In this presentation i have discussed some Cyber security guidelines for the user to protect their network and systems from unwanted activities.Read less