CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Cyber security (ethical hacking)
1. Six weeks summer training 2018
Cyber Security (Ethical Hacking)
Submitted by
Sudhanshu Chaurasia
Reg No - 11614772
2. Cyber Security
Cybersecurity is the protection of internet-connected systems
including hardware, software and data from cyberattacks. The
term cyber security is used to refer to the security offered
through online services to protect our information.
With an increasing population getting connected to internet,
security threats which causes harm are also increasing.
3. The Meaning of word CYBER
The combination of information
technology, the internet and
virtual world is called cyber space.
Cyber space has no physical form
it exist virtually.
4. Need of cyber security
With increase in user of internet,
securing privacy, securing data and
credentials are necessary there
cyber security comes in play which
look up to these things.
In modern technology everything is
only one click away which needs to
be secure to only authentic person.
5. Major security problems
Virus, Malwares
Misuse of privileges
Hackers
Identity theft
Phishing
6. Virus malware and trojan horses
A virus is a program that is loaded in computer without user’s knowledge
and runs against his wishes.
Malwares are malicious software that damages and infects system without
owner’s knowledge and permission.
Trojan horses are email viruses that can replicate itself and steals the
user’s private information.
7. Ways to prevent Virus malware
and trojan horses
Install a security suite (Antivirus) that protects the computer
against these threats.
Activate network threat protection and firewall of operating
system.
Use of only secured and authentic software.
Use software of reliable source.
Blocking the suspicious emails and links.
Use of anti malware program.
8. Hackers
In common words hacker is a person who breaks into the system
and gain the administrative controls.
There are 3 types of hackers
1) White hat hacker
2) Black hat hacker
3) Grey hat hacker
9. Identity theft and phishing
Identity theft is the deliberate use of someone else’s
identity. Usually in this method imposter get hold of
person’s credential information such as credit/debit card
details, financial details and person information. It is also
known as identity fraud.
Phishing is a method to steal personal account credentials.
This targets the person by email, text message and some
fake copy of website and tricks them and gather the
information of targeted person.
10. Conclusion
I hope this presentation will be helpful for my audience to
improve their knowledge and awareness. And it might be
helpful for prevent and overcoming these problems.
THANK YOU