SlideShare a Scribd company logo
1 of 23
Security
WHAT IS SECURITY?
E-com seminar
Computer/IT
security
Computer or IT security
 It is the protection of information systems
 From theft or damage to the hardware,the
software and to the information on them.
What is a security breach ?
 It is a break-in.
 Eg : if someone smashes a window and
climbe’s into your home, that’s a security
breach.
 If the intruder snatches your documents and
personal information and climbs back out the
window , that’s a data breach!
 Security breaches happen a lot- not in your
house , but in large and small organisations.
Types of security Breaches
 Attackers can use different types of security
breaches.
1. Probe
2. Scan
3. Account compromise
4. Root compromise
5. Packet sniffer
6. Denial of service
7. Exploitation of trust
8. Malicious code
9. Internet infrastructure attacks
Main 3
 Virus
 Spyware
 Malware
Virus
Spyware
How it can be injected to your
system?
Through
 Trojans
 Viruses
 Ransomware
 Adware
 Rootkits
 Worms etc
Ransomware
 First ransomware was created by Russian
criminals in 2005
 It is a type of malware that treatens to publish
victims data
 Or purposefully blockes access to it unless a
ransom is paid.
 Files are zipped and password protected.
How does it attack ?
From where do this comes?
 Spam emails
 Misleading links
 Fake software updates
 Exploiting vulnerabilities in web browser and
popular softwares.
Trojan
s It is known as trojan horse
 It looks like a normal application
 But it carries the virus inside it
 It comes out when positive situation comes
Story of Trojan Horse
Malware
 It is a software intentionally designed to cause
damage to a computer , server , client or
computer network
Types of Malware
 Ransomware
 Credential stealers
 Trojan horse
 Keyloggers
 Rootkits
 Miner
Keylogger
 Technology/virus used to monitor and record
each keystroke typed
Advantages
• Parents to supervise children’s internet
useage.
• Device owners to track unauthorised activities
Phishing example

More Related Content

What's hot

Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
amiyadutta
 

What's hot (19)

Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security
Cyber securityCyber security
Cyber security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to What is IT security[1]

Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
BUSHRASHAIKH804312
 

Similar to What is IT security[1] (20)

Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Malware
MalwareMalware
Malware
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 

More from justin johnson (7)

Most viewed youtube vedios
Most viewed youtube vediosMost viewed youtube vedios
Most viewed youtube vedios
 
Most visited cities in the world
Most visited cities in the worldMost visited cities in the world
Most visited cities in the world
 
Countries with the most deaths from selfies
Countries with the most deaths from selfiesCountries with the most deaths from selfies
Countries with the most deaths from selfies
 
Top 5 Commodities produced in india
 Top 5 Commodities produced in india Top 5 Commodities produced in india
Top 5 Commodities produced in india
 
Top 5 Cashew nut producing countries
Top 5 Cashew nut producing countriesTop 5 Cashew nut producing countries
Top 5 Cashew nut producing countries
 
After lockdown
After lockdownAfter lockdown
After lockdown
 
What to do after +2
What to do after +2What to do after +2
What to do after +2
 

Recently uploaded

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

What is IT security[1]

  • 4. Computer or IT security  It is the protection of information systems  From theft or damage to the hardware,the software and to the information on them.
  • 5. What is a security breach ?  It is a break-in.  Eg : if someone smashes a window and climbe’s into your home, that’s a security breach.  If the intruder snatches your documents and personal information and climbs back out the window , that’s a data breach!  Security breaches happen a lot- not in your house , but in large and small organisations.
  • 6. Types of security Breaches  Attackers can use different types of security breaches. 1. Probe 2. Scan 3. Account compromise 4. Root compromise 5. Packet sniffer 6. Denial of service 7. Exploitation of trust 8. Malicious code 9. Internet infrastructure attacks
  • 7. Main 3  Virus  Spyware  Malware
  • 10. How it can be injected to your system? Through  Trojans  Viruses  Ransomware  Adware  Rootkits  Worms etc
  • 11.
  • 12. Ransomware  First ransomware was created by Russian criminals in 2005  It is a type of malware that treatens to publish victims data  Or purposefully blockes access to it unless a ransom is paid.  Files are zipped and password protected.
  • 13. How does it attack ?
  • 14. From where do this comes?  Spam emails  Misleading links  Fake software updates  Exploiting vulnerabilities in web browser and popular softwares.
  • 15. Trojan s It is known as trojan horse  It looks like a normal application  But it carries the virus inside it  It comes out when positive situation comes
  • 17.
  • 18.
  • 19. Malware  It is a software intentionally designed to cause damage to a computer , server , client or computer network
  • 20. Types of Malware  Ransomware  Credential stealers  Trojan horse  Keyloggers  Rootkits  Miner
  • 21.
  • 22. Keylogger  Technology/virus used to monitor and record each keystroke typed Advantages • Parents to supervise children’s internet useage. • Device owners to track unauthorised activities