CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Agenda • Cyber Security • Cyber Threats • Cyber Attacks • Action to Take When Faced to Cyber Attack – Phishing Attack – Ransomware Attack – Scareware Attack • GPS Slogan • Fish Principles CONFIDENTIAL. All rights reserved. No content can be reproduced without permission. CyberSecurity Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. CONFIDENTIAL. All rights reserved. No content can be reproduced without permission. Cyber Threats
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Internal Threats
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
External Threats
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Cyber Attacks
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Action to Take when Faced with Cyber Attack
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Phishing Attacks
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Sample Phishing Mail
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Phishing Attacks
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Ransomware
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Ransomware
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Scareware
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Scareware
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
GPS Slogan
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Fish Principles
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Fish Principles
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Fish Principles
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Fish Principles
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
CONFIDENTIAL. All rights reserved. No content can be reproduced without permission.
Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps (English Edition)