3. Title and Content Layout with List
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
4. What is cyber crime?
The former descriptions were
"computer crime", "computer-
related crime" or "crime by
computer". With the pervasion of
digital technology, some new terms
like "high-technology" or
"information-age" crime were
added to the definition. Also,
Internet brought other new terms,
like "cybercrime" and "net" crime.
Other forms include "digital",
"electronic", "virtual" , "IT", "high-tech"
and technology-enabled" crime .
5. What is cyber security?
Security is “Freedom from risk or danger.“
The ability of a system to protect information and system resources
with respect to confidentiality and integrity.
Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the
number of successful cyber security attacks.
Cyber security refers to the technologies and processes designed to
protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the Internet by cyber
criminals.
Though, cyber security is important for network, data and
application security.
6. What is…?
Communication Security- Protecting organization communication
media , technology , and content.
Network Security- Network Security is the protection of networking
components, connection and content.
Information Security- Information Security is protection of
information and its critical elements , including the systems and
hardware that use , store or transmit that information.
7. History
The first recorded cyber crime took place in the year 1820.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a fear amongst Jacquard’s
employees that their traditional employment and livelihood were being
threatened. They committed acts of sabotage to discourage Jacquard
from further use of the new technology. This is the first recorded cyber
crime.
During the 1980s, the hackers and crimes were beginning to emerge.
CERT was created to overcome network security issues.
In the 1990s, Internet became public and the security concerns increased
tremendously.
8. Cyber crimes includes
Illegal access
Illegal Interception
System Interference
Data Interference
Misuse of devices
Fraud
9. Why should we care?
It is a criminal activity
committed on the internet.
Cyber crime-Where computer
is either a tool or target or
both.
10. Main Objectives of Cyber Security
Secure Access
Confidentiality
Authentication
Integrity
Non-repudiation
11. How can we protect?
Read Privacy policy carefully when you submit the data through
internet.
Encryption: lots of website uses SSL (secure socket layer)to encrypt a
data.
Disable remote connectivity.
12. Working process of Cyber Security
We need multiple layers of security.
Cyber Security is accomplished through hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall
Intrusion prevention systems
Virtual Private Networks
14. Public Key Cryptography (PKC)
Hash Function
Hash Function
Plain Text Cipher Text
15. Firewall
A typical border control
mechanism.
Metaphor for network security.
Designed to prevent
unauthorized access to or
from a private network.
17. Advantage of cyber security
It will defend from hacks and virus.
The application of cyber security used in our PC needs update
every week.
The security developers will update their database every week
once. Hence the new virus also deleted.
18. Safety tips …
Use antivirus software
Insert firewalls , pop up blocker
Uninstall unnecessary software
Maintain backup
Check security settings
Use secure connection
Open attachments carefully
Use strong passwords , don’t give personal information unless
required
19. Conclusion
The only system which is truly secure is one which is switched off and
unplugged.
As security tweaks, threats tremendously tweaks.