Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.


Presentation on Cyber security

  • Login to see the comments

  • Be the first to like this


  1. 1. Presentation by: Chandrasekhar B
  2. 2. Introduction  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  3. 3. NEED FOR CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  4. 4. MAJOR SECURITY PROBLEMS  Virus  Hackers  Malwares  Trojan horses  Password cracking
  5. 5. VIRUSES AND WORMS  A Virus is a program that is loaded onto your computer without your knowledge and runs against your wishes
  6. 6. SOLUTION Install a security suite that protects the computer against threats such as viruses and worms.
  7. 7. HACKERS  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  8. 8. HOW TO PREVENT HACKING  Sometimes it may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  9. 9. TROJAN HORSES  A Trojan horse virus is a malware program that attaches itself to an innocuous file and embeds itself in your system  These viruses are the most serious threats to computers
  10. 10. HOW TO AVOID TROJANS  Security suites, such as Avast Internet Security, Mcafee etc., will prevent you from downloading Trojan Horses.
  11. 11. PASSWORD CRACKING  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  12. 12. SECURING PASSWORD  Use always Strong password.  Never use same password for two different sites.
  14. 14.  Cyber Security Strategy — India Security Policy, Compliance and Assurance — Legal Framework -IT Act, 2000. -IT(Amendment) Bill, 2006 — Data Protection & Computer crimes -Best Practice ISO 27001 -Security Assurance Framework- IT/ITES/BPO Companies Security Incident— Early Warning & Response -CERT-ln National Cyber Alert System -Information Exchange With international CERTs Capacity building -Skill & Competence development. -Training Of law enforcement agencies and judicial Officials in the collection and analysis Of digital evidence. -Training in the area Of implementing information security in collaboration With Specialised organisations in US.
  15. 15. Setting up Digital Forensics Centres: -Domain Specific training — Cyber Forensics Research and Development -Network Monitoring -biometric Authentication -Network Security International Collaboration
  16. 16. They want what you’ve got Don’t give it to them.