SlideShare uma empresa Scribd logo
1 de 15
What is Cyber Security
Engineering College In India | Avantika
University
Cyber Security is the practice of defending or controlling the
systems, programs, networks, data, and devices from
unauthorized access to data and baleful threats. Nowadays,
there are so many big companies and organizations that get
hit by cyber-attacks. Every day, in our day to day life, cyber-
crime news comes into the news, whether it’s related to big
hacks or data leaks, which ultimately highlights the need for
Cyber Security in today’s world.
What is Cyber Security
Let us have a look at why do we need Cyber Security and
why it has become very significant in today’s world:
With the importance of data on a global scale, information
war has become so common. There are a variety of big-big
companies and organizations for whom securing the data is
a challenging condition, and in such a situation, Cyber
Security is needed to protect the data.
Information Wars
Almost every company or organizations have their websites,
and hackers can access your data and devices illegally to
steal or destroy the company’s information. Cyber Security
provides protection from such hackers.
Increment in the Number of
Sophisticated Hackers
Breaches are the successful attempt of an attacker to
access the data in an unauthorized way, which may
involve the corruption of data or may also cause a theft to
the sensitive data. To protect the data and devices from
breaches, Cyber Security plays a significant role.
There is no doubt that in the coming future, the demand
for Cyber Security is going to increase as in professional
as well as in the personal front, as our data security
demand would rise definitely.
Breaches
In the future, the major focus would be on the Artificial
Intelligence (AI) to secure the devices and systems. Also,
the Multi-factor Authentication i.e., also known as 2-factor
authentication, is going to be used more so that whenever
the hacker makes an attempt to log in your account, a
secret code will be asked which will come on your mobile
number as an SMS.
Nowadays, many of the students dream of making their
careers in the field of Cyber Security. Many aspiring
students are enrolling in Top Engineering colleges in
MP to make a bright career in Cyber Security. Different
colleges in India offer Cyber Security courses with
different eligibility criteria at UG and PG levels. In general,
at UG level admission, a student must have passed 10+2
with Science Stream from a recognized board.
At PG level admission, a student must have completed their
graduation in Cyber Security and must hold at least 50%
marks in the qualifying examination from a recognized
board/university.
This field offers various career opportunities in the field.
Some of the popular job roles in the field of Cyber Security:
The security analyst analyses and address vulnerabilities
in the infrastructure such as hardware, network, and
software. He analyses and accesses the data which has
got damaged. Also, he examines recovery and
recommends solutions.
Security Analyst
The role of the Security Engineer is to monitor the security,
security analysis of data, and logs. He also uses new
technologies and processes to intensify security
potentiality.
Security Engineer
His task is to protect the computers, networks, software,
data, and systems against unauthorized access, viruses,
malware, etc. denial-of-service attacks, and an elevated
number of attacks by hackers working for individuals or
foreign governments. Considering the easy access to the
Internet and smart phones to every person, Cyber Security
is going to be the most demanding job in the future. With
increasing importance and scope, planning to have a
career in Cyber Security is a wise decision.
Security Consultant/Specialist
What is Cyber Security? Cyber Security is the practice of
defending or controlling the systems, programs, networks,
data, and devices from unauthorized access to data and
baleful threats.
Avantika University is the MIT Institute of Design in Ujjain,
MP. It follows a unique learning approach where the
students are encouraged to think out of the box. Avantika
University is the part of reputed MIT Pune.
Conclusion
THANK YOU

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Semelhante a What is Cyber Security - Avantika University

Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxmalik298381
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...null - The Open Security Community
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfStay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfonline Marketing
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultSOCVault
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfagupta3304
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.The Whole World News
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itSKIPS University
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfMax Secure Ltd
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaachuamal415
 

Semelhante a What is Cyber Security - Avantika University (20)

Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfStay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.it
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
 

Mais de Avantika University

Types of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika UniversityTypes of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika UniversityAvantika University
 
Fields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika UniversityFields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika UniversityAvantika University
 
Need of Software Engineering - Avantika University
Need of Software Engineering - Avantika UniversityNeed of Software Engineering - Avantika University
Need of Software Engineering - Avantika UniversityAvantika University
 
Advantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika UniversityAdvantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika UniversityAvantika University
 
Fashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika UniversityFashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika UniversityAvantika University
 
Elements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika UniversityElements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika UniversityAvantika University
 
Types of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika UniversityTypes of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika UniversityAvantika University
 
About Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika UniversityAbout Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika UniversityAvantika University
 
Scope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika UniversityScope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika UniversityAvantika University
 
Technology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika UniversityTechnology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika UniversityAvantika University
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Essential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika UniversityEssential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika UniversityAvantika University
 
Design Fundamentals - Avantika University
Design Fundamentals - Avantika UniversityDesign Fundamentals - Avantika University
Design Fundamentals - Avantika UniversityAvantika University
 
Top Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika UniversityTop Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika UniversityAvantika University
 
Elements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika UniversityElements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika UniversityAvantika University
 
Scope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika UniversityScope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika UniversityAvantika University
 
Elements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika UniversityElements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika UniversityAvantika University
 
Design Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika UniversityDesign Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika UniversityAvantika University
 
Importance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika UniversityImportance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika UniversityAvantika University
 
Fashion Design Careers - Avantika University
Fashion Design Careers - Avantika UniversityFashion Design Careers - Avantika University
Fashion Design Careers - Avantika UniversityAvantika University
 

Mais de Avantika University (20)

Types of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika UniversityTypes of Engineering Careers - Avantika University
Types of Engineering Careers - Avantika University
 
Fields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika UniversityFields in Fashion Designing - Avantika University
Fields in Fashion Designing - Avantika University
 
