites that steal data or infect devices
And much more
12
Phishing
• Phishing refers to the practice of creating fake emails or SMS that
appear to come from someone you trust, such as: Bank, Credit
Card Company, Popular Websites
• The email/SMS will ask you to “confirm your account details or
your vendor’s account details”, and then direct you to a website
that looks just like the real website, but whose sole purpose is for
steal information.
• Of course, if you enter your information, a cybercriminal could use
it to steal your identity and possibly make fraudulent purchases
with your money.
13
Example of Phishing
14
Social Engineering
• When attempting to steal information or a person’s identity, a
hacker will often try to trick you into giving out sensitive
information rather than breaking into your computer.
• Social Engineering can happen:
• Over the phone
• By text message
• Instant message
• Email
15
Malware
• Malware = “malicious software”
• Malware is any kind of unwanted software that is installed without your
consent on your computer and other digital devices.
• Viruses, Worms, Trojan horses, Bombs, Spyware, Adware, and Ransomware
are subgroups of malware.
16
Virus: A computer virus is a type of malicious software, or malware,
that spreads between computers and causes damage to data and
software.
Trojan: Trojan is a type of malware that typically gets hidden as an
attachment in an email or a free-to-download file, and then transfers
onto the user’s device. Once downloaded, the malicious code will
execute the task the attacker designed it for, such as gaining
backdoor access to corporate systems, spying on users’ online
activity, or stealing sensitive data.
Worms: A computer worm is a subset of the Trojan horse malware
that can propagate or self-replicate from one computer to another
without human activation after breaching a system.
Adware: Adware is a type of malware designed to display.
Spyware: Spyware is like adware it spies on the user to see what
information it can collect off the user’s computer to display pop ads
on the user’s computer. Spyware unlike adware likes to use memory
from programs running in the background of the computer to keep
a close watch on the user.
17
Denial of Service Attack
18
Ransomware
• Ransomware is a type of malware that
restricts your access to systems and files,
typically by encryption and then demands
a ransom to restore access.
• Often, systems are infected by
ransomware through a link in a malicious
email. When the user clicks the link, the
ransomware is downloaded to the user’s
computer, smartphone or other device.
Ransomware may spread through
connected networks.
19
Ransomware Controls
• Weapons-Grade Data Backups
• Religious Patch Management
• Plan to Fail Well (Incident Response Plan)
• Know who to call!
• Training and Testing Your People
• Don’t Open that Email Link/Attachment
20
Cyber Crime
• Cyber Crime is a generic term that refers to all criminal activities
done using the medium of communication devices, computers,
mobile phones, tablets etc. It can be categorized in three ways:
• The computer as a target – attacking the computers of others.
• The computer as a weapon- Using a computer to commit
• “traditional crime” that we see in the physical world.
• The computer as an accessory- Using a computer as a “fancy filing
cabinet” to store illegal or stolen information.
21
Ransomware Controls
22
Hacking
• Financial (theft, fraud, blackmail)
• Political/State (state level/military)
• Fame/Kudos (fun/status)
• Hacktivism (cause)
• Pen Testers (legal hacking)
• Police
• Insider
23
Vulnerability Scanner
• The functions of a Vulnerability Scanner are far
different from a firewall or intrusion detection
system.
• Vulnerability scanning tools help you in
protecting your organization from any kind of
security risks or threats by scanning with deep
inspection of endpoints to ensure that they are
configured securely and correctly.
• The prime aim of running a vulnerability
scanner is to identify the devices that are open
for vulnerabilities.
24
Personal Cybersecurity Tips /
Best Practices
Use Strong
Passwords
Use a VPN
When
Necessary
Think Before
You Click
Update Your
Home Router
Update Your
Devices
Use Two-
Factor
Authentication
25
Url & Safe Web Browsing
• Don’t download free media.
• Don’t store your payment information online.
• Don’t over-share personal information on social media accounts.
• Change passwords regularly.
• Keep your browser software up-to-date.
• Run Anti-Virus software.
• Scan downloaded files before executing.
• Watch out for phishing.
• Don’t Reuse Passwords.
• Use HTTPS for banking transactions.
• Read Privacy Policies.
• Avoid Public or Free Wi-Fi.
• Disable Stored Passwords.
26
HIPAA
Health Insurance Portability & Accountability Act
27
What is HIPAA?
HIPAA Provides a framework for the
establishment of nationwide protection of
patient confidentiality, security of
electronic systems, and standards and
requirements for electronic transmission
of health information.
1 • Privacy Rule
2 • Security Rule
3
• Electronic Data
Exchange
28
Privacy Rule
• Privacy Rule went into effect April 14, 2003.
• Privacy refers to the protection of an individual’s
health care data.
• Defines how patient information is used and disclosed.
• Gives patients privacy rights and more control over
their own health information.
• Outlines ways to safeguard Protected Health
Information (PHI).
29
Security Rule
• Security (IT) regulations went into effect April 21, 2005.
• Security means controlling:
• Confidentiality of electronic protected health information (ePHI).
• Storage of electronic protected health information (ePHI)
• Access into electronic information
30
Electronic Data Exchange (EDI)
• Defines transfer format of electronic information
between providers and payers to carry out financial or
administrative activities related to health care.
• Information includes coding, billing and insurance
verification.
• Goal of using the same formats is to ultimately make
the billing process more efficient.
31
Why Comply With HIPAA?
• To show our commitment to protecting privacy
• As an employee, you are obligated to comply with Expeed Software
privacy and security policies and procedures
• Our patients/members are placing their trust in us to preserve the
privacy of their most sensitive and personal information
• Compliance is not an option, it is required.
• If you choose not to follow the rules:
• You could be put at risk, including personal penalties and sanctions
• You could put Expeed Software at risk, including financial and
reputational harm
32
HIPAA Regulations
HIPAA Regulations require we protect our patients’ PHI
in all media including, but not limited to, PHI created,
stored, or transmitted in/on the following media:
• Verbal Discussions (i.e., in person or on the phone)
• Written on paper (i.e., chart, progress notes,
encounter forms, prescriptions, x-ray orders, referral
forms and explanation of benefit (EOBs) forms
• Computer Applications and Systems (i.e., electronic
health record (EHR), Practice Management, Lab and X-
Ray
• Computer Hardware/Equipment (i.e., PCs, laptops,
PDAs, pagers, fax machines, servers and cell phones
33
Indian Cyber Security Law
The Information Technology (IT) Act, of 2000, is the primary legislation
dealing with cybersecurity, data protection and cybercrime. Identifying
activities such as hacking, denial-of-service attacks, phishing, malware
attacks, identity fraud and electronic theft as punishable offences
It contains 23 chapters define all related to Cyber security.
In 2021 new rules were added related to online gaming and guideline for
Digital Media Ethics
Let’s
Innovate
Together
www.expeed.com

