Cyber Security

Vivek Agarwal
Cyber,[object Object],Security,[object Object]
Presented  by :-,[object Object],[object Object],[object Object]
AboutCyberSecurity,[object Object],October is National Cyber Security,[object Object],Awareness Month. Microsoft and the,[object Object],National Cyber Security Alliance,[object Object],(NCSA) have teamed up with the,[object Object],Department of Homeland Security,[object Object],(DHS)  to help increase awareness,[object Object],about Internet security issues and to,[object Object],educate people about how to help,[object Object],protect themselves and their devices.,[object Object],NCSA's mission is to create a culture,[object Object],of cyber security and safety through,[object Object],education and awareness activities.,[object Object]
Types Of Cyber Crime,[object Object],HACKING,[object Object],CHILD PORNOGRAPHY,[object Object],VIRUS DISSEMINITION,[object Object],CYBER TERRORISM,[object Object],SOFTWARE PIRACY,[object Object]
 HACKING,[object Object],Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.,[object Object]
CHILD PORNOGRAPHY ,[object Object],The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles,[object Object]
VIRUSDISSEMINITION,[object Object],Malicious software that,[object Object],attaches itself to other,[object Object],software. (virus, worms,,[object Object],Trojan Horse, web,[object Object],jacking, e-mail bombing,[object Object],etc),[object Object]
CYBERTERRORISM,[object Object],Terrorist attacks on the,[object Object],Internet is by distributed,[object Object],denial of service attacks,,[object Object],hate websites and hate,[object Object],emails, attacks on sensitive,[object Object],computer networks,,[object Object],etc. Technology savvy,[object Object],terrorists are using 512-bit,[object Object],encryption, which is,[object Object],impossible to decrypt.,[object Object]
 SOFTWARE  PIRACY,[object Object],Theft of software through the illegal copying of,[object Object],genuine programs or the counterfeiting and,[object Object],distribution of products intended to pass for,[object Object],the original.,[object Object]
Internet Infrastructure inIndia,[object Object]
Primary Online Risks and Threats,[object Object],To Families,[object Object],[object Object]
File-sharing abuses
Invasion of privacy
Disturbing content
PredatorsTo Personal,[object Object],Information,[object Object],[object Object]
Hoaxes
Identity theft
SpamTo Computers,[object Object],[object Object]
Worms
Trojans
Spyware,[object Object]
Primary Threats to Personal Online Safety,[object Object],Phishing,[object Object],E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information,[object Object],Spam,[object Object],Unwanted e-mail, instant messages, and other online communication,[object Object],Identity Theft,[object Object],A crime where con artists get your personal information and access your cash and/or credit,[object Object],Hoaxes,[object Object],E-mail sent by online criminals to trick you into giving them money,[object Object]
1 sur 22

Recommandé

Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityBhandari Hìmáñßhü
13K vues22 diapositives
Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.1K vues8 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityManjushree Mashal
3.2K vues41 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityHarsh verma
13.9K vues11 diapositives
Cyber security par
Cyber securityCyber security
Cyber securitySapna Patil
3.2K vues13 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.9K vues12 diapositives

Contenu connexe

Tendances

Ppt par
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
cyber security par
cyber securitycyber security
cyber securityBasineniUdaykumar
3.2K vues10 diapositives
Cyber security par
Cyber security Cyber security
Cyber security Sachith Lekamge
1.6K vues26 diapositives
Cyber security presentation par
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
8.7K vues10 diapositives
Final cyber crime and security par
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
8K vues18 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityRishav Sadhu
5.8K vues16 diapositives

Tendances(20)

Cyber security presentation par Parab Mishra
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.7K vues
Final cyber crime and security par nikunjandy
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues
Cyber Security A Challenges For Mankind par Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K vues
Cyber Security Presentation "It Will Never Happen To Me" par Simon Salter
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter2.1K vues
Cyber security presentation par sweetpeace1
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
Introduction to cyber security par Self-employed
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed40.1K vues
Cyber security & Importance of Cyber Security par Mohammed Adam
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam71.9K vues
Cyber Crime And Security par ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cyber Security 03 par Home
Cyber Security 03Cyber Security 03
Cyber Security 03
Home943 vues

En vedette

Security par
SecuritySecurity
SecurityNiharika Gupta
650 vues20 diapositives
Cryptography par
Cryptography Cryptography
Cryptography Shankar Ghorpade
543 vues11 diapositives
Pyramid of Cyber Security par
Pyramid of Cyber SecurityPyramid of Cyber Security
Pyramid of Cyber SecurityJiří Napravnik
1.6K vues28 diapositives
Communication technique par
Communication techniqueCommunication technique
Communication techniquejapEveryday
569 vues26 diapositives
Asif par
AsifAsif
AsifMohammad Asif
2.4K vues20 diapositives
Data encryption par
Data encryptionData encryption
Data encryptionBalvant Biradar
951 vues28 diapositives

En vedette(20)

Communication technique par japEveryday
Communication techniqueCommunication technique
Communication technique
japEveryday569 vues
Information Security Cryptography ( L01- introduction ) par Anas Rock
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock935 vues
Data Encryption and Decryption using Hill Cipher par Aashirwad Kashyap
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
INDIAN CYBERLAW AND SECURITY par pattok
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok7.4K vues
Cyber crime and cyber security par jyoti_lakhani
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani5.9K vues
Encryption And Decryption par NA
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA25.3K vues
Basic Encryption Decryption Chapter 2 par AfiqEfendy Zaen
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen15K vues

Similaire à Cyber Security

Cyber Crime par
Cyber CrimeCyber Crime
Cyber Crimezahid_ned
1.5K vues17 diapositives
Computer crime par
Computer crimeComputer crime
Computer crimeVishesh Dalal
883 vues18 diapositives
Cyber Security And Internet Security Essay par
Cyber Security And Internet Security EssayCyber Security And Internet Security Essay
Cyber Security And Internet Security EssayPay To Do Paper Singapore
127 vues24 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityTushar Nikam
898 vues18 diapositives
cybersecurity-210715084148.pdf par
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
26 vues30 diapositives
Microsoft protect ppt_ms_final par
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
415 vues33 diapositives

Similaire à Cyber Security(20)

Cyber Crime par zahid_ned
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned1.5K vues
Microsoft protect ppt_ms_final par 21_zaheer
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer415 vues
Cyber security threats and its solutions par maryrowling
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling271 vues
computer_security.ppt par Asif Raza
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza5 vues
Cyber crime and Security par Hussain777
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777823 vues
presentation on cyber crime and security par Alisha Korpal
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal35.4K vues
Cyber crime and security par BasitShah18
Cyber crime and security Cyber crime and security
Cyber crime and security
BasitShah18195 vues
Cybercrime.ppt par Aeman Khan
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan728.3K vues

Dernier

Structure and Functions of Cell.pdf par
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
701 vues10 diapositives
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively par
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
598 vues18 diapositives
Create a Structure in VBNet.pptx par
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
75 vues8 diapositives
Psychology KS5 par
Psychology KS5Psychology KS5
Psychology KS5WestHatch
103 vues5 diapositives
Use of Probiotics in Aquaculture.pptx par
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptxAKSHAY MANDAL
104 vues15 diapositives
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx par
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
684 vues81 diapositives

Dernier(20)

Structure and Functions of Cell.pdf par Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan701 vues
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively par PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 598 vues
Create a Structure in VBNet.pptx par Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 vues
Psychology KS5 par WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch103 vues
Use of Probiotics in Aquaculture.pptx par AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL104 vues
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... par Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
The basics - information, data, technology and systems.pdf par JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1126 vues
How to empty an One2many field in Odoo par Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George72 vues
Education and Diversity.pptx par DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar177 vues
Solar System and Galaxies.pptx par DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar94 vues
CUNY IT Picciano.pptx par apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 vues
The Accursed House by Émile Gaboriau par DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta212 vues

Cyber Security