Cyber security

Pihu Goel
Pihu GoelStudent
CYBER-SECURITY
CONTENT
 Introduction
Understand :
What is the meaning of the word CYBER ?
 What is the need of Cyber Security ?
What are the security problems in Cyber
field ?
 How to implement and maintain Security of
a Cyber field around us ?
INTRODUCTION
The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
 Cyber security or information technology security is
the protection of computer systems from theft or damage
to their hardware, software or electronic data, as well as
from disruption or misdirection of the services they
provide.
With an increasing amount of people getting connected
to Internet, the security threats that cause massive harm
are increasing also.
MEANING-CYBER
It is a combining form relating to information
technology, the Internet, and virtual reality.
Needofcybersecurity
Cyber security is necessary since it helps in securing
data from threats such as data theft or misuse, also
safeguards your system from viruses.
Majorsecurityproblems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses
A Virus is a “program that is loaded onto your
computer without your knowledge and runs against
your wishes.
Solution
Install a security suite that protects the computer
against threats such as viruses .
Cyber security
Hackers
In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
TypesofHackers
White Hat Hacker
 Grey Hat Hacker
 Black Hat Hacker
WhiteHatHacker
A white hat hacker is a computer security specialist
who breaks into protected systems and networks to test
and asses their security.
White hat hackers use their skills to improve security
by exposing vulnerabilities(weaknesses) before
malicious hackers (known as black hat hackers) can
detect and exploit them.
GreyHatHacker
The term "grey hat", alternatively spelled as greyhat or
"gray hat", refers to a computer hacker or computer
security expert who may sometimes violate laws(illegal)
or typical ethical standards, but does not have the
malicious intent typical of a black hat hacker.
BlackHatHacker
Black hat refers to a hacker who breaks into a
computer system or network with malicious intent.
A black hat hacker may exploit security vulnerabilities
for monetary gain; to steal or destroy private data , or to
alter, disrupt or shut down websites and networks.
Howtopreventhacking
It may be impossible to prevent(stop) computer
hacking, however effective security controls including
strong passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term "MALicious
softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
ToStopMalware
Download an anti-malware program that also helps
prevent infections.
Activate Network Threat Protection, Firewall,
Antivirus.
Maintain backup.
Keep you private information private
Cyber security
TrojanHorses
Trojan horses are email viruses that can duplicate
themselves, steal information, or harm the computer
system. These viruses are the most serious threats to
computers
HowtoAvoidTrojans
Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses.
PasswordCracking
Password attacks are attacks by hackers that are
able to determine passwords or find passwords to
different protected electronic areas and social network
sites.
SecuringPassword
Use always Strong password.
 Never use same password for two different sites.
Cyber security
Cyber security
Cyber security
1 sur 25

Recommandé

Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
10.9K vues22 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityRishav Sadhu
5.8K vues16 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYVaishak Chandran
2.5K vues18 diapositives
Cyber Crime And Security par
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
4.9K vues17 diapositives
Cyber security par
Cyber securityCyber security
Cyber securitySapna Patil
3.1K vues13 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityBhandari Hìmáñßhü
12.9K vues22 diapositives

Contenu connexe

Tendances

Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
57.7K vues25 diapositives
Cybercrime and Security par
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.4K vues26 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Final cyber crime and security par
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
8K vues18 diapositives
Introduction to cyber security amos par
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
3.1K vues19 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeRamesh Upadhaya
2.2K vues19 diapositives

Tendances(20)

Cyber crime and security par Sharath Raj
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues
Final cyber crime and security par nikunjandy
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues
Introduction to cyber security amos par Amos Oyoo
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo3.1K vues
Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.1K vues
Cyber Crime and Security par Md Nishad
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad8.7K vues
Cyber security presentation par Parab Mishra
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.6K vues
Cyber security & Importance of Cyber Security par Mohammed Adam
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam71.7K vues
Cybersecurity Attack Vectors: How to Protect Your Organization par TriCorps Technologies
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
Introduction to cyber security par RaviPrashant5
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant51.2K vues

Similaire à Cyber security

cybersecurity-181229124152 (1).pdf par
cybersecurity-181229124152 (1).pdfcybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdfJaydeepPrajapati33
17 vues25 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityTaimoorArshad5
485 vues20 diapositives
Cyber security (daffodil international university) par
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
258 vues23 diapositives
Cyber security by Anushka Jha par
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
370 vues20 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
1K vues22 diapositives
SAHITHI.PPT.pptx par
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptxVamshi963187
35 vues26 diapositives

Similaire à Cyber security(20)

Cyber security (daffodil international university) par akkharbabu
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
akkharbabu258 vues
Cyber security by Anushka Jha par Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha370 vues
Introduction to cyber security par Self-employed
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed40K vues
Cyber Security 03 par Home
Cyber Security 03Cyber Security 03
Cyber Security 03
Home938 vues
Cyber security par Siblu28
Cyber securityCyber security
Cyber security
Siblu28668.7K vues
Cyber Security par Rameesha1
Cyber SecurityCyber Security
Cyber Security
Rameesha1123 vues
Art integrated project of computer science class 12 par ANURAGYADAV265
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
ANURAGYADAV2653.7K vues
Cyber Security Presentation By(Aashish Tanania) par AashishTanania
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania1.1K vues
cyber security,need,security problem and types of cyber security par Vansh Bathla
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
Vansh Bathla262 vues

