2. Introduction To
Cyber Threats
Notwithstanding the viability of the innovation of
figuring, most confided in putting away
documents in PCs, cell phones, and the web are
defenseless to assaults by programmers and all
types of unapproved access on the internet and
this leads to the requirement for proficient
network safety frameworks.
The multiplication of PCs, versatile innovation,
simple admittance to the web, and a thriving
business sector for related new specialized
gadgets have meaningfully impacted the manner
in which we invest our recreation energy and the
manner in which we carry on with work.
2
3. CYBER THREATS
Defination
• A Cyber danger is any noxious movement that endeavors to get to a PC network without
approval or consent from the proprietors.
• It alludes to the large number of pernicious exercises that can harm or disturb a PC
framework, an organization, or the data it contains.
• Most normal digital dangers: Social Engineered Trojans, Unpatched Software, Phishing,
Network worms, and so forth.
4. SOURCES OF
CYBERSECURITY
Digital dangers can emerge out of a
wide assortment of sources, a few
eminent models include:
• National governments.
• Terrorists.
• Industrial secret agents.
• Rogue employees.
• Hackers.
• Business competitors.
• Organization insiders.
6. Category of Cyber Threats
Natural Threats Unintentional Threats
Cybercriminals could exploit catastrophic
events like storms, rapidly spreading fires,
and twisters to unleash devastation on basic
framework, including transportation, crisis
reaction, water frameworks, and clinics.
Cybercriminals
Flaws in privacy policy definition; mistakes in
information system design, development, integration,
configuration, and operation; and errors made by
personnel of organizations with custody of the
information.
Intentional Threats
Both targeted and untargeted attacks from a variety of sources,
including criminal groups, hackers, disgruntled employees,
foreign nations engaged in espionage and information warfare,
and terrorists.
7. TYPES OF CYBER SECURITY THREATS
The task of keeping up with new technologies, security trends and threat
intelligence is challenging but must be performed. In order to protect
information and other assets from cyber threats, the following forms of
threats are analyzed:
• Ransomware
• Malware
• Social Engineering
• Phishing
• Man In The Middle
• SQL Injection
• Password Attacks
8. RISKS
Gambles are normally mistaken for dangers. In
any case, there is an unpretentious contrast
between the two. A network safety risk alludes
to a blend of a danger likelihood and
misfortune/influence.
Essentially, this translates to the following:
risk = threat probability * potential loss
9. Four steps for threat prevention
• Protect users wherever they work
• Smart network segmentation
• Find and control problems fast
• Secure the perimeter
Giving good danger anticipation can overpower. Our organization's security agenda recognizes
five basic strides for digital danger counteraction. Underneath we frame the fundamental parts
10. On basis of these criteria, threats are of 3 types:
20XX
11. On basis of these criteria, threats are of 3
types:
1. Unstructured Threats
2. Structured Threats
3. Highly Structured threats
20XX
12. Unstructured Cyber Threats
1. Resources: Individual or small group.
1. Organization: Little or no organization.
1. Funding: Negligible.
1. Attack: Easy to detect and make use of freely available cyberattack tool.
Exploitation based on documented vulnerabilities.
20XX
13. Structured Cyber Threats
1. Resource: Well-trained individual or group.
1. Organization: Well planned.
1. Funding: Available.
1. Attack: Against particular individuals or organizations.
Exploitation based on information Gathering.
20XX
14. Highly Structured Cyber Threats
1. Extensive organization, resources, and planning over time.
2. Along term attack on particular machine or data.
3. Exploitation with multiple methods:
4. Technical, social and insider help.
20XX