SlideShare a Scribd company logo
1 of 11
Cyber Security
WELCOME TO TH PPT OF CYBER
SECURITY
INTRODUCTION:-
The words Cyber, relates, its origin to
information Technoogy, the internet
and virtual reality.
The term Cyber Security is that the
security offered through online
services to protect online information.
Contents
WHAT IS CYBER SECURITY
HISTORY OF CYBER SECURITY
BENEFITS OF CYBER SECURITY
NETWORK SECURITY
APPLICATION SECURITY
DATA SECURITY
NEED OF CYBER SECURITY
Need of Cyber Security
It helps in securing data from threats
like data theft of misuse
It safeguard computer from viruses
It secures from cyber crime
To protect systems,computer and data
from attack,damage and or un
authorized acess.
WHAT IS CYBER SECURITY
Cyber security is the application of
technologies, processes, and controls to
protect systems, networks, programs, devices
and data from cyber attacks.
• BENIFITS OF CYBR SECURITY
Protection against external threats. ...
• Protection against internal threats. ...
• Regulation compliance. ...
• Improved productivity. ...
• Cost savings and value. ...
• Brand trust and reputation
HISTORY OF CYBER SECURITY
The Cybersecurity checking began
in the 1970s when researcher Bob
Thomas created a computer
program called Creeper that could
move across ARPANET's network.
NETWORKS SECURITY
Network Security protects your
network and data from breaches,
intrusions and other threats. This is
a vast and overarching term that
describes hardware and software
solutions as well as processes or rules
and configurations relating to network
use, accessibility. protection.
APPLICATION SECURITY
Application security is the process of
developing, adding, and testing
security features within applications
to prevent security vulnerabilities
against threats such as
unauthorized access and
modification.
DATA SECURITY
Application security is the process of
developing, adding, and testing
security features within applications
to prevent security vulnerabilities
against threats such as
unauthorized access and
modification.
THANK U FOR WATCHING

More Related Content

Similar to BALWANT BESRA.pptx

43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Cyber Security Course
Cyber Security CourseCyber Security Course
Cyber Security Course
David Smith
 

Similar to BALWANT BESRA.pptx (20)

Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdf
 
Cyber Security Course
Cyber Security CourseCyber Security Course
Cyber Security Course
 
What are the benefits of cyber security.pdf
What are the benefits of cyber security.pdfWhat are the benefits of cyber security.pdf
What are the benefits of cyber security.pdf
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

BALWANT BESRA.pptx

  • 1. Cyber Security WELCOME TO TH PPT OF CYBER SECURITY
  • 2. INTRODUCTION:- The words Cyber, relates, its origin to information Technoogy, the internet and virtual reality. The term Cyber Security is that the security offered through online services to protect online information.
  • 3. Contents WHAT IS CYBER SECURITY HISTORY OF CYBER SECURITY BENEFITS OF CYBER SECURITY NETWORK SECURITY APPLICATION SECURITY DATA SECURITY NEED OF CYBER SECURITY
  • 4. Need of Cyber Security It helps in securing data from threats like data theft of misuse It safeguard computer from viruses It secures from cyber crime To protect systems,computer and data from attack,damage and or un authorized acess.
  • 5. WHAT IS CYBER SECURITY Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
  • 6. • BENIFITS OF CYBR SECURITY Protection against external threats. ... • Protection against internal threats. ... • Regulation compliance. ... • Improved productivity. ... • Cost savings and value. ... • Brand trust and reputation
  • 7. HISTORY OF CYBER SECURITY The Cybersecurity checking began in the 1970s when researcher Bob Thomas created a computer program called Creeper that could move across ARPANET's network.
  • 8. NETWORKS SECURITY Network Security protects your network and data from breaches, intrusions and other threats. This is a vast and overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility. protection.
  • 9. APPLICATION SECURITY Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.
  • 10. DATA SECURITY Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.
  • 11. THANK U FOR WATCHING