SlideShare a Scribd company logo
1 of 7
CYBER SECURITY
AWARENESS
PRESENTED BY :-
ABSHAR FATIMA
(MSc CS PART-1)
CYBER ? The term 'cyber' is an adjective or prefix which means relating to or
characteristic of information technology, virtual reality, and computers.
CYBER CRIME
Criminal activities carried out by
means of computers or the internet.
 Cyber Stalking
 Cyber Terrorism
 Phishing
 Identity Theft
 Email Spoofing
 SMS Spoofing
 Defamation
 Cyber Extortion
 Hacking
 Credit/debit Card Fraud
 Cyber pornography etc..
Leads to
Cyber security is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks. It's also known
as information technology security or electronic information security.
DO YOUR PART, BE CYBER SMART.
WHY? WAYS?
CYBER SECURITY AWARENESS
Cyber security awareness means knowing about various cyber threats, the
ability to detect potential threats, and taking measures to mitigate their
effect to protect your digital assets.
 Ability to quickly recognize threats.
 Ability to appropriately report the
cyber threats and attacks.
 Keep the individual updated with
latest threats and attacks.
 Prioritize cyber security in your organization or
institution.
 Promote cyber security best practices, supported
by robust policies and procedures.
 Set specific rules for emails, browsing and mobile
devices.
 Conduct regular cyber security training and
session.
 Make cyber security courses/training mandatory
for all.
 Implement cyber security drills.
 Keep communication lines open.
Highest Cyber Crime State :-
Telangana (19.45%),
Uttar Pradesh, Karnataka,
Maharashtra and Assam(rest 71.45%)
Latest Cyber Crime in Pune :-
 Engineer loses Rs 12 lakh to stock
trading fraud in Pune
TNN / Updated: Jan 25, 2023, 08:53 IST
 Cyber crooks dupe 6 of Rs 5.5 lakh in
power scam in Pune
TNN / Dec 31, 2022, 05:22 IST
 Pune techie tries to buy wine online,
loses Rs 96,000 to scamster
TNN / Updated: Dec 14, 2022, 05:42 IST
 Crooks make 4 transactions of 2.7L
using card details
TNN / Jan 17, 2023, 08:42 IST
Cyber Security Initiatives by the
Government of India :-
 The Indian Computer Emergency
Response Team (CERT-In)
 Cyber Surakshit Bharat
 National Critical Information
Infrastructure Protection Centre
 Cyber Swachhta Kendra
 National Cyber Security Strategy
2020
 Appointing CIOs (Chief Information
Security Officer) etc..
Most common cyber attacks :-
 Malware attack
 Phishing attack
 Man-in-the-middle
 Identity theft
CONCLUSION
Cyber security is one of the most
important aspects of the fast-paced
growing digital world.
The threats of it are hard to deny,
so it is crucial to learn how to
defend from them and teach others
how to do it too.
cyber_security_awareness.pptx

More Related Content

Similar to cyber_security_awareness.pptx

An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 

Similar to cyber_security_awareness.pptx (20)

An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security course in India - GICSEH.pdf
Cyber security course in India - GICSEH.pdfCyber security course in India - GICSEH.pdf
Cyber security course in India - GICSEH.pdf
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 

cyber_security_awareness.pptx

  • 1. CYBER SECURITY AWARENESS PRESENTED BY :- ABSHAR FATIMA (MSc CS PART-1)
  • 2. CYBER ? The term 'cyber' is an adjective or prefix which means relating to or characteristic of information technology, virtual reality, and computers. CYBER CRIME Criminal activities carried out by means of computers or the internet.  Cyber Stalking  Cyber Terrorism  Phishing  Identity Theft  Email Spoofing  SMS Spoofing  Defamation  Cyber Extortion  Hacking  Credit/debit Card Fraud  Cyber pornography etc.. Leads to
  • 3. Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. DO YOUR PART, BE CYBER SMART.
  • 4. WHY? WAYS? CYBER SECURITY AWARENESS Cyber security awareness means knowing about various cyber threats, the ability to detect potential threats, and taking measures to mitigate their effect to protect your digital assets.  Ability to quickly recognize threats.  Ability to appropriately report the cyber threats and attacks.  Keep the individual updated with latest threats and attacks.  Prioritize cyber security in your organization or institution.  Promote cyber security best practices, supported by robust policies and procedures.  Set specific rules for emails, browsing and mobile devices.  Conduct regular cyber security training and session.  Make cyber security courses/training mandatory for all.  Implement cyber security drills.  Keep communication lines open.
  • 5. Highest Cyber Crime State :- Telangana (19.45%), Uttar Pradesh, Karnataka, Maharashtra and Assam(rest 71.45%) Latest Cyber Crime in Pune :-  Engineer loses Rs 12 lakh to stock trading fraud in Pune TNN / Updated: Jan 25, 2023, 08:53 IST  Cyber crooks dupe 6 of Rs 5.5 lakh in power scam in Pune TNN / Dec 31, 2022, 05:22 IST  Pune techie tries to buy wine online, loses Rs 96,000 to scamster TNN / Updated: Dec 14, 2022, 05:42 IST  Crooks make 4 transactions of 2.7L using card details TNN / Jan 17, 2023, 08:42 IST Cyber Security Initiatives by the Government of India :-  The Indian Computer Emergency Response Team (CERT-In)  Cyber Surakshit Bharat  National Critical Information Infrastructure Protection Centre  Cyber Swachhta Kendra  National Cyber Security Strategy 2020  Appointing CIOs (Chief Information Security Officer) etc.. Most common cyber attacks :-  Malware attack  Phishing attack  Man-in-the-middle  Identity theft
  • 6. CONCLUSION Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats of it are hard to deny, so it is crucial to learn how to defend from them and teach others how to do it too.