Cyber Security

Bhandari Hìmáñßhü
Bhandari HìmáñßhüStudent à Studying
PRESENTED BY:
HIMANSHU BHANDARI
ROLL NO: 23
INTRODUCTIO
N TO CYBER
SECURITY
THE INTERNET IS A GLOBAL INFORMATION
NETWORK THAT CONNECTS MILLIONS OF
COMPUTERS.
THE INTERNET HAS NO SINGLE INVENTOR
INSTEAD IT HAS EVOLVED OVER TIME.
• THE INTERNET GOT ITS START IN THE UNITED
STATES MORE THAN 65 YEARS AGO AS A
GOVERNMENT WEAPON IN THE COLD WAR.
• SCIENTISTS AND RESEARCHERS USED IT TO
COMMUNICATE AND SHARE DATA WITH ONE
ANOTHER THROUGH WHAT WAS KNOWN AS
DARPNET(DEFENSE’S ADVANCED RESEARCH
PROJECT AGENCY NETWORK.
Anatomy of a Web Address
Meaning of Cyber Security
Cyber security refers to the body
of technologies, processes, and
practices designed to protect
networks, devices, programs, and
data from attack, damage, or
unauthorized access. Cyber
security may also be referred to
as information technology
security.
MALWARE
• The word malware stands for “Malicious Software”.
• Malware is any software that infects and damages a computer system without the owner’s knowledge or
permission.
Types are:
• Adware
• Spyware
• Virus
• Worms
• Trojan Horse
• Scareware
•
•
•
•
•
•
•
•
Typesof
Hackers
 White Hat Hackers
 Grey Hat Hackers
 Black Hat Hackers
 Blue Hat Hackers
Cyber Security
MOBILE PHONE SECURITY
• Sim Card Lock
• Screen Lock/ App Lock
• Location Setting
• Software Updates
• Keepass Droid
• VPN
• Desktop Site
BANKING SECURITY
■ CHANGE PASSWORDAND PIN (in a period of around 3 months)
■ Do not use your same email password
■ Always use HTTPS server while online transactions
■ Do not share OTP to some other parties
■ Use MPIN in UPITransactions
■ E-wallet Security
z
CYBER SECURITY COUNTER BY
INDIA
 NCTC (Counter Terrorism Center)
 NISAP (National Information Security Assurance Programme)
 MHA (Ministry of Home Affairs)
 NCRB (National Crime Records Bureau)
Thank You
Meaning of
Cyber
Security
Need of Cyber
Security
Implementing
Cyber
Security
To Understand
Major Security Problems
• Virus
• Hacker
• Malware
• Trojan Horse
• Password cracking
Viruses and Worms
• A Virus is a program that is loaded onto your computer without your
knowledge and runs against your wishes
Solution
• Install a security suite that projects the computer against threats such
as viruses and worms.
Hackers
• In common a hacker is a person who breaks into computers, usually
by gaining access to administrative controls.
How to prevent Hacking
• It may be impossible to prevent hacking computer hacking, however
effective security controls including strong passwords, and the use of
firewalls can helps.
To Stop Malware
• Download anti malware program that also help prevent infections.
• Activate Network Threat Protection, Firewall, Antivirus.
Trojan Horse
• Trojan Horse are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers.
Password Cracking
• Password attacks are able to determine passwords or find passwords
to different protected electronic areas and social network sites.
1 sur 22

Recommandé

Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
11.2K vues22 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityHarsh verma
14.2K vues11 diapositives
cyber security par
cyber securitycyber security
cyber securityBasineniUdaykumar
3.3K vues10 diapositives
Cyber security ppt par
Cyber security pptCyber security ppt
Cyber security pptDebrajKarmakar
26.3K vues36 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityRishav Sadhu
5.9K vues16 diapositives
Introduction to cyber security par
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
40.4K vues21 diapositives

Contenu connexe

Tendances

Cybercrime and Security par
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.5K vues26 diapositives
Cyber Crime And Security par
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
5K vues17 diapositives
Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.2K vues8 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityManjushree Mashal
3.2K vues41 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYMohammad Shakirul islam
1.8K vues32 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.6K vues22 diapositives

Tendances(20)

Cyber Security Presentation par HaniyaMaha
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4.2K vues
Cyber crime and security par Sharath Raj
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.6K vues
Cyber Security in Society par Rubal Sagwal
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.9K vues
Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.2K vues
Cyber security Information security par AYESHA JAVED
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED439 vues
Cyber Crime and Security par Md Nishad
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad8.8K vues
Cyber Security A Challenges For Mankind par Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K vues
Cyber security par Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K vues

Similaire à Cyber Security

Cyber security(2018 updated) par
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)PrabhatChoudhary11
394 vues23 diapositives
CYBER SECURITY par
CYBER SECURITY CYBER SECURITY
CYBER SECURITY Ashish prashar
368 vues33 diapositives
cyber security par
cyber security cyber security
cyber security NiharikaVoleti
100 vues19 diapositives
Presentation on Cyber Security par
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
90 vues17 diapositives
Cyber terrorism par
Cyber terrorismCyber terrorism
Cyber terrorismHiren Selani
900 vues14 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityRavikantGautam8
488 vues20 diapositives

