cyber security

PRESENTED BY :
P.SHANMUKHA SRIKANTH
What is cyber security?
Cyber security standards are security standards which enable organizations to
practice safe security techniques to minimize the number of successful cyber
security attacks.
Cyber security refers to the technologies and processes designed to protect
computers, networks and data from unauthorized access, vulnerabilities and attacks
delivered via the Internet by cyber criminals.
Though, cyber security is important for network, data and application security
What is cyber crime?
 The former descriptions were "computer crime", "computer-related
crime" or "crime by computer". With the pervasion of digital technology,
some new terms like "high-technology" or "information-age" crime were
added to the definition. Also, Internet brought other new terms, like
"cybercrime" and "net" crime.
 Other forms include "digital", "electronic", "virtual" , "IT", "high-
tech" and technology-enabled" crime .
History
 The first recorded cyber crime was recorded in the year
1820.
 The first spam email took place in 1978 when it was sent
over the Arpanet.
 The first Virus was installed on an Apple Computer in
1982.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Why should we care?
 It is a criminal activity committed on the internet.
 Cyber crime-Where computer is either a tool or target or both.
How can we protect?
 Read Privacy policy carefully when you submit the data through internet.
 Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.
 Disable remote connectivity.
Advantage of cyber security :
 It will defend from hacks and virus.
 The application of cyber security used in our PC needs update every week.
 The security developers will update their database every week once. Hence the new virus also
deleted.
Safety tips …
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information unless required
Conclusion :
 The only system which is truly secure is one which is
switched off and unplugged.
 So , only way to be safe is Pay attention and Act
smart.
THANK YOU
1 sur 10

Recommandé

Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
3.9K vues8 diapositives
CybersecurityCybersecurity
CybersecurityForam Gosai
1.7K vues30 diapositives
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
10.7K vues22 diapositives
Cyber securityCyber security
Cyber securitySamsil Arefin
1.7K vues21 diapositives
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.4K vues26 diapositives
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives

Contenu connexe

Tendances

Cyber securityCyber security
Cyber securityRishav Sadhu
5.6K vues16 diapositives
Cyber security Cyber security
Cyber security Sachith Lekamge
1.5K vues26 diapositives
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
5.8K vues23 diapositives
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
8.6K vues10 diapositives

Tendances(20)

Cyber securityCyber security
Cyber security
Rishav Sadhu5.6K vues
Cyber security Cyber security
Cyber security
Sachith Lekamge1.5K vues
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.8K vues
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.6K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru2.8K vues
Cyber securityCyber security
Cyber security
Manjushree Mashal3.1K vues
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi4K vues
Cyber securityCyber security
Cyber security
Harsh verma13.5K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela57.6K vues
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam1.8K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim37.5K vues
Cyber securityCyber security
Cyber security
Pihu Goel3.8K vues
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran2.5K vues
Cyber securityCyber security
Cyber security
Sapna Patil3.1K vues
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues

Similaire à cyber security

MianMian
Mianprincejhulan
258 vues12 diapositives
MianMian
MianDom Mike
183 vues12 diapositives
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
538.3K vues12 diapositives
Cyber SecurityCyber Security
Cyber SecurityHome
329 vues12 diapositives

Similaire à cyber security(20)

MianMian
Mian
princejhulan258 vues
MianMian
Mian
Dom Mike183 vues
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari538.3K vues
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem194 vues
Cyber SecurityCyber Security
Cyber Security
Home329 vues
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
keerthivemireddy108 vues
Cyber securityCyber security
Cyber security
Krishanu Ghosh519 vues
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun842 vues
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam897 vues
Cyber SecurityCyber Security
Cyber Security
Arshad Khan316 vues
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg25.8K vues
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel1524 vues
Cyber crime and security Cyber crime and security
Cyber crime and security
BasitShah18195 vues
Cyber securityCyber security
Cyber security
Komal Samdariya873 vues
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
KajalSingh97083318 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104132 vues
Cyber security (1).pptxCyber security (1).pptx
Cyber security (1).pptx
KrishnamSharma311 vues
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
AashiGupta46340 vues

Plus de BasineniUdaykumar(8)

DESIGN OF RC BEAMSDESIGN OF RC BEAMS
DESIGN OF RC BEAMS
BasineniUdaykumar78 vues
motars motars
motars
BasineniUdaykumar3 vues
special-concretespecial-concrete
special-concrete
BasineniUdaykumar2 vues
PROTECTION METHODS.pptxPROTECTION METHODS.pptx
PROTECTION METHODS.pptx
BasineniUdaykumar17 vues

cyber security

  • 2. What is cyber security? Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals. Though, cyber security is important for network, data and application security
  • 3. What is cyber crime?  The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.  Other forms include "digital", "electronic", "virtual" , "IT", "high- tech" and technology-enabled" crime .
  • 4. History  The first recorded cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.
  • 5. Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 6. Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both. How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 7. Advantage of cyber security :  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 8. Safety tips …  Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 9. Conclusion :  The only system which is truly secure is one which is switched off and unplugged.  So , only way to be safe is Pay attention and Act smart.