Need of Software Engineering - Avantika University
Need of Software Engineering - Avantika UniversityNeed of Software Engineering - Avantika University
Need of Software Engineering - Avantika University
 
Advantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika UniversityAdvantages of Artificial Intelligence - Avantika University
Advantages of Artificial Intelligence - Avantika University
 
Fashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika UniversityFashion Designing Career Options - Avantika University
Fashion Designing Career Options - Avantika University
 
Elements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika UniversityElements and Principles of Design - Avantika University
Elements and Principles of Design - Avantika University
 
Types of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika UniversityTypes of Designing Courses in India - Avantika University
Types of Designing Courses in India - Avantika University
 
About Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika UniversityAbout Computer Science Engineering - Avantika University
About Computer Science Engineering - Avantika University
 
Scope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika UniversityScope of Computer Engineering after 4 Years - Avantika University
Scope of Computer Engineering after 4 Years - Avantika University
 
Technology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika UniversityTechnology and its Uses in Our Life - Avantika University
Technology and its Uses in Our Life - Avantika University
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Essential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika UniversityEssential Factors of Product Design - Avantika University
Essential Factors of Product Design - Avantika University
 
Design Fundamentals - Avantika University
Design Fundamentals - Avantika UniversityDesign Fundamentals - Avantika University
Design Fundamentals - Avantika University
 
Top Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika UniversityTop Technologies to Learn in 2019 - Avantika University
Top Technologies to Learn in 2019 - Avantika University
 
Elements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika UniversityElements of Design in Clothing - Avantika University
Elements of Design in Clothing - Avantika University
 
Scope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika UniversityScope of Computer Engineering - Avantika University
Scope of Computer Engineering - Avantika University
 
Elements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika UniversityElements of Graphic Design - Avantika University
Elements of Graphic Design - Avantika University
 
Design Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika UniversityDesign Process in Fashion Designing - Avantika University
Design Process in Fashion Designing - Avantika University
 
Importance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika UniversityImportance of Design Thinking - Design Thinking Importance - Avantika University
Importance of Design Thinking - Design Thinking Importance - Avantika University
 
Fashion Design Careers - Avantika University
Fashion Design Careers - Avantika UniversityFashion Design Careers - Avantika University
Fashion Design Careers - Avantika University
 

Último

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

What is Cyber Security - Avantika University

  • 1. What is Cyber Security Engineering College In India | Avantika University
  • 2. Cyber Security is the practice of defending or controlling the systems, programs, networks, data, and devices from unauthorized access to data and baleful threats. Nowadays, there are so many big companies and organizations that get hit by cyber-attacks. Every day, in our day to day life, cyber- crime news comes into the news, whether it’s related to big hacks or data leaks, which ultimately highlights the need for Cyber Security in today’s world. What is Cyber Security
  • 3. Let us have a look at why do we need Cyber Security and why it has become very significant in today’s world:
  • 4. With the importance of data on a global scale, information war has become so common. There are a variety of big-big companies and organizations for whom securing the data is a challenging condition, and in such a situation, Cyber Security is needed to protect the data. Information Wars
  • 5. Almost every company or organizations have their websites, and hackers can access your data and devices illegally to steal or destroy the company’s information. Cyber Security provides protection from such hackers. Increment in the Number of Sophisticated Hackers
  • 6. Breaches are the successful attempt of an attacker to access the data in an unauthorized way, which may involve the corruption of data or may also cause a theft to the sensitive data. To protect the data and devices from breaches, Cyber Security plays a significant role. There is no doubt that in the coming future, the demand for Cyber Security is going to increase as in professional as well as in the personal front, as our data security demand would rise definitely. Breaches
  • 7. In the future, the major focus would be on the Artificial Intelligence (AI) to secure the devices and systems. Also, the Multi-factor Authentication i.e., also known as 2-factor authentication, is going to be used more so that whenever the hacker makes an attempt to log in your account, a secret code will be asked which will come on your mobile number as an SMS.
  • 8. Nowadays, many of the students dream of making their careers in the field of Cyber Security. Many aspiring students are enrolling in Top Engineering colleges in MP to make a bright career in Cyber Security. Different colleges in India offer Cyber Security courses with different eligibility criteria at UG and PG levels. In general, at UG level admission, a student must have passed 10+2 with Science Stream from a recognized board.
  • 9. At PG level admission, a student must have completed their graduation in Cyber Security and must hold at least 50% marks in the qualifying examination from a recognized board/university. This field offers various career opportunities in the field. Some of the popular job roles in the field of Cyber Security:
  • 10. The security analyst analyses and address vulnerabilities in the infrastructure such as hardware, network, and software. He analyses and accesses the data which has got damaged. Also, he examines recovery and recommends solutions. Security Analyst
  • 11. The role of the Security Engineer is to monitor the security, security analysis of data, and logs. He also uses new technologies and processes to intensify security potentiality. Security Engineer
  • 12. His task is to protect the computers, networks, software, data, and systems against unauthorized access, viruses, malware, etc. denial-of-service attacks, and an elevated number of attacks by hackers working for individuals or foreign governments. Considering the easy access to the Internet and smart phones to every person, Cyber Security is going to be the most demanding job in the future. With increasing importance and scope, planning to have a career in Cyber Security is a wise decision. Security Consultant/Specialist
  • 13. What is Cyber Security? Cyber Security is the practice of defending or controlling the systems, programs, networks, data, and devices from unauthorized access to data and baleful threats.
  • 14. Avantika University is the MIT Institute of Design in Ujjain, MP. It follows a unique learning approach where the students are encouraged to think out of the box. Avantika University is the part of reputed MIT Pune. Conclusion