Cyber security

A PRESENTATION ON CYBER SECURITY
What is cyber security?
The need for security.
Features of cyber security.
What is cyber crime?
Characteristics of cyber crime.
What cyber crime includes?
Cyber threat evolution.
Global Attack trend.
Top originating countries-Malicious code.
Cyber security measures.
Campus cyber security measures.
What is Cyber Security?
Cyber-safety is a common term used to describe
a set of practices, measures and/or actions you
can take to protect personal information and
your computer from attacks.
Cyber security refers to the technologies and
processes designed to protect computers,
networks and data from unauthorized access,
vulnerabilities and attacks delivered via the
Internet by cyber criminals.
The need for security
Industrial Need for Information Security:-
An organization needs information security for four important
reasons:
To protect the organization’s ability to function.
To enable the safe operation of applications
implemented on the organization’s IT systems.
To protect the data that the organization collects
and uses.
To safeguard the technology assets in use at the
organization.
Features of Cyber Security:-
Comprehensive protection against viruses, spyware,
and other malware.
Bidirectional firewall with intrusion detection and
network integrity safeguard.
System Guard to protect critical system files and
registry.
Web Control to block inappropriate web-sites.
Protection against unauthorized termination
of security functions.
What is Cyber crime?
Cyber crime,refers to any crime that
involves a computer and a network.
The computer may have been used in
the commission of a crime, or it may
be the target.
Characteristics of Cyber crime
oSilent in nature.
oGlobal in character.
oNon existance of physical evidence.
oCreates high impact.
oHigh potential and easy to perpetrate.
What Cyber crime includes?
Cyber crime includes the cateories:-
1.Computer viruses
2.Denial of service attacks
3.Malware(malicious code)
4.Frauds
5.Identity theft
Computer virus:-
A computer virus is a type of malware that, when executed,replicates by
inserting copies of itself (possibly modified) into other computer
programs, data files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to be "infected".
Denial of service attacks:-
In computing, a denial-of-service (DoS) or distributed denial-of-service
(DDoS) attack is an attempt to make a machine or network resource
unavailable to its intended users.
Malware(malicious code):-
Malware, short for malicious software, is software used to disrupt
computer operation, gather sensitive information, or gain access to
private computer systems.
Frauds:-
Fraud is the use of information technology to commit crime.
Identity theft:-
Identity theft is a form of stealing someone's identity in which someone
pretends to be someone else by assuming that person's identity, usually
as a method to gain access to resources or obtain credit and other
benefits in that person's name.
Virus
Breaking
Web Sites
Malicious
Code
(Melissa)
Advanced Worm /
Trojan (I LOVE
YOU)
Identity Theft
(Phishing)
Organised Crime
Data Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
Global Attack Trend
Top originating countries–Malicious code
Cyber Security Measures:-
Using intrusion and alert programs:-
They need to be operated constantly so that all unusual behavior on
network is caught immediately.
Using encryption:-
Encryption is able to transform data into a form that makes almost
impossible to read it without the right key. The key is used to allow
controlled access to the information to selected people.
Passwords:-
Passwords should be changed with regular intervals of time and it
should be alpha-numeric, so that it should be difficult to judge.
Using network scanning programs:-
We should install harmful programs detecting softwares in our system
to get all information about the trojan and malicious code in the network.
Campus cyber security basics
Services
 Campus email virus filtering
 Campus firewall services
 Email attachment filtering
 Vulnerability scanning
 Intrusion prevention system
Software
 Free anti-virus software:
Sophos Anti-virus
 Free encryption software:
Pointsec for PC
 Free change
management software:
Tripwire
Here are some services and software to protect the
campus network against cyber-safety attacks. These
include:
THANK YOU ALL
ANY SUGGESSIONS OR
QUERIES?
1 sur 17

Recommandé

Cyber securityCyber security
Cyber securityManjushree Mashal
3.1K vues41 diapositives
CYBER SECURITYCYBER SECURITY
CYBER SECURITYVaishak Chandran
2.5K vues18 diapositives
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Cyber securityCyber security
Cyber securityChethanMp7
621 vues22 diapositives
cyber securitycyber security
cyber securityBasineniUdaykumar
3.2K vues10 diapositives
Cyber securityCyber security
Cyber securityHarsh verma
13.6K vues11 diapositives

Contenu connexe

Tendances

PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
1.4K vues23 diapositives
Cyber securityCyber security
Cyber securitySamsil Arefin
1.7K vues21 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.8K vues12 diapositives

Tendances(20)

PptPpt
Ppt
Geetu Khanna1.8K vues
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare1.4K vues
Cyber securityCyber security
Cyber security
Samsil Arefin1.7K vues
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos15.2K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru2.8K vues
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed39.8K vues
Cyber attackCyber attack
Cyber attack
Manjushree Mashal6K vues
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel42.2K vues
Cyber SecurityCyber Security
Cyber Security
Maryam Hidayatallah CPFA,MIPA,MA,CICA758 vues
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar350 vues
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer743 vues
CybersecurityCybersecurity
Cybersecurity
Foram Gosai1.8K vues
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.6K vues
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair967 vues
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4K vues
Cyber securityCyber security
Cyber security
Rishav Sadhu5.7K vues

