SlideShare uma empresa Scribd logo
1 de 33
ASHISH PRASHAR
MBA
PHARMA.MANAGEMENT
• Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be referred
to as information technology security.
• With an increasing amount of people getting connected
to internet, the security threats that cause massive harm
are increasing also.
• The objective of cyber security is to establish rules and
measure to use against attacks over the internet.
• Cybercrime is any criminal activity that involves a computer,
networked device or a network. While most cybercrimes are carried
out in order to generate profit for the cybercriminals, some
cybercrimes are carried out against computers or devices directly to
damage or disable them, while others use computers or networks
to spread malware, illegal information, images or other materials.
Some cybercrimes do both -- i.e., target computers to infect them
with viruses, which are then spread to other machines and,
sometimes, entire networks.
• Other forms include ''digital'', ''electronic'', ''virtual'', ''it'', high-tech
and technologly-enabled crime.
• We can categorize cyber in two ways:-
• The computer as a target: Using a computer to attacks other
computer.
e.g.-Hacking, Virus/worms attacks, DOS attack etc.
> The computer as a weapon:Using a computer to commit real
word crime.
e.g.-credit card fraud etc.
• 1969 professor of UCLA sent message to standard Resarch Institute ''login''
- ''lo''
• 1970 Bob Thomas created first virus namely ' Creeper'
-“I’M THE CREEPER: CATCH ME IF YOU CAN.”
- 1972 Reaper, the first antivirus software—which would chase Creeper
and delete it.
- 1986 Russian used Cyber power as weapons.
• The first Virus was installed on an Apple Computer in 1982.
• It is a criminal activity committed on the internet.
• Cyber crime-where computer is either a tool or target or both.
What is the
meaning of
the word
CYBER
What is the need
of Cyber Security
How to implanted
and maintain security of a
cyber field around
us
What are the security
problems in CYBER
field
CYBER
It is a combining form relating to information technology,
the internet, and virtual reality.
[ ]
CYBER
(Computer system,
network ,program or
data)
SECURITY
(System security,
network security
program or
data security)
• CYBER security is necessary since it helps in securing data from
threats such as data theft or misuse , also safeguards from viruses.
• To protect Private data.
• To Protect Intellectual data.
• To protect Banking or financial data.
• National security .
• Global Economy
• Virus
• Hacker
• Malware
• Trojan Horse
• Password cracking
• Phishing
• A Virus is a program that is loaded into your computer without your
knowledge and runs against your wishes
• Install a security suite that protect the computer against
threats such as viruses and worms.
• Hackers are the person who use computer system to gain access to
another system.
• They use there skills for specific goals like-
a) Stealing Money
b) Gaining Fame
c) Stoling Data
d) Destroying Data
.
Mainly hackers are of three types each
having particular goals-
• White Hat hacker
• Grey Hat hacker
• Black hat hacker
Black Hat’ Hackers
• The black hat hackers are also called bad guys. They are mainly
responsible for creating malware
• They use there skills to stole money and data by breaking the security
system
• They do illegal activity.
White Hat’ Hackers
• White-hat hackers, on the other hand, are good guys . They are also
called ethical hackers.
• These type of hackers usually work for company or organisation for
defensive purpose .
• They prevent computer and network against black hat hackers.
• They are generally not involved in the illegal activities
Grey Hat’ Hackers
• Grey hats exploit networks and computer systems in the way that black hats
do.
• They are doing legal as well as illegal work depending on what type of work
they are intersted
• They may provide security or may stole data and destroy the system
• It may be impossible to prevent computer hacking, however effective
security controls including strong password, and the use of firewalls can
helps.
• The word MALWARE comes from
the terms ''MALicious softWARE.''
• Malware is any software that
infects and damages a computer
system without the owner`s
knowledge or permission.
• Download an anti malware
program that also helps prevent
infections.
• Activate Network threat
protection, Firewall, Antivirus.
• Trojan horses are email viruses
that can duplicate themselves,
steal information, or harm the
computer system.
• These viruses are the most serious
threats to computer.
• Security suites, such as Avast
Internet Security, will prevent you
from downloading Trojans
Horses.
• To retrieve password for authorize access purpose (misplacing, missing)
due to various reason.
• Password attacks are by hackers that able to determine password or find
password to different protected electronic areas and social network sites.
Password characterstics
• No short length
• No birthday or phone number, real name, company
name
• Dont use complete words or quotes
eg-
*HELLO123: WEAK
*@(H3110)@: STRONG
these are easy to remember and hard to guess
• Use always strong password.
• Never use same password for two different sites.
• Dont use working or private email for every website
registration such as games, news.....etc
• Phishing is a method of trying to gather personal information
using deceptive e-mails and websites.
• Phishing attacks are the practice of sending fraudulent
communications that appear to come from a reputable source.
It is usually done through email. The goal is to steal sensitive
data like credit card and login information, or to install malware
on the victim’s machine. Phishing is a common type of cyber
attack that everyone should learn about in order to protect
themselves.
1)In 2016, 3 billion Yahoo accounts were hacked in one of the biggest
breaches of all time.
2)In 2016, Uber reported that hackers stole the information of over 57
million riders and drivers.
3)31% of organizations have experienced cyber attacks on operational
technology infrastructure. (Cisco)
4)In 2017, 412 million user accounts were stolen from Friendfinder’s sites.
5)100,000 groups in at least 150 countries and more than 400,000 machines
were infected by the Wannacry virus in 2017, at a total cost of around $4
billion.
• Use antivirus software
• Insert firewalls.
• Uninstall unnecessary software.
• Maintain backup.
• Check security setting.
• Never give your full name or address to strangers.
• Learn more about internet privacy.
• It will Defend us from hacks and virus.
• It helps us to Browse the safe website.
• the cyber security will defend us from critical attacks
• The application of cyber security used in our PC needs update
every week.
• The security developers will update their database every week
once.Hence the new virus also detected.
CYBER SECURITY

