This is a good presentation for study in cyber world. Cyber world is very important part of our new generation nd this have negative or positive view this ppt shows all things...
2. Contents:
Introduction
Overview of the Types of Cyber Security
Types of Cyber Security Threats
IT Act 2000
Safety Tips of Cyber Crime
Advantage and Disadvantage of Cyber Security
Conclusion
Reference
4. August Kerckhoffs the father of computer security.
Cyber Security is a process that’s designed to protect networks and
devices from external threats.
It aims to reduce the risk of cyber attacks and protect
against the unauthorised exploitation of systems, networks
and technologies.
5. Overview of The types of Cyber Security:
Network Security
This type of security refers to the protection of your
computer network from attacks inside and outside of
the network.
Network security uses many different protocols to
block attacks but allows authorized user access to
the secure network.
6. Application Security
This is the process of protecting sensitive information at the
app-level.
.Application security might involve tactics like requiring a
strong password from the user.
Application security may include hardware, software, and
procedures that identify or minimize security.
7. Cloud Security
This includes keeping data private and safe across online-based infrastructure,
applications, and platforms.
Most people use online systems such as Google Drive, Microsoft OneDrive, and
Apple iCloud for storage.
It is important for these platforms to remain secure at all times due to the
massive amounts of data stored on them.
Cloud security can also include business services that are stored in a data
center.
8. Operational
Security
Operational security (OPSEC) is a security and risk management
process that prevents sensitive information from getting into
the wrong hands.
Operations security protects and controls sensitive assets,
contributing to an overall safe and secure organization.
Good operational security should not require
complex, time consuming or expensive processes.
9. Types of Cyber Security
Threats:
Phishing
Attack
These attackts are mainly executed by sending a
large number of emails to different users requesting
them to click a fake link or provide sensitive
information.
The best way to prevent phishing attacks is to
monitor your emails closely by viewing the sender’s
email address before clicking on anything.
10. Password Attack
The most common type of security that every user employs is a password. We
use them to login to our computers, phones, and music devices.
One common type of password attack is to use social engineering to hack into a
user’s account. This could be sending a phishing email, monitoring social media
accounts.
The best way to prevent a password attack is to maintain strong passwords and
change them often. Your passwords should include special characters,
numbers, and lower and upper case letters.
You should never have the same password for more than one account.
11. Man-in-the-Middle Attack
It is a type of attack that allows an attacker to intercepts the
connection between client and server and acts as a bridge
between them.
Due to this, an attacker will be able to read, insert and modify the
data .
12. It is the attack in which some data will be injected into a web application
to manipulate the application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
Injection Attack
Dictionary Attack
This type of attack stored the list of a commonly used password
and validated them to get original password.
13. Malware Attack
A malware attack is when cybercriminals create malicious software that’s installed on
someone else’s device without their knowledge to gain access to personal
information.
Malware attacks can occur on all sorts of devices and operating systems, including
Microsoft Windows, macOS, Android, and iOS.
Different types of malware include viruses, spyware, ransomware, and Trojan
horses.
14. IT Act 2000:
• The Information Technology Act, 2000 is an Act of the Indian Parliament notified on
17 October 2000. It is the primary law in India dealing with cybercrime and electronic
The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and reduce cybercrimes.
commerce.
Originally Published: 9 May 2000
Introduced by: Pramod Mahajan; Minister of Communications and Information
Technology
Commenced: 17 October 2000
15. The IT Act, 2000 has two schedules:
•First Schedule –
Deals with documents to which the Act shall not apply.
•Second Schedule –
Deals with electronic signature or electronic authentication method.
16. Safety Tips for Cyber
Crime:
Use strong password
Keep your software updated
Protect your Data
Talk to your children about the internet
Block spyware attacks
Secure your computer
17. Advantage and Disadvantage of Cyber
Security:
Advantage:
Protects system against viruses, worms, spyware and other
unwanted programs.
It twill protect your business.
Protects the computer from being hacked.
Minimizes computer freezing and crashes.
Gives privacy to users.
18. Disadvantage:
Firewalls can be difficult to configure
correctly.
Makes the system slower than before.
Could be costly for average user.
Need to keep updating the new
software in order to keep security up to
date.
19. Conclusion:
Cyber security is one of the most important aspects of the fast-paced
growing digital world.
The threats of it are hard to deny, so it is crucial to learn how to defend
from them and teach others how to do it .