Cyber Security

2,576 views

Published on

About Cyber security

Published in: Education, Technology
3 Comments
7 Likes
Statistics
Notes
No Downloads
Views
Total views
2,576
On SlideShare
0
From Embeds
0
Number of Embeds
33
Actions
Shares
0
Downloads
329
Comments
3
Likes
7
Embeds 0
No embeds

No notes for slide

Cyber Security

  1. 1. Cyber<br />Security<br />
  2. 2. Presented by :-<br /><ul><li>VivekAgarwal</li></li></ul><li>Cyber Security<br /> Internet security is a branch of computer security specifically related to the Internet. <br /> It's objective is to establish rules and measure to use against attacks over the Internet. <br />
  3. 3. AboutCyberSecurity<br />October is National Cyber Security<br />Awareness Month. Microsoft and the<br />National Cyber Security Alliance<br />(NCSA) have teamed up with the<br />Department of Homeland Security<br />(DHS) to help increase awareness<br />about Internet security issues and to<br />educate people about how to help<br />protect themselves and their devices.<br />NCSA's mission is to create a culture<br />of cyber security and safety through<br />education and awareness activities.<br />
  4. 4. Types Of Cyber Crime<br />HACKING<br />CHILD PORNOGRAPHY<br />VIRUS DISSEMINITION<br />CYBER TERRORISM<br />SOFTWARE PIRACY<br />
  5. 5. HACKING<br />Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.<br />
  6. 6. CHILD PORNOGRAPHY <br />The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles<br />
  7. 7. VIRUSDISSEMINITION<br />Malicious software that<br />attaches itself to other<br />software. (virus, worms,<br />Trojan Horse, web<br />jacking, e-mail bombing<br />etc)<br />
  8. 8. CYBERTERRORISM<br />Terrorist attacks on the<br />Internet is by distributed<br />denial of service attacks,<br />hate websites and hate<br />emails, attacks on sensitive<br />computer networks,<br />etc. Technology savvy<br />terrorists are using 512-bit<br />encryption, which is<br />impossible to decrypt.<br />
  9. 9. SOFTWARE PIRACY<br />Theft of software through the illegal copying of<br />genuine programs or the counterfeiting and<br />distribution of products intended to pass for<br />the original.<br />
  10. 10. Internet Infrastructure inIndia<br />
  11. 11. Primary Online Risks and Threats<br />To Families<br /><ul><li>Cyberbullies
  12. 12. File-sharing abuses
  13. 13. Invasion of privacy
  14. 14. Disturbing content
  15. 15. Predators</li></ul>To Personal<br />Information<br /><ul><li>Online fraud and phishing
  16. 16. Hoaxes
  17. 17. Identity theft
  18. 18. Spam</li></ul>To Computers<br /><ul><li>Viruses
  19. 19. Worms
  20. 20. Trojans
  21. 21. Spyware</li></li></ul><li>Primary Threats to ComputerSecurity<br />Viruses/Worms<br />Software programs designed to invade your computer, and copy, damage, or delete your data.<br />Trojans<br />Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information.<br />Spyware<br />Software that tracks your online activities or displays endless ads.<br />
  22. 22. Primary Threats to Personal Online Safety<br />Phishing<br />E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information<br />Spam<br />Unwanted e-mail, instant messages, and other online communication<br />Identity Theft<br />A crime where con artists get your personal information and access your cash and/or credit<br />Hoaxes<br />E-mail sent by online criminals to trick you into giving them money<br />
  23. 23. Steps You Can Take<br />Your computer<br />Turn on Windows Internet firewall.<br />Use Microsoft Update to keep Windows up-to-date automatically.<br />Install and maintain antivirus software.<br />Install and maintain Microsoft Windows Defender.<br />Yourself<br />Practice Internet behavior that lowers your risk.<br />Manage your personal information carefully.<br />Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Windows Live, and Microsoft Outlook.<br />Your family<br />Talk with your kids about what they do online.<br />Set clear rules for Internet use.<br />Keep personal information private.<br />Use family safety settings in Microsoft software.<br />
  24. 24. Four Steps to Help ProtectYour Computer<br />Turn on Windows Internet firewall<br />Use Microsoft Update to keep Windows <br />up-to-date automatically<br />Install and maintain antivirus software<br />Install and maintain antispyware software<br />
  25. 25. Turn on Windows Internet Firewall<br />An Internet firewall helps create a protective barrier between your computer and the Internet<br />
  26. 26. Use Automatic Updates to Keep Software Up-to-date<br />Install all updates <br />as soon as they <br />are available<br />Automatic updates provide the<br />best protection<br />
  27. 27. Install and Maintain Antivirus Software<br />Antivirus software helps<br />to detect and remove<br />computer viruses before<br />they can cause damage.<br />For antivirus software to<br />be effective, you must<br />keep it up-to-date.<br />Don’t let it expire<br />
  28. 28. Install and Maintain Antispyware Software<br />Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.<br />
  29. 29. Other Ways to Help Protect Your Computer<br />Back up your files regularly<br />Read Web site privacy statements<br />Close pop-ups using red “X”<br />Think before you click<br />www.microsoft.com/protect<br />
  30. 30. Thank You<br />

×