Proactive Cyber Defence

Cyber Complot And Operation
With the background of increasing dependence on
technology and web-based communications, the internet usage
spreading all over the world, many people, firm and bank have
started to use internet in order to make easy their business such
as paying their bill with credit cards on the internet.
Cyber Attack Boomed
Don’t share your private
information on unsafe web server
Cyber attack can be defined as
accessing other people’s e-mail, message
and information unlawfully.
People who attack web sites and access personal
computer are called hacker. Hackers want to profit from
their innate hacking capabilities.
Hacker can be divided into three groups
as White Hat, Grey Hat and Black Hat.
With the increasing number of cyber
attack, cyber crime became the top priority
issue for government and people.
Cyber Attack And Defence
Cyber Attack Types
Malware, short for malicious software, is software
used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
It can appear in the form of code, scripts, active
content, and other software.
Malware includes computer viruses,ransomware,worms,
trojan horses,rootkits, keyloggers,dialers,spyware and adware
A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs,
data files, or the boot sector of the hard drive
Trojan horses
When a malicious program is disguised
as something normal or desirable, users may
willfully install it without realizing it. This is the
technique of the Trojan horse or trojan.
One of the largest ever cyber attacks is
slowing global internet services and the disruption
could get worse after an organization blocking
"spam" content became a target.
Phishing is the act of attempting to acquire
information such as usernames, passwords, and
credit card details.
Phishing is typically carried out by email
spoofing or instant messaging and it often directs
users to enter details at a fake website whose look
and feel are almost identical to the legitimate one.
Proactive Cyber Defence
 Active Cyber Defence
Proactive Cyber Defence or active cyber
defence (ACD) means acting in anticipation to
oppose an attack against computers
and networks.
Proactive Cyber Defence
Proactive cyber defense means acting in
anticipation to oppose an attack
against computers and networks.
It represents the dynamic between purely
offensive and defensive action; interdicting and
disrupting an attack or a threat’s preparation
to attack, either preemptively or in self-defence.
Active Cyber Defence
Active cyber defense (ACD), a term that
describes a range of proactive actions that engage
the adversary before and during a cyber incident
Some software can be used for defending systems
Antivirus or AV software is computer
software used to prevent, detect and remove
malicious computer viruses.
Rootkit detection
Real-time protection
a firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets
An illustration of where a firewall would be
located in a network.
Cyber Technology in Turkey
Turkey has some concerns about
cyber-attacks which include acts of
cyber war, terrorism, crime, protest,
vandalism, and more.
Cyber Security Agency struggles with threats
coming from software such as some viruses like
Trojan and malicious viruses.
Cyber attack strategies are provided by
cyber security agencies in digital enviroment.
These strategies are pot system, a trap set to
detect, deflect, or in some manner counteract
attempts at unauthorized use of information
The hacktivist group Anonymous has taken down the
Turkish President’s website and attack Turkısh Cyber
Ayyıldız Team makes counter attack to anonymous.
TÜBİTAK support training programs with cooperation of Cyber Security Agency.DDOS defensive
tool to eliminate cyber attacts.
Prepared by
Saray KURT

similar documents