Cyber security

S
Presented by:
Siblu Khan
1101216058
CSE
The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
Introduction
What is the
meaning of
the word
CYBER
What is the need
of Cyber Security
What are the
security
problems in
Cyber field
How to
implement and
maintain
Security of a
Cyber field
around us.
It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Need of cyber security
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses and Worms
A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Solution
Install a security suite that protects the computer
against threats such as viruses and worms.
Cyber security
Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
Download an anti-malware
program that also
helps prevent infections.
Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
Use always Strong password.
Never use same password for two different sites.
Cyber Security Is Everyone’s Responsibility
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
India stands 10th in the cyber
crime in the world
Cyber security
Conclusion
I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
helps to spread awareness among normal
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.
Cyber security
QUERIES?
REFERENCES
owww.wikipedia.org
owww.avtest.org
owww.billmullins.blogspot.com
owww.digit/forum.com
owww.antivirusnews.com
1 sur 26

Recommandé

Cyber crime and security ppt par
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
603.4K vues22 diapositives
Cyber security presentation par
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
542.9K vues12 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityBhandari Hìmáñßhü
13K vues22 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityHarsh verma
13.9K vues11 diapositives
Presentation on Ethical Hacking ppt par
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
142K vues29 diapositives
Cyber security ppt par
Cyber security pptCyber security ppt
Cyber security pptDebrajKarmakar
25.8K vues36 diapositives

Contenu connexe

Tendances

Phishing ppt par
Phishing pptPhishing ppt
Phishing pptshindept123
22.2K vues22 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
11K vues22 diapositives
Cybercrime.ppt par
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
728.3K vues20 diapositives
Network security par
Network securityNetwork security
Network securityGichelle Amon
215.5K vues47 diapositives
Cyber-crime PPT par
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPTAnshuman Tripathi
216.9K vues19 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeMazhar Nazik
69.5K vues33 diapositives

Tendances(20)

Cybercrime.ppt par Aeman Khan
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan728.3K vues
Cyber Security in Society par Rubal Sagwal
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.9K vues
Cybersecurity PowerPoint Presentation par Ritik Kumar
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar10.4K vues
Cyber Crime And Security par ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cyber Crime and Security Presentation par Preethi Kumaresh
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.5K vues
Hacking & its types par Sai Sakoji
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji296.7K vues
INFORMATION SECURITY par Ahmed Moussa
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa154.2K vues
Cyber Security Presentation par HaniyaMaha
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4.1K vues

En vedette

Cyber security threats for 2017 par
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
26K vues30 diapositives
Cyber laws par
Cyber lawsCyber laws
Cyber lawsmadhu190
10.6K vues16 diapositives
Cybercrime presentation par
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
146.3K vues42 diapositives
Cyber crime ppt par
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
344K vues30 diapositives
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel... par
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
1.2K vues9 diapositives
Cyber security awareness for students par
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
46.5K vues32 diapositives

En vedette(20)

Cyber security threats for 2017 par Ramiro Cid
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid26K vues
Cyber laws par madhu190
Cyber lawsCyber laws
Cyber laws
madhu19010.6K vues
Cybercrime presentation par Rajat Jain
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.3K vues
Cyber crime ppt par MOE515253
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253344K vues
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel... par Netpluz Asia Pte Ltd
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Cyber security awareness for students par Kandarp Shah
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah46.5K vues
Electronic and mobile commerce and enterprise systems par Naveed Zahoor
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
Naveed Zahoor2.1K vues
Inside Sales Compensation & Incentives Best Practices par Heinz Marketing Inc
Inside Sales Compensation & Incentives Best PracticesInside Sales Compensation & Incentives Best Practices
Inside Sales Compensation & Incentives Best Practices
Heinz Marketing Inc44.7K vues
Motivation and Compensation of Sales People par Kaushik Maitra
Motivation and Compensation of Sales PeopleMotivation and Compensation of Sales People
Motivation and Compensation of Sales People
Kaushik Maitra46.1K vues
Cyber crime presentation par Priya Saluja
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja3.9K vues
Sales force motivation and compensation par radhannur
Sales force motivation and compensationSales force motivation and compensation
Sales force motivation and compensation
radhannur29.6K vues
Moral injury - A Non-Medical Model par Elena Bridges
Moral injury - A Non-Medical ModelMoral injury - A Non-Medical Model
Moral injury - A Non-Medical Model
Elena Bridges1.1K vues

Similaire à Cyber security

cybersecurity.pptx par
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx20ArnavKumar8F
98 vues24 diapositives
cyber security.pdf par
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
161 vues24 diapositives
cybersec sumit (1).pptx par
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptxsumitkumar917666
58 vues26 diapositives
Cyber security system presentation par
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
2.1K vues25 diapositives
Cybersecurity 140713064844-phpapp01 (1)-converted par
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
503 vues26 diapositives
SAHITHI.PPT.pptx par
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptxVamshi963187
36 vues26 diapositives

Similaire à Cyber security(20)

Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.1K vues
Cyber security by Anushka Jha par Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha370 vues
Art integrated project of computer science class 12 par ANURAGYADAV265
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
ANURAGYADAV2653.8K vues
Cyber Security 03 par Home
Cyber Security 03Cyber Security 03
Cyber Security 03
Home943 vues
Cyber Security A Challenges For Mankind par Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K vues
Cyber Security Presentation By(Aashish Tanania) par AashishTanania
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania1.1K vues
Cyber security (daffodil international university) par akkharbabu
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
akkharbabu258 vues
cyber security,need,security problem and types of cyber security par Vansh Bathla
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
Vansh Bathla264 vues

Dernier

NEW SUPPLIERS SUPPLIES (copie).pdf par
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdfgeorgesradjou
15 vues30 diapositives
GDSC Mikroskil Members Onboarding 2023.pdf par
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdfgdscmikroskil
51 vues62 diapositives
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
28 vues16 diapositives
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... par
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...AltinKaradagli
9 vues16 diapositives
SUMIT SQL PROJECT SUPERSTORE 1.pptx par
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
13 vues26 diapositives
Stone Masonry and Brick Masonry.pdf par
Stone Masonry and Brick Masonry.pdfStone Masonry and Brick Masonry.pdf
Stone Masonry and Brick Masonry.pdfMohammed Abdullah Laskar
25 vues6 diapositives

Dernier(20)

NEW SUPPLIERS SUPPLIES (copie).pdf par georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou15 vues
GDSC Mikroskil Members Onboarding 2023.pdf par gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil51 vues
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... par AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
SUMIT SQL PROJECT SUPERSTORE 1.pptx par Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 13 vues
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... par Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain13 vues
fakenews_DBDA_Mar23.pptx par deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra814 vues
Effect of deep chemical mixing columns on properties of surrounding soft clay... par AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
Design of machine elements-UNIT 3.pptx par gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 vues
Control Systems Feedback.pdf par LGGaming5
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdf
LGGaming56 vues
Generative AI Models & Their Applications par SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN8 vues

Cyber security

  • 2. The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Introduction
  • 3. What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 4. It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 5. Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 8. Solution Install a security suite that protects the computer against threats such as viruses and worms.
  • 10. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  • 12. How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 13. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 14. To Stop Malware Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus.
  • 15. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 16. How to Avoid Trojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 17. Password Cracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 18. Securing Password Use always Strong password. Never use same password for two different sites.
  • 19. Cyber Security Is Everyone’s Responsibility
  • 20. Cyber Security Strategy – India • Security Policy, Legal Framework – IT Act, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  • 21. India stands 10th in the cyber crime in the world
  • 23. Conclusion I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection.