Cyber security

Cyber Security
.
Topology & Types of Networks
Wireless Networks:
A wireless network is any type
of computer network that
uses wireless data connections for
connecting network nodes.
Internet
Types of Attacks:
* Passive Attack *Active Attack
* Distributed Attack * Insider Attack
* Close-in Attack * Phishing Attack
* Hijack Attack *Spoof Attack
* Exploit Attack *Password Attack
* Buffer Overflow Attack
Goals for Security:
Confidentiality
Integrity
Availability
E-commerce Security
Cyber security
Computer Forensics:
Computer forensics is the
application of investigation and analysis
techniques to gather and preserve evidence from
a particular computing device in a way that is
suitable for presentation in a court of law.
Overview of Security threats
Examples of Cyber Crime
1. Identity Theft
2. Transaction fraud
3. Fake calls
4. Piracy
5. Hacking social sites
6. Hacking into personal accounts
7. Hacking into work databases
8. Schemes/scams based on fake
websites
9. Various credit-related thefts
10. Breaking into competitor
databases
Ransomeware Attack
Ransomware is a type of
malicious software that threatens
to publish the victim's data or
perpetually block access to it
unless a ransom is paid. While
some simple ransomware may
lock the system in a way which is
not difficult for a knowledgeable
person to reverse, more advanced
malware uses a technique called
cryptoviral extortion.
Strong Passwords & Password
Cracking
Malicious Code:
Malicious code is code causing
damage to a computer or system. It is
code not easily or solely controlled
through the use of anti-virus tools.
Malicious code can either activate itself
or be like a virus requiring a user to
perform an action, such as clicking on
something or opening an email
attachment.
Cyber security
Programming Bugs:
In computer technology, a bug is a
coding error in a computer program. The
process of finding bugs before program users
do is called debugging.
C
Cyber security
Cyber security
Cryptography/Encryption:
Digital Signatures
Cyber security
Cyber security
Security Procedures:
Handling copyright infringement notifications - The steps
Information Security will take if informed of a copyright
infringement that has happened via the LSE network.
Log duration - How long IMT will keep logs that have been
generated.
Non-standard user account expiries - The maximum duration
non-standard LSE user accounts will exist and at what point
extensions will need to be requested.
Virus outbreaks on campus public area workstations - What
we will do if we discover there is a virus outbreak on an LSE
machine in the library, or in a computer room.
Guidelines
Dropbox and other cloud-based services guidelines -
Information on when it might be appropriate to use Dropbox or other
cloud storage
Encryption guidelines - A guide on encrypting data and devices
Encryption guidelines for students - A guide on encrypting data
and devices for students
Remote access and mobile working guidelines - A guide on
how to protect your devices and data when working remotely
Using 7-Zip to encrypt and decrypt files - A guide on using 7-Zip
to encrypt files and make them more secure
Using USB storage devices - Issues to consider before putting data
on USB storage devices such as data sticks or external hard drives
Security Laws
• IT Act 2000
• IT (Amendment) Act 2008
• Notifications & Rules under section 6A,
43A & 79
Intellectual
Property
Rights
Patents
Database
Rights
Trademarks
Design
Rights
Performers
Rights
Copy Right
Security Audit
Cyber security
1 sur 30

Recommandé

CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYMohammad Shakirul islam
1.8K vues32 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
6.6K vues18 diapositives
Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.2K vues8 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
1.1K vues22 diapositives
cyber security par
cyber securitycyber security
cyber securityBasineniUdaykumar
3.3K vues10 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityBhandari Hìmáñßhü
13.1K vues22 diapositives

Contenu connexe

Tendances

Cyber security par
Cyber securityCyber security
Cyber securityRishav Sadhu
5.9K vues16 diapositives
Ppt on cyber security par
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
42.2K vues21 diapositives
Cyber security par
Cyber securityCyber security
Cyber securitySamsil Arefin
1.8K vues21 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityHarsh verma
14.2K vues11 diapositives
Network Security ppt par
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
2.1K vues22 diapositives
Cyber Security A Challenges For Mankind par
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
1.6K vues23 diapositives

Tendances(20)

Ppt on cyber security par Avani Patel
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel42.2K vues
Cyber Security A Challenges For Mankind par Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K vues
Cyber crime and security par Akash Dhiman
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Computer security par fiza1975
Computer securityComputer security
Computer security
fiza19751.8K vues
Cyber security presentation par Parab Mishra
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.8K vues
Cyber security par Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K vues
Cyber crime & security par pinkutinku26
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku264.2K vues

Similaire à Cyber security

Information Systems.pptx par
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
17 vues41 diapositives
Network security ppt par
Network security pptNetwork security ppt
Network security pptOECLIB Odisha Electronics Control Library
34.6K vues18 diapositives
network security ppt.pptx par
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
54 vues18 diapositives
network security ppt.pptx par
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
10 vues18 diapositives
Cysecc.pptx par
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
23 vues11 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityvishakha bhagwat
4.5K vues17 diapositives