Similaire à Cyber Security(20)

Presentation on Cyber Security par BalwantBesra
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra90 vues
Cyber security par Siblu28
Cyber securityCyber security
Cyber security
Siblu28671.3K vues
Information security / Cyber Security ppt par Gryffin EJ
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ180 vues
Lecture 3 Security terminologies.pdf par AsmaaLafi1
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
AsmaaLafi13 vues

Dernier

Berry country.pdf par
Berry country.pdfBerry country.pdf
Berry country.pdfMariaKenney3
75 vues12 diapositives
Career Building in AI - Technologies, Trends and Opportunities par
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and OpportunitiesWebStackAcademy
45 vues44 diapositives
Thanksgiving!.pdf par
Thanksgiving!.pdfThanksgiving!.pdf
Thanksgiving!.pdfEnglishCEIPdeSigeiro
500 vues17 diapositives
Guess Papers ADC 1, Karachi University par
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi UniversityKhalid Aziz
99 vues17 diapositives
BUSINESS ETHICS MODULE 1 UNIT I_A.pdf par
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfBUSINESS ETHICS MODULE 1 UNIT I_A.pdf
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfDr Vijay Vishwakarma
40 vues25 diapositives
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... par
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...Nguyen Thanh Tu Collection
89 vues91 diapositives

Dernier(20)

Career Building in AI - Technologies, Trends and Opportunities par WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy45 vues
Guess Papers ADC 1, Karachi University par Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz99 vues
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... par Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
Create a Structure in VBNet.pptx par Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P86 vues
JQUERY.pdf par ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3105 vues
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv... par Taste
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Taste55 vues
Education of marginalized and socially disadvantages segments.pptx par GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati543 vues
12.5.23 Poverty and Precarity.pptx par mary850239
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptx
mary850239381 vues
Narration lesson plan par TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN75 vues
CUNY IT Picciano.pptx par apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano64 vues
Class 9 lesson plans par TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN82 vues

Cyber Security

  • 1. PRESENTED BY: HIMANSHU BHANDARI ROLL NO: 23 INTRODUCTIO N TO CYBER SECURITY
  • 2. THE INTERNET IS A GLOBAL INFORMATION NETWORK THAT CONNECTS MILLIONS OF COMPUTERS. THE INTERNET HAS NO SINGLE INVENTOR INSTEAD IT HAS EVOLVED OVER TIME.
  • 3. • THE INTERNET GOT ITS START IN THE UNITED STATES MORE THAN 65 YEARS AGO AS A GOVERNMENT WEAPON IN THE COLD WAR. • SCIENTISTS AND RESEARCHERS USED IT TO COMMUNICATE AND SHARE DATA WITH ONE ANOTHER THROUGH WHAT WAS KNOWN AS DARPNET(DEFENSE’S ADVANCED RESEARCH PROJECT AGENCY NETWORK.
  • 4. Anatomy of a Web Address
  • 5. Meaning of Cyber Security Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 6. MALWARE • The word malware stands for “Malicious Software”. • Malware is any software that infects and damages a computer system without the owner’s knowledge or permission. Types are: • Adware • Spyware • Virus • Worms • Trojan Horse • Scareware
  • 8. Typesof Hackers  White Hat Hackers  Grey Hat Hackers  Black Hat Hackers  Blue Hat Hackers
  • 10. MOBILE PHONE SECURITY • Sim Card Lock • Screen Lock/ App Lock • Location Setting • Software Updates • Keepass Droid • VPN • Desktop Site
  • 11. BANKING SECURITY ■ CHANGE PASSWORDAND PIN (in a period of around 3 months) ■ Do not use your same email password ■ Always use HTTPS server while online transactions ■ Do not share OTP to some other parties ■ Use MPIN in UPITransactions ■ E-wallet Security
  • 12. z CYBER SECURITY COUNTER BY INDIA  NCTC (Counter Terrorism Center)  NISAP (National Information Security Assurance Programme)  MHA (Ministry of Home Affairs)  NCRB (National Crime Records Bureau)
  • 14. Meaning of Cyber Security Need of Cyber Security Implementing Cyber Security To Understand
  • 15. Major Security Problems • Virus • Hacker • Malware • Trojan Horse • Password cracking
  • 16. Viruses and Worms • A Virus is a program that is loaded onto your computer without your knowledge and runs against your wishes
  • 17. Solution • Install a security suite that projects the computer against threats such as viruses and worms.
  • 18. Hackers • In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 19. How to prevent Hacking • It may be impossible to prevent hacking computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 20. To Stop Malware • Download anti malware program that also help prevent infections. • Activate Network Threat Protection, Firewall, Antivirus.
  • 21. Trojan Horse • Trojan Horse are email viruses that can duplicate themselves, steal information, or harm the computer system. • These viruses are the most serious threats to computers.
  • 22. Password Cracking • Password attacks are able to determine passwords or find passwords to different protected electronic areas and social network sites.