SlideShare une entreprise Scribd logo
1  sur  27
NAME –
ANIRUDHA KISHOR WELUKAR
(2019BEC075)
PRATIK VASANTRAO THAKARE
(2019BEC077)
CYBER SECURITY AWARENESS
PRESENTATION CONTENTS
• Need for Cyber Security
• Threats:
• Hacking
• Malware
• Phishing
• Stay Secure
• Internet Shopping
• Internet Banking
• Personal Privacy
• Public Wi-Fi
• Passwords
• Router
• Internet of Things (IOT)
• QR Codes
• Support & Resources
WHY IS CYBER AWARENESS IMPORTANT?
• Cyber crime is a growing trend
• Raise awareness of threats
• As with most crimes the police can’t tackle this
problem alone
• To encourage reporting
• Cyber crime is massively under reported.
HOW CYBER CRIME AFFECTS THE UK
• Approximately 12.5% of the UK economy is online
• In 2016 49% of businesses were breached.
• According to an Office for National Statistics Survey, there were
almost 6 million Cyber Crime and Fraud offences in 2016
WHO IS DOING THE HACKING?
HACKING
• Political /state (state level/ military)
• Fame/ kudos (fun/ status)
• Financial (theft, fraud, blackmail)
• Hacktivism (cause)
• Pen testers (legal hacking)
• Police
• Insider
• Business
COMMON THREATS -
RANSOMWARE
• Normally loaded onto a computer via a download/attachment/link from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove
without removing all of the data
RANSOMWARE
HOW TO TACKLE RANSOMWARE
• Back up
• Patch
• Attachments
PHISHING
• Obtain sensitive information by deception.
How to tackle the
problem
• Don’t click any links on an email unless
you can guarantee who its from.
• Use a trusted method of contacting the
company via a phone number, app or
website.
• Mark the email as spam and contact the
organisation.
WHAT TO LOOK OUT FOR WHEN SHOPPING
ON THE INTERNET?
• Ensure correct website
• HTTPS and the padlock
• Use a credit card/ PayPal when conducting online
transactions.
PUBLIC WI-FI
• Not trustworthy. They could share your information to other companies who operate in countries without
any data protection.
• You may not know who is watching you whilst you’re online.
What to do and not do to
• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
PASSWORDS ADVICE
• Use 1 password per account.
• Three random words is the NCSC’s advice. Capitals, special characters and
numbers is your own choice.
• If you follow this advice your passwords security will be significantly increased
against a brute force attack.
• Password managers can be helpful to store your passwords.
ADVICE
• 80% of cyber-crime is preventable.
• QR Codes
ADVICE
• Update and migrate
• Activate your firewall
• Staff awareness
• Data encryption
• User accounts privileges i.e admin
• Cyber insurance
• Prepare Plan
YOU ARE THE BEST DEFENCE!
Always be aware!
Always be on your guard!
REPORTING CYBERCRIME
• Online fraud is to be reported to
National Cyber Crime Reporting Portal
Or
Cyber Security Cells(nearby)
• They’re the national reporting mechanism for fraud.
• Helpline Number for India:
Helpline Number - 155260
RESOURCES
• Get safe Online (www.getsafeonline.org)
Thank you

Contenu connexe

Tendances

A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
806670
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
computers 11
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
Alexine Marier
 

Tendances (19)

A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
presentation
presentationpresentation
presentation
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
KOUSHI SUNDER of STEMLESS at REVEL: CANNABIS + THE CONSUMER
KOUSHI SUNDER of STEMLESS at REVEL: CANNABIS + THE CONSUMERKOUSHI SUNDER of STEMLESS at REVEL: CANNABIS + THE CONSUMER
KOUSHI SUNDER of STEMLESS at REVEL: CANNABIS + THE CONSUMER
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
 
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 

Similaire à Cyber security (2) (2)

Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
PREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
javed75
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
Jermaine Smith
 

Similaire à Cyber security (2) (2) (20)

cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Raksha - by Vanshit Malhotra
Cyber Raksha - by Vanshit MalhotraCyber Raksha - by Vanshit Malhotra
Cyber Raksha - by Vanshit Malhotra
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 

Dernier

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Dernier (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 

Cyber security (2) (2)

  • 1. NAME – ANIRUDHA KISHOR WELUKAR (2019BEC075) PRATIK VASANTRAO THAKARE (2019BEC077)
  • 3. PRESENTATION CONTENTS • Need for Cyber Security • Threats: • Hacking • Malware • Phishing • Stay Secure • Internet Shopping • Internet Banking • Personal Privacy • Public Wi-Fi • Passwords • Router • Internet of Things (IOT) • QR Codes • Support & Resources
  • 4. WHY IS CYBER AWARENESS IMPORTANT? • Cyber crime is a growing trend • Raise awareness of threats • As with most crimes the police can’t tackle this problem alone • To encourage reporting • Cyber crime is massively under reported.
  • 5. HOW CYBER CRIME AFFECTS THE UK • Approximately 12.5% of the UK economy is online • In 2016 49% of businesses were breached. • According to an Office for National Statistics Survey, there were almost 6 million Cyber Crime and Fraud offences in 2016
  • 6. WHO IS DOING THE HACKING?
  • 7. HACKING • Political /state (state level/ military) • Fame/ kudos (fun/ status) • Financial (theft, fraud, blackmail) • Hacktivism (cause) • Pen testers (legal hacking) • Police • Insider • Business
  • 8. COMMON THREATS - RANSOMWARE • Normally loaded onto a computer via a download/attachment/link from an email or website. • Will either lock the screen or encrypt your data. • Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data
  • 10. HOW TO TACKLE RANSOMWARE • Back up • Patch • Attachments
  • 11. PHISHING • Obtain sensitive information by deception. How to tackle the problem • Don’t click any links on an email unless you can guarantee who its from. • Use a trusted method of contacting the company via a phone number, app or website. • Mark the email as spam and contact the organisation.
  • 12. WHAT TO LOOK OUT FOR WHEN SHOPPING ON THE INTERNET? • Ensure correct website • HTTPS and the padlock • Use a credit card/ PayPal when conducting online transactions.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. PUBLIC WI-FI • Not trustworthy. They could share your information to other companies who operate in countries without any data protection. • You may not know who is watching you whilst you’re online. What to do and not do to • Don’t use online banking. Use your own data. • Don’t conduct any purchases • Use a virtual private network (VPN)
  • 18.
  • 19.
  • 20.
  • 21. PASSWORDS ADVICE • Use 1 password per account. • Three random words is the NCSC’s advice. Capitals, special characters and numbers is your own choice. • If you follow this advice your passwords security will be significantly increased against a brute force attack. • Password managers can be helpful to store your passwords.
  • 22. ADVICE • 80% of cyber-crime is preventable. • QR Codes
  • 23. ADVICE • Update and migrate • Activate your firewall • Staff awareness • Data encryption • User accounts privileges i.e admin • Cyber insurance • Prepare Plan
  • 24. YOU ARE THE BEST DEFENCE! Always be aware! Always be on your guard!
  • 25. REPORTING CYBERCRIME • Online fraud is to be reported to National Cyber Crime Reporting Portal Or Cyber Security Cells(nearby) • They’re the national reporting mechanism for fraud. • Helpline Number for India: Helpline Number - 155260
  • 26. RESOURCES • Get safe Online (www.getsafeonline.org)