SlideShare une entreprise Scribd logo
1  sur  19
o Introduction
o Definition
o History
o Major cyber security issues
o Cyber security aspects
o Cyber hygiene
o Conclusion
o preventative methods used to protect information
from being stolen, compromised or attacked.
o requires an understanding of potential information
threats,
such as Viruses and other malicious code.
1989 -Robert Morris –first computer worm.
• Phishing and identity theft
• Ads, apps and other security
breaches
Computer
as a target
• Online predators
• Terrorism through social networking
or websites
Computer
as a
weapon
o Hacking
o Denial of service attack
o Virus dissemination
o Computer vandalism
o Cyber terrorism
o Child pornography
o Software piracy
o Illegal intrusion into a computer System or
network.
Denial of service
attack:
o Act by the criminal, who floods the bandwidth of
the victims network
o Sending spam mails that deprives him of services
o Malicious software that attaches itself to the
other software
o Examples: Trojan horse, virus, worms, web
jacking,
email bombing etc.,
Computer vandalism:
o Damaging or destroying the system data
rather than stealing
o Transmitting malwares
o Use of internet based attacks in terrorist
activities
o Techno-savvy terrorist are using a 512-bit
encryption
which is highly impossible to decrypt.
Film Influence:
o Theft of software through the illegal
copying of genuine programs
o Distribution of products intended to
pass for the original
o Information Security
o Network Security
o System Security
o Application Security
o Database Security
o Language Security
o Protect us from critical attacks
o Browse the safe website
o Internet security processes
o Using Antivirus Soft wares
o Excess usage may affect system
o Install firewall & Pop-up blocks
o Smart passwords keep you from becoming extinct
online.
o Too much of anything is good for nothing.
o Be careful before you share anything.
o Technology is destructive only in the
hands of
some people who do not realize that
they are
one and same process as the
universe
Presented by
Shivaani Srinivas ,
Bsc (Biotechnology)
Roll.No:15btu061
Thanks for watching my
presentation.
Any questions ?

Contenu connexe

Tendances

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 

En vedette

Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?
Feer Fuentes
 
Investment Presentation
Investment PresentationInvestment Presentation
Investment Presentation
Mesfin Ayenew
 
Sijo Sunny Portfolio
Sijo Sunny PortfolioSijo Sunny Portfolio
Sijo Sunny Portfolio
Sijo Sunny
 
Dissertation Final PDF
Dissertation Final PDFDissertation Final PDF
Dissertation Final PDF
Arsalan Javaid
 

En vedette (20)

Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?
 
P Lauriano Stiehm Press BizBash
P Lauriano Stiehm Press BizBashP Lauriano Stiehm Press BizBash
P Lauriano Stiehm Press BizBash
 
Perifericos de salida
Perifericos de salidaPerifericos de salida
Perifericos de salida
 
Year 8 Rock - Squire SQUC
Year 8 Rock - Squire SQUCYear 8 Rock - Squire SQUC
Year 8 Rock - Squire SQUC
 
Srinivas Resume
Srinivas ResumeSrinivas Resume
Srinivas Resume
 
What is Damaging Power
What is Damaging PowerWhat is Damaging Power
What is Damaging Power
 
Nidia peña actividad1_2mapac.pdf
Nidia peña actividad1_2mapac.pdfNidia peña actividad1_2mapac.pdf
Nidia peña actividad1_2mapac.pdf
 
The economist
The economistThe economist
The economist
 
Perifricos mixtos
Perifricos mixtosPerifricos mixtos
Perifricos mixtos
 
Resume bilingual 2016
Resume bilingual 2016Resume bilingual 2016
Resume bilingual 2016
 
Investment Presentation
Investment PresentationInvestment Presentation
Investment Presentation
 
Sijo Sunny Portfolio
Sijo Sunny PortfolioSijo Sunny Portfolio
Sijo Sunny Portfolio
 
Exhibit_Designs
Exhibit_DesignsExhibit_Designs
Exhibit_Designs
 
Ceo report
Ceo reportCeo report
Ceo report
 
AOMP_APRIL_2016_S
AOMP_APRIL_2016_SAOMP_APRIL_2016_S
AOMP_APRIL_2016_S
 
CV_Zine Lynda
CV_Zine LyndaCV_Zine Lynda
CV_Zine Lynda
 
Dissertation Final PDF
Dissertation Final PDFDissertation Final PDF
Dissertation Final PDF
 
Certificates
CertificatesCertificates
Certificates
 
Smart Protect4
Smart Protect4Smart Protect4
Smart Protect4
 
Software
SoftwareSoftware
Software
 

Similaire à Cyber security

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 

Similaire à Cyber security (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Dernier

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Dernier (20)

Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

Cyber security

  • 1.
  • 2. o Introduction o Definition o History o Major cyber security issues o Cyber security aspects o Cyber hygiene o Conclusion
  • 3. o preventative methods used to protect information from being stolen, compromised or attacked. o requires an understanding of potential information threats, such as Viruses and other malicious code.
  • 4. 1989 -Robert Morris –first computer worm.
  • 5.
  • 6. • Phishing and identity theft • Ads, apps and other security breaches Computer as a target • Online predators • Terrorism through social networking or websites Computer as a weapon
  • 7. o Hacking o Denial of service attack o Virus dissemination o Computer vandalism o Cyber terrorism o Child pornography o Software piracy
  • 8. o Illegal intrusion into a computer System or network. Denial of service attack: o Act by the criminal, who floods the bandwidth of the victims network o Sending spam mails that deprives him of services
  • 9. o Malicious software that attaches itself to the other software o Examples: Trojan horse, virus, worms, web jacking, email bombing etc., Computer vandalism: o Damaging or destroying the system data rather than stealing o Transmitting malwares
  • 10. o Use of internet based attacks in terrorist activities o Techno-savvy terrorist are using a 512-bit encryption which is highly impossible to decrypt. Film Influence:
  • 11. o Theft of software through the illegal copying of genuine programs o Distribution of products intended to pass for the original
  • 12. o Information Security o Network Security o System Security o Application Security o Database Security o Language Security
  • 13. o Protect us from critical attacks o Browse the safe website o Internet security processes
  • 14. o Using Antivirus Soft wares o Excess usage may affect system o Install firewall & Pop-up blocks
  • 15. o Smart passwords keep you from becoming extinct online.
  • 16.
  • 17. o Too much of anything is good for nothing. o Be careful before you share anything.
  • 18. o Technology is destructive only in the hands of some people who do not realize that they are one and same process as the universe
  • 19. Presented by Shivaani Srinivas , Bsc (Biotechnology) Roll.No:15btu061 Thanks for watching my presentation. Any questions ?

Notes de l'éditeur

  1. 10 YEARS AGO: Face book, twitter, instagram, drop box didn’t exist. 20 YEARS AGO: There were only 130 websites totally, Google wasn’t around yet, and you have to pay for an email account through ISP. 30 YEARS AGO: There was no internet at all. NOW WHERE WE ARE????????