Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity

Andreea Diaconu

Created on November 6, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Visual Presentation

Relaxing Presentation

Modern Presentation

Colorful Presentation

Modular Structure Presentation

Chromatic Presentation

City Presentation

Transcript

Cybersecurity

Protecting Data in the Digital Era

Members: LUIS MENDOZA, SANTIAGO PÉREZ, ADRIÁN MARTÍNEZ DE EGUÍLAZ Y ANDREEA DIACONU

ÍNDICE

7. BASIC PROTECTION

1. INTRODUCTION

8. TOOLS OF CYBERSECURITY

2. What is cybersecurity?

9. THE FUTURE OF CYBERSECURITY

3. Why is matter?

10. THE HUMAN FACTOR

4. TYPES OF CYBERTHREATS

11. THE FUTURE

5. common threats

6. How to protect data

INTRODUCTION

HOW TECNOLOGY HELP US STAY SAFE ONLINE.

Is the practice of protecting digital systems, networks, and data from malicious attacks and unauthorized access. It involves using technologies, processes, and controls to safeguard against threats like hacking, malware, and phishing, aiming to ensure the confidentiality, integrity, and availability of information

cybersecurity:safety for today

Technology plays a crucial role in enhancing online safety by providing various tools and services that protect users from cyber threats.Cybersecurity is the practice of protecting people, systems and data from cyberattacks by using various technologies, processes and policies.

WHAT IS CYBERSECURITY?

Technology saves us online by deploying tools like encryption and multi-factor authentication to create digital shields that protect our data and identities from malicious actors.

HOW TECNOLOGY HELP US STAY SAFE ONLINE.

Cybersecurity matters because our increasing reliance on digital systems to manage everything from personal finances to national infrastructure makes their protection essential to individual safety, economic stability, and national security.

WHY IT MATTERS?

The operational continuity of modern enterprises relies on cybersecurity, as successful attacks can paralyze critical systems, leading to massive financial loss and irreparable brand damage.

National security is now inextricably linked to cybersecurity, as state-level actors continuously probe and target government networks and defense systems, making digital defense a primary theater of modern conflict.

WHY IT MATTER?

Main threats and Countermeasures.

Countermeasures

Threats

  • Antivirus/Antimalware software
  • Security awareness
  • Multifactor autentification
  • Encryption
  • Patch management
  • Traffic filtering and migration services
  • Malware
  • Phising
  • Password theft
  • Data Interception
  • Software Vulnerabilities
  • DDoS Attacks
vs

TYPES OF CYBER THREATS

TYPES OF CYBER THREATSCOMMON THREATS DETECTING CYBER THREATS INSIDE THREATS THREAT EVOLUTION

Types of Cyber Threats

Cyber threats encompass a variety of malicious activities aimed at compromising computer systems, networks, and data, with common types including malware, phishing, ransomware, and denial-of-service attacks.

Common Threats

Phishing: Fake emails that trick you into giving away personal data. Malware: Malicious software that harms your device or steals information. Ransomware: Locks your files and demands payment to unlock them. DDoS Attacks: Overload a website with traffic to make it crash.

Cyber threats are malicious attempts to access, damage, or steal data from computers, networks, or digital systems. They can target individuals, businesses, or governments and often aim to disrupt operations or gain unauthorized access to sensitive information.

+ info

Detecting Cyber Threats

HOW ARE CYBER THREATS DETECTED?

Detecting cyber threats is essential to protecting digital systems. It involves identifying unusual activities, analysing data, and using specialised tools to spot suspicious behaviour early — reducing the risk of major damage.

Key methods include: Monitoring Network Traffic – Track network activity to detect unusual spikes or data movement that could indicate attacks like DDoS. Reviewing System Logs – Check logs for unexpected login attempts or file changes that may signal a breach. Using Threat Detection Systems – Tools such as IDS and EDR detect and respond to threats in real time. Conducting Regular Security Audits – Identify system weaknesses and ensure security measures are up to date. User Behaviour Analytics (UBA) – Analyse user actions to spot anomalies, using AI to flag potential threats.

Threat Evolution

How Cyber Threats Are Evolving

In the past, threats were mostly basic, such as viruses that spread through floppy disks or spam emails that tried to annoy users. As technology advanced, cybercriminals became more sophisticated. We began to see phishing attacks, malware, ransomware, and DDoS attacks that could target both individuals and large organizations. These threats were harder to detect and caused more serious damage. Today, cyberattacks are often automated and global. Hackers use artificial intelligence, social engineering, and data breaches to exploit weaknesses in systems.

Phishing, Ransomware, DDoS
More complex attacks targeting users and companies.

Past (1980s–2000s)

Future (2025 → )

AI-driven Attacks

Present (2010s–2020s)

Viruses & Spam
Intelligent, adaptive threats that are hard to detect.
Simple viruses spread through disks or emails.

Insider Threats

Insider threat is the potential for an insider to use their authorized access or understanding of an organization to harm that organization. This harm can include malicious, complacent, or unintentional acts that negatively affect the integrity, confidentiality, and availability of the organization, its data, personnel, or facilities.

An insider is any person who has or had authorized access to or knowledge of an organization’s resources, including personnel, facilities, information, equipment, networks, and systems.