Mais conteúdo relacionado

Mais procurados

Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 

Mais procurados (20)

Hacking
HackingHacking
Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Semelhante a CYBER SECURITY

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 

Semelhante a CYBER SECURITY (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
cyber security
cyber security cyber security
cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Último

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Último (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

CYBER SECURITY

  • 2. • Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security. • With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also. • The objective of cyber security is to establish rules and measure to use against attacks over the internet.
  • 3. • Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers to infect them with viruses, which are then spread to other machines and, sometimes, entire networks. • Other forms include ''digital'', ''electronic'', ''virtual'', ''it'', high-tech and technologly-enabled crime.
  • 4. • We can categorize cyber in two ways:- • The computer as a target: Using a computer to attacks other computer. e.g.-Hacking, Virus/worms attacks, DOS attack etc. > The computer as a weapon:Using a computer to commit real word crime. e.g.-credit card fraud etc.
  • 5. • 1969 professor of UCLA sent message to standard Resarch Institute ''login'' - ''lo'' • 1970 Bob Thomas created first virus namely ' Creeper' -“I’M THE CREEPER: CATCH ME IF YOU CAN.” - 1972 Reaper, the first antivirus software—which would chase Creeper and delete it. - 1986 Russian used Cyber power as weapons. • The first Virus was installed on an Apple Computer in 1982.
  • 6. • It is a criminal activity committed on the internet. • Cyber crime-where computer is either a tool or target or both.
  • 7. What is the meaning of the word CYBER What is the need of Cyber Security How to implanted and maintain security of a cyber field around us What are the security problems in CYBER field
  • 8. CYBER It is a combining form relating to information technology, the internet, and virtual reality.
  • 9. [ ] CYBER (Computer system, network ,program or data) SECURITY (System security, network security program or data security)
  • 10. • CYBER security is necessary since it helps in securing data from threats such as data theft or misuse , also safeguards from viruses.
  • 11. • To protect Private data. • To Protect Intellectual data. • To protect Banking or financial data. • National security . • Global Economy
  • 12. • Virus • Hacker • Malware • Trojan Horse • Password cracking • Phishing
  • 13. • A Virus is a program that is loaded into your computer without your knowledge and runs against your wishes
  • 14. • Install a security suite that protect the computer against threats such as viruses and worms.
  • 15.
  • 16. • Hackers are the person who use computer system to gain access to another system. • They use there skills for specific goals like- a) Stealing Money b) Gaining Fame c) Stoling Data d) Destroying Data .
  • 17. Mainly hackers are of three types each having particular goals- • White Hat hacker • Grey Hat hacker • Black hat hacker
  • 18. Black Hat’ Hackers • The black hat hackers are also called bad guys. They are mainly responsible for creating malware • They use there skills to stole money and data by breaking the security system • They do illegal activity. White Hat’ Hackers • White-hat hackers, on the other hand, are good guys . They are also called ethical hackers. • These type of hackers usually work for company or organisation for defensive purpose . • They prevent computer and network against black hat hackers. • They are generally not involved in the illegal activities
  • 19. Grey Hat’ Hackers • Grey hats exploit networks and computer systems in the way that black hats do. • They are doing legal as well as illegal work depending on what type of work they are intersted • They may provide security or may stole data and destroy the system
  • 20. • It may be impossible to prevent computer hacking, however effective security controls including strong password, and the use of firewalls can helps.
  • 21. • The word MALWARE comes from the terms ''MALicious softWARE.'' • Malware is any software that infects and damages a computer system without the owner`s knowledge or permission.
  • 22. • Download an anti malware program that also helps prevent infections. • Activate Network threat protection, Firewall, Antivirus.
  • 23. • Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. • These viruses are the most serious threats to computer.
  • 24. • Security suites, such as Avast Internet Security, will prevent you from downloading Trojans Horses.
  • 25. • To retrieve password for authorize access purpose (misplacing, missing) due to various reason. • Password attacks are by hackers that able to determine password or find password to different protected electronic areas and social network sites.
  • 26. Password characterstics • No short length • No birthday or phone number, real name, company name • Dont use complete words or quotes eg- *HELLO123: WEAK *@(H3110)@: STRONG these are easy to remember and hard to guess
  • 27. • Use always strong password. • Never use same password for two different sites. • Dont use working or private email for every website registration such as games, news.....etc
  • 28. • Phishing is a method of trying to gather personal information using deceptive e-mails and websites. • Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.
  • 29.
  • 30. 1)In 2016, 3 billion Yahoo accounts were hacked in one of the biggest breaches of all time. 2)In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers. 3)31% of organizations have experienced cyber attacks on operational technology infrastructure. (Cisco) 4)In 2017, 412 million user accounts were stolen from Friendfinder’s sites. 5)100,000 groups in at least 150 countries and more than 400,000 machines were infected by the Wannacry virus in 2017, at a total cost of around $4 billion.
  • 31. • Use antivirus software • Insert firewalls. • Uninstall unnecessary software. • Maintain backup. • Check security setting. • Never give your full name or address to strangers. • Learn more about internet privacy.
  • 32. • It will Defend us from hacks and virus. • It helps us to Browse the safe website. • the cyber security will defend us from critical attacks • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once.Hence the new virus also detected.