Plus de Pihu Goel

Software engineering par
Software engineeringSoftware engineering
Software engineeringPihu Goel
221 vues15 diapositives
Operating system par
Operating system Operating system
Operating system Pihu Goel
168 vues14 diapositives
Java applets par
Java appletsJava applets
Java appletsPihu Goel
1K vues13 diapositives
Introduction to ajax par
Introduction  to  ajaxIntroduction  to  ajax
Introduction to ajaxPihu Goel
886 vues12 diapositives
Er model ppt par
Er model pptEr model ppt
Er model pptPihu Goel
26.9K vues19 diapositives
Computer network par
Computer networkComputer network
Computer networkPihu Goel
90 vues16 diapositives

Plus de Pihu Goel(7)

Software engineering par Pihu Goel
Software engineeringSoftware engineering
Software engineering
Pihu Goel221 vues
Operating system par Pihu Goel
Operating system Operating system
Operating system
Pihu Goel168 vues
Introduction to ajax par Pihu Goel
Introduction  to  ajaxIntroduction  to  ajax
Introduction to ajax
Pihu Goel886 vues
Er model ppt par Pihu Goel
Er model pptEr model ppt
Er model ppt
Pihu Goel26.9K vues
Computer network par Pihu Goel
Computer networkComputer network
Computer network
Pihu Goel90 vues
Evolutionary models par Pihu Goel
Evolutionary modelsEvolutionary models
Evolutionary models
Pihu Goel10K vues

Dernier

7_DVD_Combinational_MOS_Logic_Circuits.pdf par
7_DVD_Combinational_MOS_Logic_Circuits.pdf7_DVD_Combinational_MOS_Logic_Circuits.pdf
7_DVD_Combinational_MOS_Logic_Circuits.pdfUsha Mehta
59 vues133 diapositives
Design and analysis of a new undergraduate Computer Engineering degree – a me... par
Design and analysis of a new undergraduate Computer Engineering degree – a me...Design and analysis of a new undergraduate Computer Engineering degree – a me...
Design and analysis of a new undergraduate Computer Engineering degree – a me...WaelBadawy6
53 vues4 diapositives
LFA-NPG-Paper.pdf par
LFA-NPG-Paper.pdfLFA-NPG-Paper.pdf
LFA-NPG-Paper.pdfharinsrikanth
40 vues13 diapositives
SNMPx par
SNMPxSNMPx
SNMPxAmatullahbutt
14 vues12 diapositives
fakenews_DBDA_Mar23.pptx par
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxdeepmitra8
12 vues34 diapositives
Electrical Crimping par
Electrical CrimpingElectrical Crimping
Electrical CrimpingIwiss Tools Co.,Ltd
21 vues22 diapositives

Dernier(20)

7_DVD_Combinational_MOS_Logic_Circuits.pdf par Usha Mehta
7_DVD_Combinational_MOS_Logic_Circuits.pdf7_DVD_Combinational_MOS_Logic_Circuits.pdf
7_DVD_Combinational_MOS_Logic_Circuits.pdf
Usha Mehta59 vues
Design and analysis of a new undergraduate Computer Engineering degree – a me... par WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...Design and analysis of a new undergraduate Computer Engineering degree – a me...
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy653 vues
fakenews_DBDA_Mar23.pptx par deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra812 vues
cloud computing-virtualization.pptx par RajaulKarim20
cloud computing-virtualization.pptxcloud computing-virtualization.pptx
cloud computing-virtualization.pptx
RajaulKarim2085 vues
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... par ahmedmesaiaoun
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun12 vues
Multi-objective distributed generation integration in radial distribution sy... par IJECEIAES
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES15 vues
Informed search algorithms.pptx par Dr.Shweta
Informed search algorithms.pptxInformed search algorithms.pptx
Informed search algorithms.pptx
Dr.Shweta13 vues
Machine Element II Course outline.pdf par odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese17 vues
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... par AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya1257 vues
An approach of ontology and knowledge base for railway maintenance par IJECEIAES
An approach of ontology and knowledge base for railway maintenanceAn approach of ontology and knowledge base for railway maintenance
An approach of ontology and knowledge base for railway maintenance
IJECEIAES12 vues

Cyber security

  • 2. CONTENT  Introduction Understand : What is the meaning of the word CYBER ?  What is the need of Cyber Security ? What are the security problems in Cyber field ?  How to implement and maintain Security of a Cyber field around us ?
  • 3. INTRODUCTION The term cyber security is used to refer to the security offered through on-line services to protect your online information.  Cyber security or information technology security is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
  • 4. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 5. MEANING-CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. Needofcybersecurity Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 8. Viruses A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. Solution Install a security suite that protects the computer against threats such as viruses .
  • 10. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11. TypesofHackers White Hat Hacker  Grey Hat Hacker  Black Hat Hacker
  • 12. WhiteHatHacker A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities(weaknesses) before malicious hackers (known as black hat hackers) can detect and exploit them.
  • 13. GreyHatHacker The term "grey hat", alternatively spelled as greyhat or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws(illegal) or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  • 14. BlackHatHacker Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security vulnerabilities for monetary gain; to steal or destroy private data , or to alter, disrupt or shut down websites and networks.
  • 15. Howtopreventhacking It may be impossible to prevent(stop) computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 16. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 17. ToStopMalware Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus. Maintain backup. Keep you private information private
  • 19. TrojanHorses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 20. HowtoAvoidTrojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 21. PasswordCracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 22. SecuringPassword Use always Strong password.  Never use same password for two different sites.