Info

HOW TO PROTECTC DATA

BASIC PROTECTIONTOOLS OF CYBERSECURITY

  • Use strong and unique passwords
  • Change passwords regularly
  • Do not share personal information on public websites
  • Keep all software and devices updated
  • Avoid clicking unknown links or downloading suspicious files
  • Do not connect to free or public Wi-Fi

BASIC PROTECTION

TOOLS OF CYBERSECURITY

  • Firewalls
  • Antivirus software
  • Two-factor authentication (2FA)
  • Data encryption

20XX

THE FUTURE OF CYBERSECURITY

THE HUMAN FACTOR. THE FUTURE.

Technology alone cannot guarantee cybersecurity —

People are the strongest defense and the weakest link. Most cyber incidents happen because of human error, such as clicking on phishing links, using weak passwords, or ignoring security policies.

THE HUMAN FACTOR

Why It Matters

THE HUMAN FACTOR

Humans make everyday security decisions — they can protect or expose data. Attackers often target people through social engineering instead of hacking systems. Many breaches come from mistakes, not from lack of technology. Main Challenges

Main Challenges

Low awareness: Many users still fall for phishing or scams. Poor security culture: If employees see cybersecurity as a burden, they ignore it. Complex systems: Complicated procedures push people to find shortcuts.

THE HUMAN FACTOR

How to Improve

Train people regularly, not just once a year. Create a positive security culture where everyone feels responsible. Design usable security tools that are simple and efficient. Use simulations and behavior tracking to identify risky habits.

THE HUMAN FACTOR

THE FUTURE

The future of cybersecurity will be shaped by technology, people, and culture working together.

Main TrendsAI and automation: Artificial intelligence will help detect and respond to attacks — but hackers will use AI too (e.g., deepfakes, automated phishing). Zero Trust: Systems will constantly verify identity instead of trusting anyone by default. Human risk management: Training and behavior analysis will be part of every security strategy. Cyber resilience: Companies will focus on quick detection and recovery, not only prevention.

What to ExpectContinuous, personalized cybersecurity education. Ai tools supporting — not replacing — human judgment. Greater attention to ethics, privacy, and digital trust. Security as part of company culture, not just an it task.

86% Animación

54% Interactividad

In today’s digital age, cybersecurity is essential for protecting sensitive information, maintaining privacy, and ensuring the integrity of systems and networks. As cyber threats continue to evolve, individuals and organizations must remain vigilant, adopt robust security measures, and foster a culture of awareness. Investing in cybersecurity not only safeguards data but also builds trust and resilience in an increasingly connected world.

CONCLUSION

Types of Cyberthreats | IBM Types of Cyberattacks Top 10 Cybersecurity Threats in 2025 - GeeksforGeeks What are cyber threats? Types, examples, and prevention strategies What is a denial-of-service (DoS) attack? | Cloudflare ¿Qué es el phishing? | IBM Qué es el phishing: reconocer y evitar las estafas de phishing ¿Qué es es el phishing? | OCU What is Spoofing & How to Prevent it The Future of Safety: How technology is shaping the way we stay protected online and offline - | Mobicip 10 common cybersecurity threats and attacks: 2025 update | ConnectWise What is Threat Detection and Response (TDR)? | CrowdStrike What Is Threat Detection and Response (TDR)? | Microsoft Security How to Detect Cyber Threats | Tips, Tools, and Challenges What is an Insider Threat? Definition, Types and Examples | Trend Micro (UK) Defining Insider Threats | CISA Evolution and Escalation of Cybersecurity Threats - Cyber Defense Magazine https://www.ibm.com/think/topics/cybersecurity https://www.upguard.com/blog/human-factors-in-cybersecurity?utm_source https://www.gartner.com/en/cybersecurity/topics/cybersecurity-trends?utm_source https://www.capgemini.com/nl-nl/wp-content/uploads/sites/19/2025/09/Trends-in-Cybersecurity_Eng_Digital_2-1.pdf?utm_source https://right-hand.ai/blog/cybersecurity-trends-2025/?utm_source https://link.springer.com/article/10.1007/s10207-025-01032-0?utm_source https://www.ibm.com/es-es/solutions/security

BIBLIOGRAPHY

Thank you for your time

Stay safe

Phishing is a type of cyber attack that uses fake emails, messages, or websites to trick people into giving away personal information. Attackers often pretend to be trusted sources—like banks, coworkers, or popular services—and ask the victim to click on a link, download a file, or enter sensitive data. These scams can lead to identity theft or unauthorized access to accounts and systems.

Malware, short for malicious software, refers to any program designed to harm, disrupt, or gain unauthorized access to a computer system. There are many types of malware, including viruses that spread through infected files, trojans that disguise themselves as useful apps, and spyware that secretly monitors user activity. Malware can be spread through downloads, email attachments, or compromised websites, and it often results in data loss or stolen information.

Ransomware is a dangerous form of malware that locks or encrypts your files and demands payment to unlock them. It usually enters a system through phishing emails or malicious downloads. Once activated, it blocks access to important data and may even threaten to leak it unless a ransom is paid. This type of attack can cause serious financial damage and disrupt business operations.

DDoS attacks, or Distributed Denial of Service attacks, are designed to crash a website or online service by overwhelming it with traffic from multiple sources. Attackers use networks of infected devices, called botnets, to send massive amounts of requests at once. The goal is to make the service unavailable to users, which can lead to lost revenue and damage to a company’s reputation.

Types of Insider Threats?

Unintentional Threat:- Negligence - Accidental Intentional ThreatsOther Threats: - Collusive Threats - Third-Party Threats