SlideShare uma empresa Scribd logo
1 de 20
CYBER SECURITY
Subtitle
Action against cyber crime.
Title and Content Layout with List
 Click to edit Master text styles
 Second level
 Third level
 Fourth level
 Fifth level
What is cyber crime?
 The former descriptions were
"computer crime", "computer-
related crime" or "crime by
computer". With the pervasion of
digital technology, some new terms
like "high-technology" or
"information-age" crime were
added to the definition. Also,
Internet brought other new terms,
like "cybercrime" and "net" crime.
 Other forms include "digital",
"electronic", "virtual" , "IT", "high-tech"
and technology-enabled" crime .
What is cyber security?
 Security is “Freedom from risk or danger.“
 The ability of a system to protect information and system resources
with respect to confidentiality and integrity.
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the
number of successful cyber security attacks.
 Cyber security refers to the technologies and processes designed to
protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the Internet by cyber
criminals.
 Though, cyber security is important for network, data and
application security.
What is…?
 Communication Security- Protecting organization communication
media , technology , and content.
 Network Security- Network Security is the protection of networking
components, connection and content.
 Information Security- Information Security is protection of
information and its critical elements , including the systems and
hardware that use , store or transmit that information.
History
 The first recorded cyber crime took place in the year 1820.
 In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a fear amongst Jacquard’s
employees that their traditional employment and livelihood were being
threatened. They committed acts of sabotage to discourage Jacquard
from further use of the new technology. This is the first recorded cyber
crime.
 During the 1980s, the hackers and crimes were beginning to emerge.
 CERT was created to overcome network security issues.
 In the 1990s, Internet became public and the security concerns increased
tremendously.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Why should we care?
 It is a criminal activity
committed on the internet.
 Cyber crime-Where computer
is either a tool or target or
both.
Main Objectives of Cyber Security
 Secure Access
 Confidentiality
 Authentication
 Integrity
 Non-repudiation
How can we protect?
 Read Privacy policy carefully when you submit the data through
internet.
 Encryption: lots of website uses SSL (secure socket layer)to encrypt a
data.
 Disable remote connectivity.
Working process of Cyber Security
 We need multiple layers of security.
 Cyber Security is accomplished through hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall
Intrusion prevention systems
Virtual Private Networks
Network Security Technology
Cryptographic Systems:
 Secret Key Cryptography (SKC)
 Public Key Cryptography (PKC)
 Hash Function
Hash Function
Plain Text Cipher Text
Firewall
 A typical border control
mechanism.
 Metaphor for network security.
 Designed to prevent
unauthorized access to or
from a private network.
Security Tools
 Antivirus software packages
 Firewalls
 SSL secure connection
 Secure network infrastructure
 DNS hardware and software
 Virtual private network
 Identity services
 Encryption
 Security management
 Monitoring of incoming traffic
Advantage of cyber security
 It will defend from hacks and virus.
 The application of cyber security used in our PC needs update
every week.
 The security developers will update their database every week
once. Hence the new virus also deleted.
Safety tips …
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information unless
required
Conclusion
 The only system which is truly secure is one which is switched off and
unplugged.
 As security tweaks, threats tremendously tweaks.
Thank You
By,
KRISHANU GHOSH

Mais conteúdo relacionado

Mais procurados

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Mais procurados (20)

cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Destaque (7)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
MHA Housing Power Point
MHA Housing Power PointMHA Housing Power Point
MHA Housing Power Point
 
Passaic County Expansion
Passaic County ExpansionPassaic County Expansion
Passaic County Expansion
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying keynote
Cyberbullying keynoteCyberbullying keynote
Cyberbullying keynote
 
Cyber Bullying PSA
Cyber Bullying PSACyber Bullying PSA
Cyber Bullying PSA
 
Bullying
BullyingBullying
Bullying
 

Semelhante a Cyber security

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 

Semelhante a Cyber security (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Mian
MianMian
Mian
 
Mian
MianMian
Mian
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Cyber security

  • 1.
  • 3. Title and Content Layout with List  Click to edit Master text styles  Second level  Third level  Fourth level  Fifth level
  • 4. What is cyber crime?  The former descriptions were "computer crime", "computer- related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.  Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .
  • 5. What is cyber security?  Security is “Freedom from risk or danger.“  The ability of a system to protect information and system resources with respect to confidentiality and integrity.  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 6. What is…?  Communication Security- Protecting organization communication media , technology , and content.  Network Security- Network Security is the protection of networking components, connection and content.  Information Security- Information Security is protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
  • 7. History  The first recorded cyber crime took place in the year 1820.  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.  During the 1980s, the hackers and crimes were beginning to emerge.  CERT was created to overcome network security issues.  In the 1990s, Internet became public and the security concerns increased tremendously.
  • 8. Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 9. Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.
  • 10. Main Objectives of Cyber Security  Secure Access  Confidentiality  Authentication  Integrity  Non-repudiation
  • 11. How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 12. Working process of Cyber Security  We need multiple layers of security.  Cyber Security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  • 13. Network Security Technology Cryptographic Systems:  Secret Key Cryptography (SKC)
  • 14.  Public Key Cryptography (PKC)  Hash Function Hash Function Plain Text Cipher Text
  • 15. Firewall  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  • 16. Security Tools  Antivirus software packages  Firewalls  SSL secure connection  Secure network infrastructure  DNS hardware and software  Virtual private network  Identity services  Encryption  Security management  Monitoring of incoming traffic
  • 17. Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 18. Safety tips …  Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 19. Conclusion  The only system which is truly secure is one which is switched off and unplugged.  As security tweaks, threats tremendously tweaks.