More Related Content

Similar to Why is Cybersecurity Important in the Digital World

Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 

Similar to Why is Cybersecurity Important in the Digital World (20)

Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 

More from Expeed Software

What is Devops? What are the Fundamentals of it?
What is Devops? What are the Fundamentals of it?What is Devops? What are the Fundamentals of it?
What is Devops? What are the Fundamentals of it?Expeed Software
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.Expeed Software
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Node JS - A brief overview on building real-time web applications
Node JS - A brief overview on building real-time web applicationsNode JS - A brief overview on building real-time web applications
Node JS - A brief overview on building real-time web applicationsExpeed Software
 
Springboot - A milestone framework in Java Development
Springboot - A milestone framework in Java DevelopmentSpringboot - A milestone framework in Java Development
Springboot - A milestone framework in Java DevelopmentExpeed Software
 
What makes Flutter the best cross platform sdk
What makes Flutter the best cross platform sdkWhat makes Flutter the best cross platform sdk
What makes Flutter the best cross platform sdkExpeed Software
 

More from Expeed Software (6)

What is Devops? What are the Fundamentals of it?
What is Devops? What are the Fundamentals of it?What is Devops? What are the Fundamentals of it?
What is Devops? What are the Fundamentals of it?
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Node JS - A brief overview on building real-time web applications
Node JS - A brief overview on building real-time web applicationsNode JS - A brief overview on building real-time web applications
Node JS - A brief overview on building real-time web applications
 
Springboot - A milestone framework in Java Development
Springboot - A milestone framework in Java DevelopmentSpringboot - A milestone framework in Java Development
Springboot - A milestone framework in Java Development
 
What makes Flutter the best cross platform sdk
What makes Flutter the best cross platform sdkWhat makes Flutter the best cross platform sdk
What makes Flutter the best cross platform sdk
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Why is Cybersecurity Important in the Digital World

  • 2. OBJECTIVE This presentation aims to educate and create awareness amongst the community on the use of Technology, Internet Media and its implications on possible cyber crimes
  • 3. Evolution of technology, usage and value Evolution of security problems and solutions Evolution never stops…
  • 4. 4
  • 5. 5 Cyber Security Cyber Security is a set of principles and practices designed to safeguard your computing assets and online information against threats. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  • 6. 6 What is a Secure System? • Confidentiality – restrict access to authorized individuals • Integrity – data has not been altered in an unauthorized manner • Availability – information can be accessed and modified by authorized individuals in an appropriate timeframe
  • 7. 7 Confidentiality Example: Protection from Criminal stealing customers’ usernames, passwords, or credit card information. Protecting information from unauthorized access and disclosure
  • 8. 8 Integrity Protecting information from unauthorized modification Example: Only authorized personel can alter payroll information or a proposed product design
  • 9. 9 Availability Example: Protection from Criminal stealing customers’ usernames, passwords, or credit card information. Protecting information from unauthorized access and disclosure
  • 10. 10 Threats and Vulnerabilities What are we protecting our and our stakeholder’s information from? Threats: Any circumstances or events that can potentially harm an information system by destroying it, disclosing the information stored on the system, adversely modifying data, or making the system unavailable Vulnerabilities: Weakness in an information system or its components that could be exploited.
  • 11. 11 What kinds of threats are there? • Phishing and Spear- phishing Attacks • Social Engineering Scams • Common Malware and Ransomware • Business Email Compromise • Fake websites that steal data or infect devices And much more
  • 12. 12 Phishing • Phishing refers to the practice of creating fake emails or SMS that appear to come from someone you trust, such as: Bank, Credit Card Company, Popular Websites • The email/SMS will ask you to “confirm your account details or your vendor’s account details”, and then direct you to a website that looks just like the real website, but whose sole purpose is for steal information. • Of course, if you enter your information, a cybercriminal could use it to steal your identity and possibly make fraudulent purchases with your money.
  • 14. 14 Social Engineering • When attempting to steal information or a person’s identity, a hacker will often try to trick you into giving out sensitive information rather than breaking into your computer. • Social Engineering can happen: • Over the phone • By text message • Instant message • Email
  • 15. 15 Malware • Malware = “malicious software” • Malware is any kind of unwanted software that is installed without your consent on your computer and other digital devices. • Viruses, Worms, Trojan horses, Bombs, Spyware, Adware, and Ransomware are subgroups of malware.
  • 16. 16 Virus: A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Trojan: Trojan is a type of malware that typically gets hidden as an attachment in an email or a free-to-download file, and then transfers onto the user’s device. Once downloaded, the malicious code will execute the task the attacker designed it for, such as gaining backdoor access to corporate systems, spying on users’ online activity, or stealing sensitive data. Worms: A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Adware: Adware is a type of malware designed to display. Spyware: Spyware is like adware it spies on the user to see what information it can collect off the user’s computer to display pop ads on the user’s computer. Spyware unlike adware likes to use memory from programs running in the background of the computer to keep a close watch on the user.
  • 18. 18 Ransomware • Ransomware is a type of malware that restricts your access to systems and files, typically by encryption and then demands a ransom to restore access. • Often, systems are infected by ransomware through a link in a malicious email. When the user clicks the link, the ransomware is downloaded to the user’s computer, smartphone or other device. Ransomware may spread through connected networks.
  • 19. 19 Ransomware Controls • Weapons-Grade Data Backups • Religious Patch Management • Plan to Fail Well (Incident Response Plan) • Know who to call! • Training and Testing Your People • Don’t Open that Email Link/Attachment
  • 20. 20 Cyber Crime • Cyber Crime is a generic term that refers to all criminal activities done using the medium of communication devices, computers, mobile phones, tablets etc. It can be categorized in three ways: • The computer as a target – attacking the computers of others. • The computer as a weapon- Using a computer to commit • “traditional crime” that we see in the physical world. • The computer as an accessory- Using a computer as a “fancy filing cabinet” to store illegal or stolen information.
  • 22. 22 Hacking • Financial (theft, fraud, blackmail) • Political/State (state level/military) • Fame/Kudos (fun/status) • Hacktivism (cause) • Pen Testers (legal hacking) • Police • Insider
  • 23. 23 Vulnerability Scanner • The functions of a Vulnerability Scanner are far different from a firewall or intrusion detection system. • Vulnerability scanning tools help you in protecting your organization from any kind of security risks or threats by scanning with deep inspection of endpoints to ensure that they are configured securely and correctly. • The prime aim of running a vulnerability scanner is to identify the devices that are open for vulnerabilities.
  • 24. 24 Personal Cybersecurity Tips / Best Practices Use Strong Passwords Use a VPN When Necessary Think Before You Click Update Your Home Router Update Your Devices Use Two- Factor Authentication
  • 25. 25 Url & Safe Web Browsing • Don’t download free media. • Don’t store your payment information online. • Don’t over-share personal information on social media accounts. • Change passwords regularly. • Keep your browser software up-to-date. • Run Anti-Virus software. • Scan downloaded files before executing. • Watch out for phishing. • Don’t Reuse Passwords. • Use HTTPS for banking transactions. • Read Privacy Policies. • Avoid Public or Free Wi-Fi. • Disable Stored Passwords.
  • 27. 27 What is HIPAA? HIPAA Provides a framework for the establishment of nationwide protection of patient confidentiality, security of electronic systems, and standards and requirements for electronic transmission of health information. 1 • Privacy Rule 2 • Security Rule 3 • Electronic Data Exchange
  • 28. 28 Privacy Rule • Privacy Rule went into effect April 14, 2003. • Privacy refers to the protection of an individual’s health care data. • Defines how patient information is used and disclosed. • Gives patients privacy rights and more control over their own health information. • Outlines ways to safeguard Protected Health Information (PHI).
  • 29. 29 Security Rule • Security (IT) regulations went into effect April 21, 2005. • Security means controlling: • Confidentiality of electronic protected health information (ePHI). • Storage of electronic protected health information (ePHI) • Access into electronic information
  • 30. 30 Electronic Data Exchange (EDI) • Defines transfer format of electronic information between providers and payers to carry out financial or administrative activities related to health care. • Information includes coding, billing and insurance verification. • Goal of using the same formats is to ultimately make the billing process more efficient.
  • 31. 31 Why Comply With HIPAA? • To show our commitment to protecting privacy • As an employee, you are obligated to comply with Expeed Software privacy and security policies and procedures • Our patients/members are placing their trust in us to preserve the privacy of their most sensitive and personal information • Compliance is not an option, it is required. • If you choose not to follow the rules: • You could be put at risk, including personal penalties and sanctions • You could put Expeed Software at risk, including financial and reputational harm
  • 32. 32 HIPAA Regulations HIPAA Regulations require we protect our patients’ PHI in all media including, but not limited to, PHI created, stored, or transmitted in/on the following media: • Verbal Discussions (i.e., in person or on the phone) • Written on paper (i.e., chart, progress notes, encounter forms, prescriptions, x-ray orders, referral forms and explanation of benefit (EOBs) forms • Computer Applications and Systems (i.e., electronic health record (EHR), Practice Management, Lab and X- Ray • Computer Hardware/Equipment (i.e., PCs, laptops, PDAs, pagers, fax machines, servers and cell phones
  • 33. 33 Indian Cyber Security Law The Information Technology (IT) Act, of 2000, is the primary legislation dealing with cybersecurity, data protection and cybercrime. Identifying activities such as hacking, denial-of-service attacks, phishing, malware attacks, identity fraud and electronic theft as punishable offences It contains 23 chapters define all related to Cyber security. In 2021 new rules were added related to online gaming and guideline for Digital Media Ethics