Similaire à Cyber security(20)

Information Systems.pptx par KnownId
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId17 vues
network security ppt.pptx par KellyIsaac3
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
KellyIsaac310 vues
Cyber Security PPT.pptx par MBRoman1
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman152 vues

Dernier

Pharmaceutical Analysis PPT (BP 102T) par
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T) yakshpharmacy009
108 vues29 diapositives
Narration lesson plan par
Narration lesson planNarration lesson plan
Narration lesson planTARIQ KHAN
75 vues11 diapositives
StudioX.pptx par
StudioX.pptxStudioX.pptx
StudioX.pptxNikhileshSathyavarap
101 vues18 diapositives
The Future of Micro-credentials: Is Small Really Beautiful? par
The Future of Micro-credentials:  Is Small Really Beautiful?The Future of Micro-credentials:  Is Small Really Beautiful?
The Future of Micro-credentials: Is Small Really Beautiful?Mark Brown
75 vues35 diapositives
Guess Papers ADC 1, Karachi University par
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi UniversityKhalid Aziz
99 vues17 diapositives
Meet the Bible par
Meet the BibleMeet the Bible
Meet the BibleSteve Thomason
78 vues80 diapositives

Dernier(20)

Narration lesson plan par TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN75 vues
The Future of Micro-credentials: Is Small Really Beautiful? par Mark Brown
The Future of Micro-credentials:  Is Small Really Beautiful?The Future of Micro-credentials:  Is Small Really Beautiful?
The Future of Micro-credentials: Is Small Really Beautiful?
Mark Brown75 vues
Guess Papers ADC 1, Karachi University par Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz99 vues
Career Building in AI - Technologies, Trends and Opportunities par WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy45 vues
The Accursed House by Émile Gaboriau par DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta251 vues
12.5.23 Poverty and Precarity.pptx par mary850239
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptx
mary850239381 vues
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... par Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
JQUERY.pdf par ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3105 vues
JRN 362 - Lecture Twenty-Three (Epilogue) par Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley41 vues
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice par Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste45 vues
Monthly Information Session for MV Asterix (November) par Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC107 vues
INT-244 Topic 6b Confucianism par S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer45 vues
NodeJS and ExpressJS.pdf par ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR348 vues

Cyber security

  • 2. .
  • 3. Topology & Types of Networks
  • 4. Wireless Networks: A wireless network is any type of computer network that uses wireless data connections for connecting network nodes.
  • 6. Types of Attacks: * Passive Attack *Active Attack * Distributed Attack * Insider Attack * Close-in Attack * Phishing Attack * Hijack Attack *Spoof Attack * Exploit Attack *Password Attack * Buffer Overflow Attack
  • 9. Computer Forensics: Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • 11. Examples of Cyber Crime 1. Identity Theft 2. Transaction fraud 3. Fake calls 4. Piracy 5. Hacking social sites
  • 12. 6. Hacking into personal accounts 7. Hacking into work databases 8. Schemes/scams based on fake websites 9. Various credit-related thefts 10. Breaking into competitor databases
  • 13. Ransomeware Attack Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion.
  • 14. Strong Passwords & Password Cracking
  • 15. Malicious Code: Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools. Malicious code can either activate itself or be like a virus requiring a user to perform an action, such as clicking on something or opening an email attachment.
  • 17. Programming Bugs: In computer technology, a bug is a coding error in a computer program. The process of finding bugs before program users do is called debugging.
  • 18. C
  • 25. Security Procedures: Handling copyright infringement notifications - The steps Information Security will take if informed of a copyright infringement that has happened via the LSE network. Log duration - How long IMT will keep logs that have been generated. Non-standard user account expiries - The maximum duration non-standard LSE user accounts will exist and at what point extensions will need to be requested. Virus outbreaks on campus public area workstations - What we will do if we discover there is a virus outbreak on an LSE machine in the library, or in a computer room.
  • 26. Guidelines Dropbox and other cloud-based services guidelines - Information on when it might be appropriate to use Dropbox or other cloud storage Encryption guidelines - A guide on encrypting data and devices Encryption guidelines for students - A guide on encrypting data and devices for students Remote access and mobile working guidelines - A guide on how to protect your devices and data when working remotely Using 7-Zip to encrypt and decrypt files - A guide on using 7-Zip to encrypt files and make them more secure Using USB storage devices - Issues to consider before putting data on USB storage devices such as data sticks or external hard drives
  • 27. Security Laws • IT Act 2000 • IT (Amendment) Act 2008 • Notifications & Rules under section 6A, 43A & 79