SlideShare une entreprise Scribd logo
1  sur  23
CYBER SECURITY
INTRODUCTION
• The term cyber security is used to refer to the security offered through on-
line services to protect your online information.
• With an increasing amount of people getting connected to Internet, the
security threats that cause massive harm are increasing also.
• Cyber security refers to the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack,
damage, or unauthorized access. Cyber security may also be referred to as
information technology security.
Meaning of theWord CYBER
• It is a combining form relating to information technology, the Internet, and
virtual reality.
• Computer is just a type of box which is widely used in all over the world as a
machine. But actually it is a type of machine which is used to do the most
hard or difficult work easily. And now i am coming to the topic which is cyber
world introduction. Cyber means meant net, and world is world as all we
know. So that Cyber world means a a world of net in which anyone can
trapped of easily access your own personal identity.
Need of cyber security
• Cyber security is necessary since it helps in securing data from threats such
as data theft or misuse, also safeguards your system from viruses
• The increasing reliance of our information age economies and governments
on cyber (computer-based) infrastructure makes them progressively more
vulnerable to cyber attacks on our computer systems, networks and data. In
their most disruptive form, cyber attacks target the enterprise, government,
military, or other infrastructural assets of a nation or its citizens..
Major security problems
• Virus
• Hacker Malware
• Trojan horses
• Spyware
• Password cracking
Viruses andWorms
• AVirus is a “program that is loaded onto your computer without your
knowledge and runs against your wishes.
Malware
• The word "malware" comes from the term "MALicious softWARE.“
• Malware is any software that infects and damages a computer system
without the owner's knowledge or permission.
Trojan Horses
• Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers.
Hackers
• In common a hacker is a person who breaks into computers, usually by
gaining access to administrative controls.
Password Cracking
• Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
HowTo prevent hacking
• It may be impossible to prevent computer hacking, however effective
security controls including strong passwords, and the use of firewalls can
helps.
Types of Hackers
• White Hat Hacker
• The term "white hat" in Internet slang refers to an ethical computer hacker,
or a computer security expert, who specializes in penetration testing and in
other testing methodologies that ensures the security of an organization's
information systems.
• Grey Hat Hacker
• The term "grey hat" refers to a computer hacker or computer security expert
who may sometimes violate laws or typical ethical standards, but does not
have the malicious intent typical of a black hat hacker.
• Black Hat Hacker
• A black hat hacker is a hacker who "violates computer security for little
reason beyond maliciousness or for personal gain".
Solution
• Install a security suite that protects the computer against threats such as
viruses and worms.
To Stop Malware
• Download an anti-malware program that also helps prevent infections.
• Activate NetworkThreat Protection, Firewall, Antivirus.
How to AvoidTrojans
• Security suites, such as Avast Internet Security, will prevent you from
downloadingTrojan Horses.
Securing Password
• Use always Strong password.
• Never use same password for two different sites.
Cyber Security Is Everyone’s Responsibility
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes.
Capacity building
– Skill & Competence development
Research and Development
– Cyber Monitoring
– Network Security
International Collaboration
India stands 2nd in the cyber crime in the
World
Cyber attacks in india
• ransomeware attack:-
• the global ransomeware attacks that hit hundred of system to phishing an
dsccaningh rackets ,
• at least one cybercrime was reported every 10 minutes inIndia in the first six
month of 2017.
Cosmos online bank robbery
• Attackers managed to siphon off over Rs 94 crore through a malware attack
on the server of Pune-based Cosmos Bank and cloning thousands of the
bank's debit cards over a period of two days .
• The fraudulent transactions were carried out onAugust 11 and August 13
and the malware attack by the hackers originated in Canada.
Conclusion
• I hope that my presentation will be helpful for my audience to improve their
knowledge about cyber security and to overcome several security loopholes
on their computer operation. Also it helps to spread awareness among
normal people about emerging security threats. Simple and practical
prevention methods are explained in the Seminar to prevent PCs from
infection.
THANK YOU

Contenu connexe

Tendances

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 

Tendances (20)

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à CYBER SECURITY: PROTECTING YOURSELF ONLINE

Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPTNitesh Dubey
 

Similaire à CYBER SECURITY: PROTECTING YOURSELF ONLINE (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

CYBER SECURITY: PROTECTING YOURSELF ONLINE

  • 2. INTRODUCTION • The term cyber security is used to refer to the security offered through on- line services to protect your online information. • With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. • Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 3. Meaning of theWord CYBER • It is a combining form relating to information technology, the Internet, and virtual reality. • Computer is just a type of box which is widely used in all over the world as a machine. But actually it is a type of machine which is used to do the most hard or difficult work easily. And now i am coming to the topic which is cyber world introduction. Cyber means meant net, and world is world as all we know. So that Cyber world means a a world of net in which anyone can trapped of easily access your own personal identity.
  • 4. Need of cyber security • Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses • The increasing reliance of our information age economies and governments on cyber (computer-based) infrastructure makes them progressively more vulnerable to cyber attacks on our computer systems, networks and data. In their most disruptive form, cyber attacks target the enterprise, government, military, or other infrastructural assets of a nation or its citizens..
  • 5. Major security problems • Virus • Hacker Malware • Trojan horses • Spyware • Password cracking
  • 6. Viruses andWorms • AVirus is a “program that is loaded onto your computer without your knowledge and runs against your wishes.
  • 7. Malware • The word "malware" comes from the term "MALicious softWARE.“ • Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 8. Trojan Horses • Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. • These viruses are the most serious threats to computers.
  • 9. Hackers • In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 10. Password Cracking • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 11. HowTo prevent hacking • It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 12. Types of Hackers • White Hat Hacker • The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems. • Grey Hat Hacker • The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. • Black Hat Hacker • A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
  • 13. Solution • Install a security suite that protects the computer against threats such as viruses and worms.
  • 14. To Stop Malware • Download an anti-malware program that also helps prevent infections. • Activate NetworkThreat Protection, Firewall, Antivirus.
  • 15. How to AvoidTrojans • Security suites, such as Avast Internet Security, will prevent you from downloadingTrojan Horses.
  • 16. Securing Password • Use always Strong password. • Never use same password for two different sites.
  • 17. Cyber Security Is Everyone’s Responsibility
  • 18. Cyber Security Strategy – India • Security Policy, Legal Framework – IT Act, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes. Capacity building – Skill & Competence development Research and Development – Cyber Monitoring – Network Security International Collaboration
  • 19. India stands 2nd in the cyber crime in the World
  • 20. Cyber attacks in india • ransomeware attack:- • the global ransomeware attacks that hit hundred of system to phishing an dsccaningh rackets , • at least one cybercrime was reported every 10 minutes inIndia in the first six month of 2017.
  • 21. Cosmos online bank robbery • Attackers managed to siphon off over Rs 94 crore through a malware attack on the server of Pune-based Cosmos Bank and cloning thousands of the bank's debit cards over a period of two days . • The fraudulent transactions were carried out onAugust 11 and August 13 and the malware attack by the hackers originated in Canada.
  • 22. Conclusion • I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection.