Cyber Security Expert, A Challenging Role! - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security Expert, A Challenging Role!

Description:

Many aspire to be Cyber Security Experts. But before that let us understand what it takes to become a real expert in this field. – PowerPoint PPT presentation

Number of Views:55
Slides: 13
Provided by: texceed

less

Transcript and Presenter's Notes

Title: Cyber Security Expert, A Challenging Role!


1
Cyber Security Expert, A Challenging Role!
2
  • Information security and hacking always had a lot
    of glamour around them. Many aspire to be Cyber
    security experts. If you have decided this by
    watching a movie, hold on. Let us understand what
    it takes to become a real expert in this field.
    You will be in demand for a job only if you equip
    yourself with the required skills.
  • A study by Burning Glass revealed that the number
    of cybersecurity job postings has grown by 94 in
    just six years, and cybersecurity jobs now
    account for 13 of all information technology
    jobs.

3
  • Cyber Security Expert knows the complete domain
  • Cyber Security is a domain which spans the entire
    gamut of software systems. That means, it
    consists of hardware, sensors, operating systems,
    network, network devices, servers and so on. As a
    cyber security expert one needs to be well
    acquainted with all these parts of the system.

4
  • Information security implementation is more
    emphasized with system-level controls. Today,
    applications using different technologies are
    becoming the main focus at enterprise level.
    Software systems continue to grow and become more
    complex. As a result, more vulnerabilities are
    found in the application software. Legacy code
    and new developing technologies are the reasons
    that applications may open up additional
    vulnerabilities which are not yet known.
  •  

5
  • Vulnerability, Threat, and Cyber Attack
  • Let us understand some of the key terms.
  • Vulnerability
  • Vulnerability is a loophole or flaw which can be
    used by someone with malicious intent to get into
    the system.
  • Threat
  • Security threat is a malicious act which can have
    a bad impact.

6
  • Cyber Attack
  • A cyber attack is an attempt to exploit a
    vulnerability with some motive or intention.
    Generally, this intention is not so good.  The
    intentions typically are disrupting a business,
    stealing information, manipulating data, damaging
    reputation, etc.
  • When one becomes a cyber security expert, he/she
    needs to be aware of various vulnerabilities and
    attacks and how to stop them or recover the
    system. 

7
  • Common Type of Cyber Attacks
  • Let us explore common types of attacks.
  •  
  • Viruses and Worms
  • Viruses and worms are malicious programs that are
    aimed at corrupting data. They replicate
    themselves and infect the systems when they get
    connected.
  • Phishing
  • In phishing attacks, users are lured to click on
    links embedded in emails. These links take them
    to websites which ask for personal information or
    install malware on their device. This way the
    device gets compromised.

8
  • DDoS
  • In a distributed denial-of-service 
    or DDoS attack, multiple machines are used to
    attack a server or website. These machines
    generate such a flood of connection requests that
    the target server or website crashes down. Thus
    legitimate users are denied access to the system.
  • Ransomware
  • This is like human kidnapping case and asking for
    a ransom. Here instead of humans, it is the data
    which is locked or encrypted by the virus attack.
    One needs to pay the ransom to get the data
    back. 

9
  • APT
  • APT stands for advanced persistent threat. In
    this attack, the intruder hacks the network,
    enters the system and remains under stealth.
    He/She monitors the activities on the network and
    uses it to steal highly sensitive data. The
    hacker remains in the system undetected for a
    long period of time.

10
  • Common security threats range from viruses to
    APTs or advanced persistent threats.
    Organizations cyber security team needs to be
    ready to handle them. Moreover cyber security
    threats continue to become more and more
    sophisticated with technologies. So, the
    enterprise security team must remain vigilant. If
    you are a cyber security expert who is trained
    in Ethical Hacking Course in Pune, you may be
    able to join these teams and protect
    organizations. Isnt it going to be a challenging
    role?

11
  • Conclusion
  • Many aspire to be Cyber Security Experts. But
    before that let us understand what it takes to
    become a real expert in this field.

12
  • THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com