SlideShare une entreprise Scribd logo
1  sur  32
Welcome to our presentation
cyber security
SUBMITTED BY:
Roksana Akter
I’d:151-15-4864
Mst Tanha Tasnim
I’d:151-15-5420
Hadiea Rashid
I'd:151-15-5298
Renu Akther
I'd:151-15-5096
SUBMITTED to:
Mohammad Jahangir
LECTURER AT
DEPARTMENT OF CSE
DAFFODIL
INTERNATIONAL
UNIVERSITY
Roksana Akter
I’d:151-15-4864
WHAT IS CYBER SECURITY??
The security offered
through on-line services to
protect your online
information is Called Cyber
Security.
MEANING OF THE WORD CYBER
It is a combining form
relating to information
technology, the Internet,
and virtual reality.
NEED OF CYBER SECURITY
 Cyber security is necessary
since it helps in securing
data from threats such as
data theft or misuse, also
safeguards your system
from viruses.
MAJOR SECURITY PROBLEMS
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Mst Tanha Tasnim
I’d:151-15-5420
Viruses
Solution
Install a security suite that protects the
computer against threats such as viruses and
worms
Hackers
In common a hacker is a person who
breaks into computers, usually by
gaining access to administrative
controls
Types of Hackers
How To prevent hacking
Hadiea Rashid
I'd:151-15-5298
Malware
Where malware comes from?
How to recognize malware?
How to remove malware?
Trojan Virus
How Trojans can impact you
 Backdoor
 Exploit
 Rootkit
 rojan-Banker
 Trojan-Downloader
 Trojan-Dropper
 Trojan-SMS
 Trojan-Spy
How to protect against Trojan
By installing effective anti-malware software,
you can defend your devices.A rigorous anti-
malware solution – such as Kaspersky Anti-
Virus – will detect and prevent Trojan attacks
on your devices. Kaspersky Lab has anti-
malware products that defend the following
devices against Trojans
 Windows PCs
 Linux computers
 Apple Macs
 Smart phones
Password Cracking & Securing Password
In computersecurity, password cracking is
the process of
recovering passwords from data that have
been stored in or transmitted by a computer
system. A common approach is to try guesses
repeatedly for the password and check them
against an available cryptographic hash of the
password.
Software:
There are many password cracking software tools,
but the most popular are Aircrack, Cain and
Abel, John the Ripper, Hashcat,Hydra and so on.
Securing Password from cracking by following this
method “Easy to remember, hard to guess”
Renu akther
I'd:151-15-5096
Big cyber attacks on
2016
Why should we care ?
It is a criminal activity committed on the
internet .
Cyber crime – where computer is either a
tool or target or both.
Advantage of cyber
security It will defend from hacks and virus.
 The application of cyber security used in our
PC needs update every week.
 The security developers will update their
database every week once. Hence the new
virus also deleted.
Our responsibility
Conclusion
The only system which is truly
secure is one which is switched
off and unplugged. So , only way
to be safe is Pay attention and
Act smart
CYBER SECURITY

Contenu connexe

Tendances

Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à CYBER SECURITY

Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similaire à CYBER SECURITY (20)

Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Plus de Mohammad Shakirul islam

Relationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertensionRelationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertensionMohammad Shakirul islam
 
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...Mohammad Shakirul islam
 
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNNBayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNNMohammad Shakirul islam
 
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsShot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsMohammad Shakirul islam
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...Mohammad Shakirul islam
 
Useful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental DegradationUseful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental Degradation Mohammad Shakirul islam
 

Plus de Mohammad Shakirul islam (20)

Relationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertensionRelationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertension
 
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
 
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNNBayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
 
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsShot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
 
Start With Why
Start With WhyStart With Why
Start With Why
 
Gsensor car
Gsensor carGsensor car
Gsensor car
 
All about Uganda
All about Uganda All about Uganda
All about Uganda
 
MEMORY AND STROGE
MEMORY AND STROGEMEMORY AND STROGE
MEMORY AND STROGE
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Applications of numerical methods
Applications of numerical methodsApplications of numerical methods
Applications of numerical methods
 
Multistage transistor
Multistage transistorMultistage transistor
Multistage transistor
 
Fourier series
Fourier seriesFourier series
Fourier series
 
Laser security system
Laser security systemLaser security system
Laser security system
 
Useful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental DegradationUseful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental Degradation
 
Student information-result-system
Student information-result-systemStudent information-result-system
Student information-result-system
 
Presentation on Programming Languages.
Presentation on Programming Languages.Presentation on Programming Languages.
Presentation on Programming Languages.
 
INTERFERNCE & DIFFRACTION
INTERFERNCE & DIFFRACTIONINTERFERNCE & DIFFRACTION
INTERFERNCE & DIFFRACTION
 

Dernier

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 

Dernier (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

CYBER SECURITY

  • 1. Welcome to our presentation
  • 2. cyber security SUBMITTED BY: Roksana Akter I’d:151-15-4864 Mst Tanha Tasnim I’d:151-15-5420 Hadiea Rashid I'd:151-15-5298 Renu Akther I'd:151-15-5096 SUBMITTED to: Mohammad Jahangir LECTURER AT DEPARTMENT OF CSE DAFFODIL INTERNATIONAL UNIVERSITY
  • 4. WHAT IS CYBER SECURITY?? The security offered through on-line services to protect your online information is Called Cyber Security.
  • 5. MEANING OF THE WORD CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. NEED OF CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. MAJOR SECURITY PROBLEMS  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 10. Solution Install a security suite that protects the computer against threats such as viruses and worms
  • 11.
  • 12. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls
  • 14. How To prevent hacking
  • 17. Where malware comes from? How to recognize malware? How to remove malware?
  • 19. How Trojans can impact you  Backdoor  Exploit  Rootkit  rojan-Banker  Trojan-Downloader  Trojan-Dropper  Trojan-SMS  Trojan-Spy
  • 20. How to protect against Trojan By installing effective anti-malware software, you can defend your devices.A rigorous anti- malware solution – such as Kaspersky Anti- Virus – will detect and prevent Trojan attacks on your devices. Kaspersky Lab has anti- malware products that defend the following devices against Trojans
  • 21.  Windows PCs  Linux computers  Apple Macs  Smart phones
  • 22. Password Cracking & Securing Password In computersecurity, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.
  • 23.
  • 24. Software: There are many password cracking software tools, but the most popular are Aircrack, Cain and Abel, John the Ripper, Hashcat,Hydra and so on. Securing Password from cracking by following this method “Easy to remember, hard to guess”
  • 26. Big cyber attacks on 2016
  • 27.
  • 28. Why should we care ? It is a criminal activity committed on the internet . Cyber crime – where computer is either a tool or target or both.
  • 29. Advantage of cyber security It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 31. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart