Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
ppt pdf ajay.pdf
1.
2. • Introduction
• What is Cyber Security
• Security & Privacy
• Why do we need Cyber Security
• Cyber Threats
• How to avoid Cyber Attacks
• Advantages and Disadvantages
3. • The Internet in India is growing rapidly. There are two sides to a coin.
Internet also has it’s own disadvantages is cyber crime.- illegal activity
committed on the Internet.
• Cyber security refers to the technologies and processes designed to protect
computers, networks and data from unauthorized access.
• The objective of cyber security is to establish rules and measure to use
against attacks over the internet.
4. • Cyber Security is the protection of internet-connected systems, including hardware, software and
data from cyberattacks.
• Cyber Security is the set of principles and practices designed to protect our computing resources
and online
information against threats.
5. • Privacy relates to any rights you
have to control your personal
information and how it’s used.
• Security refers to how your
personal information is protected.
6. • With an increasing amount of people getting connected to internet, the
security threats that cause massive harm are increasing also.
• Cyber security is necessary since it helps in securing data from threats such
as data theft , also safeguards your system from viruses
8. Hacking in simple term means an illegal intrusion in a computer system or
network. It is also known as cracking. Govt. and MNC’s websites are the
hot targets of hackers due to press coverage it receives. Hacking is an
attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorised access to or control over
computer network security systems for some illicit purpose.
9. This is an act by the criminals who floods the bandwidth of the victims network. In
the Dos attack, a hacker uses a single internet connection to either exploit a
software vulnerability or flood a target with fake request with fake request usually
I an attempt to exhaust server resources. On the other hand, DDoS attacks are
launched from multiple connected devices that are distributed across the internet.
• DoS = When a single host attacks.
• DDoS = When multiple hosts attack
simultaneously and continuously
10. Phishing is fraudulent attempt, usually made through
email, to steal your personal information. Phishing is
the attempt to obtain sensitive information such as
username, password and credit card details often for
malicious reasons through an electronic
communication(such as E-mail). A common online
phishing scam starts with an email message that
appears to come from a trusted source(legitimate
site) but actually directs recipients to provide
information to a fraudulent website.
11. Email Spam is the electronic version of junk mail. It involves sending unwanted
messages often unsolicited advertising, to a large number of recipients. Spam is a
serious security concern as it can be used to deliver Trojan horses, viruses, worms,
spyware, and targeted phishing attacks.
12. It’s malicious software (such as virus, worms and Trojan) which specifically designed
to disrupt or damage computer system or mobile device. Hackers use malware for any
number of reasons such as, extracting personal info. Or passwords, stealing money, or
preventing owners from accessing their device. Viruses are programs that attach
themselves to a computer or file and then circulate themselves to other files and to
other computers on a network. They either alter or delete the data. Malware has
actually been a threat to individuals and organizations since the early 1970s when the
Creeper virus first appeared. Since then, the world
has been under attack from hundreds of thousands
of different malware variants, all with the intent
of causing the most disruption and damage as
possible.
13. • Uninstall unnecessary software.
• Install, use and regularly update antivirus and antispyware software on every
computer
• Use a firewall for your Internet connection
• Make backup copies of important business data and information.
• Control physical access to your computers and network components.
• Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace
make sure it is secure and hidden.
• Regularly change passwords.
• Employee personal accounts
14. 1) Protects system against viruses, worms, spyware and other unwanted programs.
2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimizes computer freezing and crashes.
5) Gives privacy to users Disadvantages
Advantages
15. 1) Firewalls can be difficult to configure correctly.
2) Incorrectly configured firewalls may block users from performing certain
actions on the Internet, until the firewall configured correctly.
3) Makes the system slower than before.
4) Need to keep updating the new software in order to keep security up to date.
5) Could be costly for average user.