O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.


Presentation on Cyber security

  • Entre para ver os comentários

  • Seja a primeira pessoa a gostar disto


  1. 1. Presentation by: Chandrasekhar B
  2. 2. Introduction  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  3. 3. NEED FOR CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  4. 4. MAJOR SECURITY PROBLEMS  Virus  Hackers  Malwares  Trojan horses  Password cracking
  5. 5. VIRUSES AND WORMS  A Virus is a program that is loaded onto your computer without your knowledge and runs against your wishes
  6. 6. SOLUTION Install a security suite that protects the computer against threats such as viruses and worms.
  7. 7. HACKERS  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  8. 8. HOW TO PREVENT HACKING  Sometimes it may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  9. 9. TROJAN HORSES  A Trojan horse virus is a malware program that attaches itself to an innocuous file and embeds itself in your system  These viruses are the most serious threats to computers
  10. 10. HOW TO AVOID TROJANS  Security suites, such as Avast Internet Security, Mcafee etc., will prevent you from downloading Trojan Horses.
  11. 11. PASSWORD CRACKING  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  12. 12. SECURING PASSWORD  Use always Strong password.  Never use same password for two different sites.
  14. 14.  Cyber Security Strategy — India Security Policy, Compliance and Assurance — Legal Framework -IT Act, 2000. -IT(Amendment) Bill, 2006 — Data Protection & Computer crimes -Best Practice ISO 27001 -Security Assurance Framework- IT/ITES/BPO Companies Security Incident— Early Warning & Response -CERT-ln National Cyber Alert System -Information Exchange With international CERTs Capacity building -Skill & Competence development. -Training Of law enforcement agencies and judicial Officials in the collection and analysis Of digital evidence. -Training in the area Of implementing information security in collaboration With Specialised organisations in US.
  15. 15. Setting up Digital Forensics Centres: -Domain Specific training — Cyber Forensics Research and Development -Network Monitoring -biometric Authentication -Network Security International Collaboration
  16. 16. They want what you’ve got Don’t give it to them.