SlideShare uma empresa Scribd logo
1 de 19
Content
• Cyber security
• types of security
• Why is cyber security
• Prevention of Cyber safety
• Cyber forensics
• Why is cyber forensics
• Cyber forensic activity
• Low of cyber criminal activity
Cyber security
• We define that the cyber-security as a measure
protecting computer systems, networks, and
information from disruption or unauthorized
access, use, disclosure, modification.
What Does it Mean- “Security”?
• “Security” is the quality or state of being secure--to
be free from danger. The types of security we have to
be concern with..
• Physical security - addresses the issues necessary
to protect the physical items, objects or areas of an
organization from unauthorized access and misuse.
• Personal security - addresses the protection of
the individual or group of individuals who are
authorized to access the organization and its
operations.
What Does it Mean- “Security”?
• Communications security - concerned with the
protection of an organization’s communications
media, technology, and content.
• Network security is the protection of networking
components, connections, and contents.
• Information Security – protection of
information and its critical elements, including the
systems and hardware that use, store, or transmit
that information.
Why is cyber security
• Government, military, corporations, financial
institution, hospitals and other businesses
collect, process and stores a great deal of
confidential information on computer and
transmit the data across networks to other
computer.
• So with the growing volume of cyber attack we
need to be secure sensitive business and
personal information.
Cyber risk can divided into 2 types
• Cyber crime
• Cyber terror
?
?
Cyber crime
• Cyber crime is a term for any illegal activity that
uses a computer as its primary means of stealing
confidential data or information.
• Cybercrime is nothing but where the
computer used as an object or subject of
crime.
history
• The first recorded cyber crime took place in the
year 1820.
Prevention of Cyber safety
• Running Anti-Virus Software
• Preventing Identity Theft:
Don’t give out financial account numbers, Social
Security numbers, driver’s license numbers or
other personal identity information.
Prevention of Cyber safety
• Switching on Personal Firewalls: Firewalls
work as the protection layers between the
internet and computers.
• Beware of phishing scams : Never enter
personal information into an online form you
accessed via a link in and any email from an
unknown email id.
Prevention of Cyber safety
Protecting passwords: Make sure that not to
share your passwords, and make sure to create new
passwords which are hard to guess . Avoid :
common passwords like; abc123, iloveyou1, let
me in, qwerty1, (yourname1), password1 and
baseball1.
Prevention of Cyber safety
• Authentication of data :It should be checked
if it has originated from a trusted and a reliable
source . ex: https.
• Back up of an important file: reduce the risk
of losing our important files to a virus.
Cyber security glossary of
• Phishing
• Trojans
• Viruses
• Worms
• Spyware/adware
• Ransomeware
Cyber forensics
• The scientific examination and analysis of
digital evidence in such a way that the
information can be used as evidence in court of
low.
why
• The main task of cyber forensic is to catch the
culprit or the criminal who is involved in the
crime related to the cyber and handling the
criminal action such as fraud, phishing ,identity
theft or many other criminal activities.
Cyber forensic activity
• Secure : the collection of data
• Identification : of suspect data
• Examination : of suspect data to determine
details such as origin and content
• Analysis : on every perspective
• Presentation / Report : of computer based
information of court of low
Low of cyber criminal activity
(Indian perspective)
• 66F : punishment for cyber terrorism
• 66E : punishment for violation of privacy
• 66C : punishment for theft identity
• 66 : computer related offences
• 67 :punishment for publishing or transmitting
obscene material in electronic form
Goto index

Mais conteúdo relacionado

Mais procurados

Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 

Mais procurados (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Online security
Online securityOnline security
Online security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber intelligence-services
Cyber intelligence-servicesCyber intelligence-services
Cyber intelligence-services
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
Cyber security
Cyber securityCyber security
Cyber security
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 

Semelhante a Cyber

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Semelhante a Cyber (20)

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 

Mais de pooja kumari (10)

Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Queue
QueueQueue
Queue
 
Introduction to linked lists
Introduction to linked listsIntroduction to linked lists
Introduction to linked lists
 
Thread.ppt
Thread.pptThread.ppt
Thread.ppt
 
Thread.ppt
Thread.pptThread.ppt
Thread.ppt
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in java
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in java
 
Applet
AppletApplet
Applet
 
Exception handling
Exception handlingException handling
Exception handling
 
Sql seuence and sub queries
Sql seuence and sub queriesSql seuence and sub queries
Sql seuence and sub queries
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyber

  • 1.
  • 2. Content • Cyber security • types of security • Why is cyber security • Prevention of Cyber safety • Cyber forensics • Why is cyber forensics • Cyber forensic activity • Low of cyber criminal activity
  • 3. Cyber security • We define that the cyber-security as a measure protecting computer systems, networks, and information from disruption or unauthorized access, use, disclosure, modification.
  • 4. What Does it Mean- “Security”? • “Security” is the quality or state of being secure--to be free from danger. The types of security we have to be concern with.. • Physical security - addresses the issues necessary to protect the physical items, objects or areas of an organization from unauthorized access and misuse. • Personal security - addresses the protection of the individual or group of individuals who are authorized to access the organization and its operations.
  • 5. What Does it Mean- “Security”? • Communications security - concerned with the protection of an organization’s communications media, technology, and content. • Network security is the protection of networking components, connections, and contents. • Information Security – protection of information and its critical elements, including the systems and hardware that use, store, or transmit that information.
  • 6. Why is cyber security • Government, military, corporations, financial institution, hospitals and other businesses collect, process and stores a great deal of confidential information on computer and transmit the data across networks to other computer. • So with the growing volume of cyber attack we need to be secure sensitive business and personal information.
  • 7. Cyber risk can divided into 2 types • Cyber crime • Cyber terror ? ?
  • 8. Cyber crime • Cyber crime is a term for any illegal activity that uses a computer as its primary means of stealing confidential data or information. • Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 9. history • The first recorded cyber crime took place in the year 1820.
  • 10. Prevention of Cyber safety • Running Anti-Virus Software • Preventing Identity Theft: Don’t give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information.
  • 11. Prevention of Cyber safety • Switching on Personal Firewalls: Firewalls work as the protection layers between the internet and computers. • Beware of phishing scams : Never enter personal information into an online form you accessed via a link in and any email from an unknown email id.
  • 12. Prevention of Cyber safety Protecting passwords: Make sure that not to share your passwords, and make sure to create new passwords which are hard to guess . Avoid : common passwords like; abc123, iloveyou1, let me in, qwerty1, (yourname1), password1 and baseball1.
  • 13. Prevention of Cyber safety • Authentication of data :It should be checked if it has originated from a trusted and a reliable source . ex: https. • Back up of an important file: reduce the risk of losing our important files to a virus.
  • 14. Cyber security glossary of • Phishing • Trojans • Viruses • Worms • Spyware/adware • Ransomeware
  • 15. Cyber forensics • The scientific examination and analysis of digital evidence in such a way that the information can be used as evidence in court of low.
  • 16. why • The main task of cyber forensic is to catch the culprit or the criminal who is involved in the crime related to the cyber and handling the criminal action such as fraud, phishing ,identity theft or many other criminal activities.
  • 17. Cyber forensic activity • Secure : the collection of data • Identification : of suspect data • Examination : of suspect data to determine details such as origin and content • Analysis : on every perspective • Presentation / Report : of computer based information of court of low
  • 18. Low of cyber criminal activity (Indian perspective) • 66F : punishment for cyber terrorism • 66E : punishment for violation of privacy • 66C : punishment for theft identity • 66 : computer related offences • 67 :punishment for publishing or transmitting obscene material in electronic form