SlideShare a Scribd company logo
1 of 21
Cyber Security
Presented By: KANCHAN SAROJ
Contents:
 Introduction
 Overview of the Types of Cyber Security
 Types of Cyber Security Threats
 IT Act 2000
 Safety Tips of Cyber Crime
 Advantage and Disadvantage of Cyber Security
 Conclusion
 Reference
Introduction:
 August Kerckhoffs the father of computer security.
 Cyber Security is a process that’s designed to protect networks and
devices from external threats.
 It aims to reduce the risk of cyber attacks and protect
against the unauthorised exploitation of systems, networks
and technologies.
Overview of The types of Cyber Security:
Network Security
 This type of security refers to the protection of your
computer network from attacks inside and outside of
the network.
 Network security uses many different protocols to
block attacks but allows authorized user access to
the secure network.
Application Security
 This is the process of protecting sensitive information at the
app-level.
 .Application security might involve tactics like requiring a
strong password from the user.
 Application security may include hardware, software, and
procedures that identify or minimize security.
Cloud Security
 This includes keeping data private and safe across online-based infrastructure,
applications, and platforms.
 Most people use online systems such as Google Drive, Microsoft OneDrive, and
Apple iCloud for storage.
It is important for these platforms to remain secure at all times due to the
massive amounts of data stored on them.
 Cloud security can also include business services that are stored in a data
center.
Operational
Security
 Operational security (OPSEC) is a security and risk management
process that prevents sensitive information from getting into
the wrong hands.
 Operations security protects and controls sensitive assets,
contributing to an overall safe and secure organization.
 Good operational security should not require
complex, time consuming or expensive processes.
Types of Cyber Security
Threats:
Phishing
Attack
 These attackts are mainly executed by sending a
large number of emails to different users requesting
them to click a fake link or provide sensitive
information.
 The best way to prevent phishing attacks is to
monitor your emails closely by viewing the sender’s
email address before clicking on anything.
Password Attack
 The most common type of security that every user employs is a password. We
use them to login to our computers, phones, and music devices.
 One common type of password attack is to use social engineering to hack into a
user’s account. This could be sending a phishing email, monitoring social media
accounts.
 The best way to prevent a password attack is to maintain strong passwords and
change them often. Your passwords should include special characters,
numbers, and lower and upper case letters.
 You should never have the same password for more than one account.
Man-in-the-Middle Attack
 It is a type of attack that allows an attacker to intercepts the
connection between client and server and acts as a bridge
between them.
 Due to this, an attacker will be able to read, insert and modify the
data .
 It is the attack in which some data will be injected into a web application
to manipulate the application and fetch the required information.
 Example- SQL Injection, code Injection, log Injection, XML Injection etc.
Injection Attack
Dictionary Attack
 This type of attack stored the list of a commonly used password
and validated them to get original password.
Malware Attack
 A malware attack is when cybercriminals create malicious software that’s installed on
someone else’s device without their knowledge to gain access to personal
information.
 Malware attacks can occur on all sorts of devices and operating systems, including
Microsoft Windows, macOS, Android, and iOS.
 Different types of malware include viruses, spyware, ransomware, and Trojan
horses.
IT Act 2000:
• The Information Technology Act, 2000 is an Act of the Indian Parliament notified on
17 October 2000. It is the primary law in India dealing with cybercrime and electronic
The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and reduce cybercrimes.
commerce.
Originally Published: 9 May 2000
Introduced by: Pramod Mahajan; Minister of Communications and Information
Technology
Commenced: 17 October 2000
The IT Act, 2000 has two schedules:
•First Schedule –
Deals with documents to which the Act shall not apply.
•Second Schedule –
Deals with electronic signature or electronic authentication method.
Safety Tips for Cyber
Crime:
 Use strong password
 Keep your software updated
 Protect your Data
 Talk to your children about the internet
 Block spyware attacks
 Secure your computer
Advantage and Disadvantage of Cyber
Security:
Advantage:
 Protects system against viruses, worms, spyware and other
unwanted programs.
 It twill protect your business.
 Protects the computer from being hacked.
 Minimizes computer freezing and crashes.
 Gives privacy to users.
Disadvantage:
 Firewalls can be difficult to configure
correctly.
 Makes the system slower than before.
 Could be costly for average user.
 Need to keep updating the new
software in order to keep security up to
date.
Conclusion:
Cyber security is one of the most important aspects of the fast-paced
growing digital world.
The threats of it are hard to deny, so it is crucial to learn how to defend
from them and teach others how to do it .
References:
https://www.bsigroup.com
https://www.geeksforgeeks.org
https://en.wikipedia.org
https://www.analyticsinsight.net
Thank You

