Cyber Security and Cyber Awareness

DO YOU FEEL SAFE
ON THE INTERNET ?
AIM
 The objective of this presentation is to educate and create
awareness amongst the student community on use of
Technology, Internet media and its implications on possible
cyber crimes.
 Some of the possible preventive measures, one can take to
avoid getting victimized for a cyber crime
CYBER WORLD
• Cyber world is the world of internet and internet related things.
• Simply it is as part of IOT or in consist of IOT.
HOW YOU CONNECTED
• We use FACEBOOK like social medias on the internet
• We do internet banking
• We do online shopping
• We browse many things through internet
• we all this done with the help of computers and phones
CYBER CRIME
• some criminal minded persons commit crimes here, which is
included under cyber-crime.
• So we should be aware about crimes happening around in the
cyber-space.
• Cyber crime refers to any crime that involves a computer/mobile
and a network. The computer may have been used in the
commission of a crime, or it may be the target.
Simple Theory
• When you purchase a home it comes with a door and a
lock. You always ensure that the door/lock exist and
working properly. You may even purchase security systems.
• Well, why would you not secure your investments?
• Likewise, Your System is your home and security tools are
your door/lock and security tools.
• So if someone breaches into your home’s(System), accesses all
your personal accounts and tampers your data, is the criminal
who is committing the crime.
• And committed crime is known as cyber-crime.
• Cyber crime is an illegal activity committed on the internet.
• Money
• Curiosity
• Revenge
• Fun
• Praise seekers
MOTIVATION
CYBER CRIME CATEGORIES
• Against Persons
• Against Property
• Against Government
1. Against Persons :
• Cybercrimes committed against persons include various crimes
like transmission of child-pornography, harassment of any one
with the use of a computer such as e-mail, and cyber-stalking.
• The distribution, posting, and dissemination of obscene material
including pornography, indecent exposure, and child
pornography, constitutes one of the most important Cybercrimes
known today. The potential harm of such a crime to humanity
can hardly be overstated.
2. Against Property :
• The second category of Cybercrimes is that of Cybercrimes
against all forms of property. These crimes include
unauthorized computer trespassing through cyberspace,
computer vandalism, transmission of harmful programs, and
unauthorized possession of computerized information.
3. Against Government :
• The third category of Cybercrimes relate to Cybercrimes
against Government. Cyber Terrorism is one distinct kind of
crime in this category. The growth of Internet has shown
that the medium of Cyberspace is being used by individuals
and groups to the international governments as also to
threaten the citizens of a country. This crime manifests itself
into terrorism when an individual "cracks“ into a government
or military maintained website.
These are also CYBER CRIME
• HACKING
• CHILD PORNOGRAPHY
• DENIAL OF SERVICE ATTACK
• VIRUS DISSEMINITION
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
1. Hacking
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as CRACKING.
Government websites are the hot targets of the hackers due to
the press coverage, it receives. Hackers enjoy the media
coverage.
2. Child Pornography
The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. As more homes have access
to internet, more children would be using the internet and more
are the chances of falling victim to the aggression of pedophiles.
3. Denial of Service Attack
This is an act by the criminal, who floods the bandwidth of the
victims network or fills his e-mail box with spam mail depriving him
of the services he is entitled to access or provide
4. Virus Dissemination
Malicious software that attaches itself to other software or
computer system and then propagates itself to other computers
via networks or disks. (virus, worms, Trojan Horse, web jacking, e-
mail bombing etc)
5. Computer Vandalism
Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting virus: These are
programs that attach themselves to a file and then circulate .
6. Cyber Terrorism
Terrorist attacks on the Internet is by distributed denial of service
attacks, hate websites and hate emails, attacks on sensitive
computer networks, etc. Technology savvy terrorists are using
512-bit encryption, which is impossible to decrypt.
7. Software Piracy
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
CYBER SECURITY
• Internet security is a branch of computer security specifically
related to the Internet.
• It's objective is to establish rules and measure to use against
attacks over the Internet. 
HOW SAFE FROM CYBER-CRIME
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
Cont..
• Learn ‘Etiquette' - follow it and expect it from others
• Don't respond to harassing or negative messages (flames)
• Get out of uncomfortable or hostile situations quickly
• Save offending messages
• Learn more about Internet privacy
CYBER-SECURITY ADVANTAGES
• The cyber security will defend us from critical attacks.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing data on
our computer.
Cont..
• Security will defend from hacks and virus.
• The application of cyber security used in our PC needs update
every week.
• The security developers will update their database every week
once. Hence the new virus also deleted.
THANK YOU
1 sur 26

Recommandé

Cybersecurity Awareness Training Presentation v1.3 par
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
2.5K vues47 diapositives
Cyber crime.pptx par
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptxDawood Faheem Abbasi
4K vues35 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
57.7K vues25 diapositives
Cyber crime & security par
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
4.2K vues34 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Hyphenet Security Awareness Training par
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
1.5K vues65 diapositives

Contenu connexe

Tendances

Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
2.9K vues19 diapositives
Cyber Security and Cyber Awareness par
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
855 vues44 diapositives
Ppt par
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
Cyber security training par
Cyber security trainingCyber security training
Cyber security trainingWilmington University
8.9K vues16 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.9K vues12 diapositives
Introduction to Cyber Security par
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityQuick Heal Technologies Ltd.
5.3K vues30 diapositives

Tendances(20)

Cyber crime and security par Akash Dhiman
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Cyber Security and Cyber Awareness par Jay Nagar
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar855 vues
Cyber Crime And Security par ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cybersecurity Awareness Training par Dave Monahan
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan1.6K vues
14 tips to increase cybersecurity awareness par Michel Bitter
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter552 vues
Cyber security par Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K vues
CyberSecurity and Importance of cybersecurity par Home
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
Home455 vues
Cyber security awareness for end users par NetWatcher
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher2.6K vues
ICT and end user security awareness slides par jubke
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
jubke1K vues
Cyber Security Awareness Training by Win-Pro par Ronald Soh
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh882 vues

Similaire à Cyber Security and Cyber Awareness

Cyber Crime par
Cyber CrimeCyber Crime
Cyber Crimeshubham ghimire
23.4K vues38 diapositives
Cyber_Crime_Security.pptx par
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptxbcanawakadalcollege
20 vues33 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeAfnanHusain
296 vues10 diapositives
CYBER CRIME AND SECURITY par
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
666 vues33 diapositives
Cybercrime par
CybercrimeCybercrime
CybercrimeSERCOD
2.1K vues29 diapositives
Cybercrimes par
CybercrimesCybercrimes
CybercrimesFit Tri
461 vues20 diapositives

Similaire à Cyber Security and Cyber Awareness(20)

CYBER CRIME AND SECURITY par Chaya Sorir
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir666 vues
Cybercrime par SERCOD
CybercrimeCybercrime
Cybercrime
SERCOD2.1K vues
Cybercrimes par Fit Tri
CybercrimesCybercrimes
Cybercrimes
Fit Tri461 vues
Cyber Crime par zahid_ned
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned1.5K vues
cyber crime and privacy issues by varun call for assistence 8003498888 par Varun Mathur
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
Varun Mathur4.3K vues
Cyber security presentation par sweetpeace1
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues

Dernier

IETF 118: Starlink Protocol Performance par
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
354 vues22 diapositives
Is Entireweb better than Google par
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Googlesebastianthomasbejan
12 vues1 diapositive
WEB 2.O TOOLS: Empowering education.pptx par
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 vues16 diapositives
Marketing and Community Building in Web3 par
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 vues64 diapositives
Building trust in our information ecosystem: who do we trust in an emergency par
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
106 vues18 diapositives
information par
informationinformation
informationkhelgishekhar
9 vues4 diapositives

Dernier(9)

IETF 118: Starlink Protocol Performance par APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC354 vues
Marketing and Community Building in Web3 par Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 vues
Building trust in our information ecosystem: who do we trust in an emergency par Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat106 vues
PORTFOLIO 1 (Bret Michael Pepito).pdf par brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 vues
How to think like a threat actor for Kubernetes.pptx par LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 vues

Cyber Security and Cyber Awareness

  • 1. DO YOU FEEL SAFE ON THE INTERNET ?
  • 2. AIM  The objective of this presentation is to educate and create awareness amongst the student community on use of Technology, Internet media and its implications on possible cyber crimes.  Some of the possible preventive measures, one can take to avoid getting victimized for a cyber crime
  • 3. CYBER WORLD • Cyber world is the world of internet and internet related things. • Simply it is as part of IOT or in consist of IOT.
  • 4. HOW YOU CONNECTED • We use FACEBOOK like social medias on the internet • We do internet banking • We do online shopping • We browse many things through internet • we all this done with the help of computers and phones
  • 5. CYBER CRIME • some criminal minded persons commit crimes here, which is included under cyber-crime. • So we should be aware about crimes happening around in the cyber-space. • Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 6. Simple Theory • When you purchase a home it comes with a door and a lock. You always ensure that the door/lock exist and working properly. You may even purchase security systems. • Well, why would you not secure your investments? • Likewise, Your System is your home and security tools are your door/lock and security tools. • So if someone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.
  • 7. • And committed crime is known as cyber-crime. • Cyber crime is an illegal activity committed on the internet.
  • 8. • Money • Curiosity • Revenge • Fun • Praise seekers MOTIVATION
  • 9. CYBER CRIME CATEGORIES • Against Persons • Against Property • Against Government
  • 10. 1. Against Persons : • Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail, and cyber-stalking. • The distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated.
  • 11. 2. Against Property : • The second category of Cybercrimes is that of Cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
  • 12. 3. Against Government : • The third category of Cybercrimes relate to Cybercrimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
  • 13. These are also CYBER CRIME • HACKING • CHILD PORNOGRAPHY • DENIAL OF SERVICE ATTACK • VIRUS DISSEMINITION • COMPUTER VANDALISM • CYBER TERRORISM • SOFTWARE PIRACY
  • 14. 1. Hacking Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 15. 2. Child Pornography The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 16. 3. Denial of Service Attack This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 17. 4. Virus Dissemination Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, worms, Trojan Horse, web jacking, e- mail bombing etc)
  • 18. 5. Computer Vandalism Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 19. 6. Cyber Terrorism Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 20. 7. Software Piracy Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 21. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet. 
  • 22. HOW SAFE FROM CYBER-CRIME • Use antivirus software’s • insert firewalls • uninstall unnecessary software • maintain backup • check security settings • Stay anonymous - choose a genderless screen name • Never give your full name or address to strangers
  • 23. Cont.. • Learn ‘Etiquette' - follow it and expect it from others • Don't respond to harassing or negative messages (flames) • Get out of uncomfortable or hostile situations quickly • Save offending messages • Learn more about Internet privacy
  • 24. CYBER-SECURITY ADVANTAGES • The cyber security will defend us from critical attacks. • It helps us to browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 25. Cont.. • Security will defend from hacks and virus. • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once. Hence the new virus also deleted.