Network Threats Presentation: Cyber Security and Mitigation Strategies

Verified

Added on  2022/10/10

|4
|577
|75
Presentation
AI Summary
This presentation provides an overview of network threats, categorizing them as internal and external. It identifies various threats, including rogue security software, phishing attacks, and Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The presentation explains how these threats work and their potential impact. It also covers mitigation strategies, including preventive controls like firewalls, encryption, and antivirus software; detective measures such as security log monitoring; and corrective measures like contingency and continuity plans. The presentation aims to inform the audience about the nature of network threats and the various methods used to defend against them.
Document Page
Topic:
Presenter:
Date:
My name is [Name of the presenter] and I
take this opportunity to welcome all of
you for my presentation concerning
NETWORK THREATS
Slide 2 A network threat in terms of network
security refers to the possibilities for
susceptibilities to turn into attacks on
networks and computing systems.
Computer network threats include
anything ranging from trojans, virus,
and back door attacks. Frequently, the
most attacks include multiple threats
taking place, therefore, the term
blended threat will be the best term to
use. An example is when may use
phishing to have access to the
network and have access of the
network.
Slide 3 Network threats can either be internal
or external. The internal network
threats are the employees who are
dissatisfied and may want to revenge
the company by doing something
which will harm the company.
My example network threats include
Rogue security software, Phishing,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DOS and the DDOS attacks
Slide 4 A rogue security software is a
computer application program which
deceives computer users to have a
believe that their computers are
infected with viruses or the security
measures on their computers are not
up to date.
Example rogue security software
include and are not limited to viruses,
ransomware, adware, worms and
spyware
Slide 5 The malware can get personal
information by sending which looks to
have been send from financial
institutions which requests the victim
to verify their identity giving away
their private information.
This kind of attack can be launched to
both employees and management
staff leading to exposure of personal
and confidential information which
can be used by the attackers for their
own gain.
Slide 6 Has anyone of us found himself or
herself in a situation where we
impatiently wait for an online service,
one which we eagerly wait to
purchase online. [Pause, wait for
audience response]. We keep on
refreshing the page, waiting for the
time when the service will be available
on our live web-pages? [Pause, wait
Document Page
for audience response]. Continued
press of F5 at last shows an error
message that “The server is
overloaded” or “The service you are
searching is not available”. [Pause,
wait for audience response]
Definitely this is an example of denial
of service
A distributed denial of service is same
as to denial of service external attacks;
however, the DDoS is more forceful as
compared to DoS. This kind of attack is
not easy to overcome since it is
launched from several computers
which are involved in a range of
attacks.
Slide 7 Many of the business enterprises are
required to maintain fissure mitigation
tactics as a result. As soon as the
cyber-attackers gain access to the
internal computer system, Information
Technology administrators they put
mechanisms in action to safeguard the
computing systems as much as
possible.
Slide 8 Preventive control
An example of the preventive control
mechanism is the firewall, encryption,
antivirus software, risk analysis,
account locks and job rotation
An example of cyber-attack detective
mitigation technique includes the
security log monitoring system and
the IDSes.
Document Page
Contingency and continuity plans are
the examples of the corrective
measures which can be taken to
mitigate the cyber-attacks
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]