2. What is cyber security?
The need for security.
Features of cyber security.
What is cyber crime?
Characteristics of cyber crime.
What cyber crime includes?
Cyber threat evolution.
Global Attack trend.
Top originating countries-Malicious code.
Cyber security measures.
Campus cyber security measures.
3. What is Cyber Security?
Cyber-safety is a common term used to describe
a set of practices, measures and/or actions you
can take to protect personal information and
your computer from attacks.
Cyber security refers to the technologies and
processes designed to protect computers,
networks and data from unauthorized access,
vulnerabilities and attacks delivered via the
Internet by cyber criminals.
4. The need for security
Industrial Need for Information Security:-
An organization needs information security for four important
To protect the organization’s ability to function.
To enable the safe operation of applications
implemented on the organization’s IT systems.
To protect the data that the organization collects
To safeguard the technology assets in use at the
5. Features of Cyber Security:-
Comprehensive protection against viruses, spyware,
and other malware.
Bidirectional firewall with intrusion detection and
network integrity safeguard.
System Guard to protect critical system files and
Web Control to block inappropriate web-sites.
Protection against unauthorized termination
of security functions.
6. What is Cyber crime?
Cyber crime,refers to any crime that
involves a computer and a network.
The computer may have been used in
the commission of a crime, or it may
be the target.
7. Characteristics of Cyber crime
oSilent in nature.
oGlobal in character.
oNon existance of physical evidence.
oCreates high impact.
oHigh potential and easy to perpetrate.
8. What Cyber crime includes?
Cyber crime includes the cateories:-
2.Denial of service attacks
9. Computer virus:-
A computer virus is a type of malware that, when executed,replicates by
inserting copies of itself (possibly modified) into other computer
programs, data files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to be "infected".
Denial of service attacks:-
In computing, a denial-of-service (DoS) or distributed denial-of-service
(DDoS) attack is an attempt to make a machine or network resource
unavailable to its intended users.
Malware, short for malicious software, is software used to disrupt
computer operation, gather sensitive information, or gain access to
private computer systems.
Fraud is the use of information technology to commit crime.
Identity theft is a form of stealing someone's identity in which someone
pretends to be someone else by assuming that person's identity, usually
as a method to gain access to resources or obtain credit and other
benefits in that person's name.
14. Cyber Security Measures:-
Using intrusion and alert programs:-
They need to be operated constantly so that all unusual behavior on
network is caught immediately.
Encryption is able to transform data into a form that makes almost
impossible to read it without the right key. The key is used to allow
controlled access to the information to selected people.
Passwords should be changed with regular intervals of time and it
should be alpha-numeric, so that it should be difficult to judge.
Using network scanning programs:-
We should install harmful programs detecting softwares in our system
to get all information about the trojan and malicious code in the network.
15. Campus cyber security basics
Campus email virus filtering
Campus firewall services
Email attachment filtering
Intrusion prevention system
Free anti-virus software:
Free encryption software:
Pointsec for PC
Here are some services and software to protect the
campus network against cyber-safety attacks. These