1 / 11

Derrick Coston/Cyber Attacks/Guidlines

Derrick Coston is a Cyber Security Professional with strengths in Cyber Security, Technology, Compliance, and Auditing Cyber Education. https://twitter.com/derrick_coston

Download Presentation

Derrick Coston/Cyber Attacks/Guidlines

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Derrick Coston Cyber Attacks- Loss Of Authenticatiuon

  2. A New Threat The world of information security attacks and threats in growing in power and sophistication with nation backed Cyber-attacks emerging. Although constituting isolated attacks so far the new wave of Cyber-attacks are more prevalent and dangerous.

  3. Cyber Attack In Actual It is an attempt to gain control to the computer and track the movements of an individual or a group without their permission.

  4. About Derrick Coston Derrick Coston is a Cyber Security Professional with strengths in Cyber Security, Technology, Compliance, and Auditing Cyber Education.

  5. Types Of Cyber Attacks Phishing Attack Man in tha middle attack SQL Injection threat Dennial Of Service Attack Password Attack

  6. Some More Types Of Cyber Attacks Cross Site Scripting Attack AI- Powered Attack Drive By Attack Randsomeware Attack Eavesdropping

  7. Flow-Chart Of Cyber-Attacks

  8. Major Agencies To Protect From Cyber Attacks The Federal Bureau of Investigation Federal Trade Commission Department of Homeland Security U.S. Secret Service National Institute of Standards and Technology (NIST)

  9. Guidlines To Get A Rid From Cyber Attacks There should be list of standard terms which are universally accepted. A centerlized technical research database is necessary. This database operates in real time and should be accepted by all communities.

  10. Other Platforms For More Informat https://medium.com/@derrickcoston0 https://twitter.com/derrick_coston https://issuu.com/derrickcoston0

  11. Thanks

More Related