SlideShare a Scribd company logo
1 of 10
Dr B T Sampath Kumar
Professor
Department of Library and Information Science
Tumkur University, Tumakuru, INDIA
www.sampathkumar.info
Cyber Security
Cyber security
• It is a process of creating rules and actions to
protect against cyber attacks over
the Internet.
• It is the practice of defending computers,
servers, mobile devices, electronic systems,
networks and data from malicious attacks.
Types of cyber security
In order to keep the data safely, it is essential to
use:
– Antivirus
– Firewalls
– Password
– Keep software updated
– Security suite
– Data Backups
– Cryptography etc..
Antivirus
• Anti-virus software is a program or set of
programs that are designed to prevent, detect
and remove viruses in a computer.
• You need to buy antivirus software and must
be installed in the system to detect and
remove virus.
• Some of the antivirus software are Norton,
McAfee, AVG, Quick Heal etc.,
Firewall
• Another security measure is firewall.
• A firewall is a system designed to prevent
unauthorized access to or from a private
network.
• A private network must have its own fire wall
to prevent the unauthorized access.
Password
• Password is a secret word or expression used
by authorized person to protect information
from unauthorized users.
• The password must be a combination of
letters, numbers and special symbols.
• The password should not be your name, date
of birth which can be easily traced out by
others.
Keep software updated
• This is especially important with your
operating system and Internet security
software.
• Cybercriminals frequently use known exploits,
in your software to gain access to your system.
• Patching those exploits and flaws can make it
less likely that you’ll become a cybercrime
target.
Security suite
• It is a collection of software utilities that
protects a computer from virus and other
malwares.
• It contains a suite of firewalls, antivirus, anti-
spyware and more.
Data backup
• A data backup is the result of copying or
archiving files and folders for the purpose of
being able to restore them in case
of data loss.
• The files saved in the computer need to be
stored in various data storage devises viz., CD,
DVD, Pen drive or even in the cloud.
Encryption
• It is a process of encoding messages or
information in such a way that only authorized
parties can read it.

More Related Content

What's hot

Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Teemu Tiainen
 
öğRetim Teknolojileri
öğRetim TeknolojileriöğRetim Teknolojileri
öğRetim Teknolojileriguest083079
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Aromaticity in benzenoid and non-benzenoid compunds
Aromaticity in benzenoid and non-benzenoid compundsAromaticity in benzenoid and non-benzenoid compunds
Aromaticity in benzenoid and non-benzenoid compundsSPCGC AJMER
 
AWS Simple Monthly Calculator 操作説明書
AWS Simple Monthly Calculator 操作説明書AWS Simple Monthly Calculator 操作説明書
AWS Simple Monthly Calculator 操作説明書Amazon Web Services Japan
 
Azureの学習にオススメな動画コンテンツまとめ.pptx
Azureの学習にオススメな動画コンテンツまとめ.pptxAzureの学習にオススメな動画コンテンツまとめ.pptx
Azureの学習にオススメな動画コンテンツまとめ.pptxmizuhiro
 
Optical activity in catenanes and rotaxanes
Optical activity in catenanes and rotaxanesOptical activity in catenanes and rotaxanes
Optical activity in catenanes and rotaxanesPRUTHVIRAJ K
 
Radioactive isotopes as tracers
Radioactive isotopes as tracersRadioactive isotopes as tracers
Radioactive isotopes as tracersDiscover for new
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Classification of inorganic polymers by Dr. Salma Amir
Classification of inorganic polymers by Dr. Salma AmirClassification of inorganic polymers by Dr. Salma Amir
Classification of inorganic polymers by Dr. Salma Amirsalmaamir2
 
electrochemistry.ppt
electrochemistry.pptelectrochemistry.ppt
electrochemistry.pptsarika953774
 
Notes On Microwaves
Notes On MicrowavesNotes On Microwaves
Notes On Microwavesclasse4ach
 

What's hot (20)

Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Role of biocatalysts in green synthesis , green chemistry
Role of biocatalysts in green synthesis , green chemistryRole of biocatalysts in green synthesis , green chemistry
Role of biocatalysts in green synthesis , green chemistry
 
Oxidation ppt
Oxidation pptOxidation ppt
Oxidation ppt
 
öğRetim Teknolojileri
öğRetim TeknolojileriöğRetim Teknolojileri
öğRetim Teknolojileri
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Aromaticity in benzenoid and non-benzenoid compunds
Aromaticity in benzenoid and non-benzenoid compundsAromaticity in benzenoid and non-benzenoid compunds
Aromaticity in benzenoid and non-benzenoid compunds
 
Bouveault blanc reduction
Bouveault blanc reductionBouveault blanc reduction
Bouveault blanc reduction
 
AWS Simple Monthly Calculator 操作説明書
AWS Simple Monthly Calculator 操作説明書AWS Simple Monthly Calculator 操作説明書
AWS Simple Monthly Calculator 操作説明書
 
Azureの学習にオススメな動画コンテンツまとめ.pptx
Azureの学習にオススメな動画コンテンツまとめ.pptxAzureの学習にオススメな動画コンテンツまとめ.pptx
Azureの学習にオススメな動画コンテンツまとめ.pptx
 
Optical activity in catenanes and rotaxanes
Optical activity in catenanes and rotaxanesOptical activity in catenanes and rotaxanes
Optical activity in catenanes and rotaxanes
 
Lattice energy
Lattice energyLattice energy
Lattice energy
 
Supramolecular chemistry
Supramolecular chemistrySupramolecular chemistry
Supramolecular chemistry
 
Radioactive isotopes as tracers
Radioactive isotopes as tracersRadioactive isotopes as tracers
Radioactive isotopes as tracers
 
Inductive effect
Inductive effectInductive effect
Inductive effect
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Classification of inorganic polymers by Dr. Salma Amir
Classification of inorganic polymers by Dr. Salma AmirClassification of inorganic polymers by Dr. Salma Amir
Classification of inorganic polymers by Dr. Salma Amir
 
electrochemistry.ppt
electrochemistry.pptelectrochemistry.ppt
electrochemistry.ppt
 
Notes On Microwaves
Notes On MicrowavesNotes On Microwaves
Notes On Microwaves
 

Similar to Cyber security

Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Week 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxWeek 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxMateuszSarat1
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 

Similar to Cyber security (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Week 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxWeek 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptx
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Information security
Information securityInformation security
Information security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
 
Week 12
Week 12Week 12
Week 12
 
презентация1
презентация1презентация1
презентация1
 

More from Dr. B T Sampath Kumar (20)

Selection of scholarly journal in Education
Selection of scholarly journal in EducationSelection of scholarly journal in Education
Selection of scholarly journal in Education
 
Web decay and Internet Archive
Web decay and Internet ArchiveWeb decay and Internet Archive
Web decay and Internet Archive
 
Selection of scholarly journal
Selection of scholarly journal Selection of scholarly journal
Selection of scholarly journal
 
Web browser
Web browserWeb browser
Web browser
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Software
SoftwareSoftware
Software
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
Search engine
Search engineSearch engine
Search engine
 
Programming
ProgrammingProgramming
Programming
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
Output devices
Output devicesOutput devices
Output devices
 
Networks
NetworksNetworks
Networks
 
Network topology
Network topologyNetwork topology
Network topology
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Library networks
Library networksLibrary networks
Library networks
 
Language processors
Language processorsLanguage processors
Language processors
 
Internal storage devices
Internal storage devicesInternal storage devices
Internal storage devices
 
Input devices
Input devicesInput devices
Input devices
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 

Recently uploaded

Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Cyber security

  • 1. Dr B T Sampath Kumar Professor Department of Library and Information Science Tumkur University, Tumakuru, INDIA www.sampathkumar.info Cyber Security
  • 2. Cyber security • It is a process of creating rules and actions to protect against cyber attacks over the Internet. • It is the practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks.
  • 3. Types of cyber security In order to keep the data safely, it is essential to use: – Antivirus – Firewalls – Password – Keep software updated – Security suite – Data Backups – Cryptography etc..
  • 4. Antivirus • Anti-virus software is a program or set of programs that are designed to prevent, detect and remove viruses in a computer. • You need to buy antivirus software and must be installed in the system to detect and remove virus. • Some of the antivirus software are Norton, McAfee, AVG, Quick Heal etc.,
  • 5. Firewall • Another security measure is firewall. • A firewall is a system designed to prevent unauthorized access to or from a private network. • A private network must have its own fire wall to prevent the unauthorized access.
  • 6. Password • Password is a secret word or expression used by authorized person to protect information from unauthorized users. • The password must be a combination of letters, numbers and special symbols. • The password should not be your name, date of birth which can be easily traced out by others.
  • 7. Keep software updated • This is especially important with your operating system and Internet security software. • Cybercriminals frequently use known exploits, in your software to gain access to your system. • Patching those exploits and flaws can make it less likely that you’ll become a cybercrime target.
  • 8. Security suite • It is a collection of software utilities that protects a computer from virus and other malwares. • It contains a suite of firewalls, antivirus, anti- spyware and more.
  • 9. Data backup • A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. • The files saved in the computer need to be stored in various data storage devises viz., CD, DVD, Pen drive or even in the cloud.
  • 10. Encryption • It is a process of encoding messages or information in such a way that only authorized parties can read it.