En vedette

Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
727.6K vues20 diapositives
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
602.4K vues22 diapositives
Cyber Security TermsCyber Security Terms
Cyber Security TermsSuryaprakash Nehra
1.5K vues27 diapositives

En vedette(20)

Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari539K vues
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan727.6K vues
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera602.4K vues
Cyber Security TermsCyber Security Terms
Cyber Security Terms
Suryaprakash Nehra1.5K vues
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas47.8K vues
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha59.1K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela57.6K vues
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi216.8K vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253344K vues
شهادة الأمنشهادة الأمن
شهادة الأمن
كلية التقنيه492 vues
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.2K vues
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli1.2K vues
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues

Similaire à Cyber security

cyber security cyber security
cyber security NiharikaVoleti
84 vues19 diapositives
Cyber securityCyber security
Cyber securityAkdu095
164 vues18 diapositives

Similaire à Cyber security(20)

Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8160 vues
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019477 vues
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University202 vues
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath639 vues
cyber security cyber security
cyber security
NiharikaVoleti84 vues
Cyber securityCyber security
Cyber security
Akdu095164 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104133 vues
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope3.1K vues
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel1524 vues
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal612 vues
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi7072 vues
Cyber.pptxCyber.pptx
Cyber.pptx
MahalakshmiShetty320 vues
Module 1.pdfModule 1.pdf
Module 1.pdf
Sitamarhi Institute of Technology12 vues
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology120 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman147 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3600 vues
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon1723 vues
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27117 vues

Dernier(20)

2022 CAPE Merit List 2023 2022 CAPE Merit List 2023
2022 CAPE Merit List 2023
Caribbean Examinations Council3K vues
discussion post.pdfdiscussion post.pdf
discussion post.pdf
jessemercerail70 vues
SIMPLE PRESENT TENSE_new.pptxSIMPLE PRESENT TENSE_new.pptx
SIMPLE PRESENT TENSE_new.pptx
nisrinamadani2146 vues
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA156 vues
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba110 vues
Nico Baumbach IMR Media ComponentNico Baumbach IMR Media Component
Nico Baumbach IMR Media Component
InMediaRes1186 vues
Chemistry of sex hormones.pptxChemistry of sex hormones.pptx
Chemistry of sex hormones.pptx
RAJ K. MAURYA97 vues
Sociology KS5Sociology KS5
Sociology KS5
WestHatch50 vues
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdf
alqaseedae81 vues
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio132 vues
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN172 vues
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar84 vues
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch52 vues
STYP infopack.pdfSTYP infopack.pdf
STYP infopack.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego143 vues
GSoC 2024GSoC 2024
GSoC 2024
DeveloperStudentClub1049 vues
ICANNICANN
ICANN
RajaulKarim2057 vues

Cyber security

  • 1. A PRESENTATION ON CYBER SECURITY
  • 2. What is cyber security? The need for security. Features of cyber security. What is cyber crime? Characteristics of cyber crime. What cyber crime includes? Cyber threat evolution. Global Attack trend. Top originating countries-Malicious code. Cyber security measures. Campus cyber security measures.
  • 3. What is Cyber Security? Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks. Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  • 4. The need for security Industrial Need for Information Security:- An organization needs information security for four important reasons: To protect the organization’s ability to function. To enable the safe operation of applications implemented on the organization’s IT systems. To protect the data that the organization collects and uses. To safeguard the technology assets in use at the organization.
  • 5. Features of Cyber Security:- Comprehensive protection against viruses, spyware, and other malware. Bidirectional firewall with intrusion detection and network integrity safeguard. System Guard to protect critical system files and registry. Web Control to block inappropriate web-sites. Protection against unauthorized termination of security functions.
  • 6. What is Cyber crime? Cyber crime,refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 7. Characteristics of Cyber crime oSilent in nature. oGlobal in character. oNon existance of physical evidence. oCreates high impact. oHigh potential and easy to perpetrate.
  • 8. What Cyber crime includes? Cyber crime includes the cateories:- 1.Computer viruses 2.Denial of service attacks 3.Malware(malicious code) 4.Frauds 5.Identity theft
  • 9. Computer virus:- A computer virus is a type of malware that, when executed,replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Denial of service attacks:- In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Malware(malicious code):- Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
  • 10. Frauds:- Fraud is the use of information technology to commit crime. Identity theft:- Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.
  • 11. Virus Breaking Web Sites Malicious Code (Melissa) Advanced Worm / Trojan (I LOVE YOU) Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS 1995 2000 2003-04 2005-06 2007-081977
  • 14. Cyber Security Measures:- Using intrusion and alert programs:- They need to be operated constantly so that all unusual behavior on network is caught immediately. Using encryption:- Encryption is able to transform data into a form that makes almost impossible to read it without the right key. The key is used to allow controlled access to the information to selected people. Passwords:- Passwords should be changed with regular intervals of time and it should be alpha-numeric, so that it should be difficult to judge. Using network scanning programs:- We should install harmful programs detecting softwares in our system to get all information about the trojan and malicious code in the network.
  • 15. Campus cyber security basics Services  Campus email virus filtering  Campus firewall services  Email attachment filtering  Vulnerability scanning  Intrusion prevention system Software  Free anti-virus software: Sophos Anti-virus  Free encryption software: Pointsec for PC  Free change management software: Tripwire Here are some services and software to protect the campus network against cyber-safety attacks. These include: