Publicité

Cyber security

15 Nov 2018
Publicité

Contenu connexe

Publicité

Cyber security

  1. CYBER SECURITY Submitted by S . VioletJebaMalini , M . Pavithra
  2. SYNOPSIS  Introduction  What is Cyber Security?  Need for Cyber Security  Major Security Problems  Cyber Security India’s Rank  Example Cyber Attacks  Advantages of Cyber Security  Disadvantages of Cyber Security  Safety Tips  Conclusion
  3. INTRODUCTION  The term cyber security is used to refer to the security offered through on-line services to protect our online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  4. CYBER SECURITY  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Cyber security is important for network, data and application security.
  5. NEED FOR CYBER SECURITY• To secure our financial information • To protect ourselves from online fraud and identity theft. • To safeguards our system from viruses.
  6. MAJOR SECURITY PROBLEMS Virus Hacker Malware Trojan horses Password cracking
  7. VIRUSES AND WORMS  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. Solution  Install a security suite that protects the
  8. HACKERS  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.  Types of Hackers 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker
  9. HOW TO PREVENT HACKING  It may be impossible to prevent computer hacking , however effective security controls including strong passwords, and the use of firewalls can helps.
  10. MALWARE  The word "malware" comes from the term "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  11. TO STOP MALWARE  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus
  12. TROJAN HORSES  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers.  How to Avoid Trojans Security suites ,will prevent us from downloading Trojan Horses.
  13. PASSWORD CRACKING  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.  Securing Password 1.Use always Strong password. 2.Never use same password for two different sites.
  14. CYBER SECURITY COUNTRIES RANKSThe top 10 most committed countries to cyber security are  Singapore,  United States,  Malaysia,  Oman,  Estonia,  Mauritius,  Australia,  Georgia,  France and  Canada.  Russia is ranked 11th.
  15. INDIA’S RANK  India is ranked 23rd on the index with a score of 0.683 and has been listed in the "maturing" category, which refers to 77 countries that have developed complex commitments to cyber security and engage in cyber security programmes and initiatives. The index has been topped by Singapore with a 0.925 score.
  16. CYBER ATTACKS IN 2017  Petya The second massive cyber attack, a variant of the ransomware hit organizations worldwide, especially Ukraine. It is found to exploit MS Office and SMBv1 vulnerabilities and has worm capabilities, which allows it to spread quickly across infected networks.  Skype Another cyber attacks was launched by unleashing a virus on the instant messaging app 'Skype', exploiting it's zero day vulnerability. This Skype virus allows attackers to remotely crash the application with an unexpected exception error, to overwrite the active process registers, and to execute malicious code.
  17.  Fireball Fireball is a Chinese malware that affected nearly 250 million computers worldwide with India among the worst-hit countries. This Cyber attack was designed to hijack browsers and turn them into zombies. It is capable of executing any code on infected machines, resulting in a wide range of actions from stealing credentials to dropping additional software nasties.  Delta Charlie Delta Charlie, a botnet malware used by Hidden Cobra, has affected thousands of computers worldwide. This cyber attack launches Distributed Denial-of-service attacks on vulnerable computers that are missing required patches.
  18.  Wannacry May 12th, 2017 witnessed the biggest ever cyber attack in the Internet history. A ransomware named WannaCry stormed through the network. It targeted computers running Windows OS that are not up-to- date and brought computer systems from Russia to China and the US to their knees.
  19. ADVANTAGES OF CYBER SECURITY  Improved security of Cyber Space.  Increase in Cyber defense.  Increase in Cyber speed.  Protecting company data and information.  Protects systems and computers against viruses , malware , worms and spyware etc.  Protects networks and resources.  Fight against computer hackers and identity theft.
  20. DISADVANTAGES OF CYBER SECURITY  It will be Costly for average users.  Firewalls can be difficult to configure correctly.  Need to keep updating the new software in order to keep security up to date.  Makes systems slower than before
  21. SAFETY TIPS  Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unlessrequired
  22. CONCLUSION  The cyber crime or cyber issues have been all time in around as well as information systems are around us.  To prevent the cyber issue or to hack in the world, all countries are wanted to make some important and harsh laws by which the cyber crimes are prevented.  Also, want to stop all the illegal websites that are unauthorized by the governments of the countries.  It is also important to every government for
Publicité