More Related Content

Similar to Seminar ppt.pptx

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 

Similar to Seminar ppt.pptx (20)

UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Information security
Information securityInformation security
Information security
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad EscortsCall girls in Ahmedabad High profile
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 

Recently uploaded (20)

VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 

Seminar ppt.pptx

  • 2. Contents:  Introduction  Overview of the Types of Cyber Security  Types of Cyber Security Threats  IT Act 2000  Safety Tips of Cyber Crime  Advantage and Disadvantage of Cyber Security  Conclusion  Reference
  • 4.  August Kerckhoffs the father of computer security.  Cyber Security is a process that’s designed to protect networks and devices from external threats.  It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.
  • 5. Overview of The types of Cyber Security: Network Security  This type of security refers to the protection of your computer network from attacks inside and outside of the network.  Network security uses many different protocols to block attacks but allows authorized user access to the secure network.
  • 6. Application Security  This is the process of protecting sensitive information at the app-level.  .Application security might involve tactics like requiring a strong password from the user.  Application security may include hardware, software, and procedures that identify or minimize security.
  • 7. Cloud Security  This includes keeping data private and safe across online-based infrastructure, applications, and platforms.  Most people use online systems such as Google Drive, Microsoft OneDrive, and Apple iCloud for storage. It is important for these platforms to remain secure at all times due to the massive amounts of data stored on them.  Cloud security can also include business services that are stored in a data center.
  • 8. Operational Security  Operational security (OPSEC) is a security and risk management process that prevents sensitive information from getting into the wrong hands.  Operations security protects and controls sensitive assets, contributing to an overall safe and secure organization.  Good operational security should not require complex, time consuming or expensive processes.
  • 9. Types of Cyber Security Threats: Phishing Attack  These attackts are mainly executed by sending a large number of emails to different users requesting them to click a fake link or provide sensitive information.  The best way to prevent phishing attacks is to monitor your emails closely by viewing the sender’s email address before clicking on anything.
  • 10. Password Attack  The most common type of security that every user employs is a password. We use them to login to our computers, phones, and music devices.  One common type of password attack is to use social engineering to hack into a user’s account. This could be sending a phishing email, monitoring social media accounts.  The best way to prevent a password attack is to maintain strong passwords and change them often. Your passwords should include special characters, numbers, and lower and upper case letters.  You should never have the same password for more than one account.
  • 11. Man-in-the-Middle Attack  It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them.  Due to this, an attacker will be able to read, insert and modify the data .
  • 12.  It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information.  Example- SQL Injection, code Injection, log Injection, XML Injection etc. Injection Attack Dictionary Attack  This type of attack stored the list of a commonly used password and validated them to get original password.
  • 13. Malware Attack  A malware attack is when cybercriminals create malicious software that’s installed on someone else’s device without their knowledge to gain access to personal information.  Malware attacks can occur on all sorts of devices and operating systems, including Microsoft Windows, macOS, Android, and iOS.  Different types of malware include viruses, spyware, ransomware, and Trojan horses.
  • 14. IT Act 2000: • The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic The main objective of this act is to carry lawful and trustworthy electronic, digital and online transactions and reduce cybercrimes. commerce. Originally Published: 9 May 2000 Introduced by: Pramod Mahajan; Minister of Communications and Information Technology Commenced: 17 October 2000
  • 15. The IT Act, 2000 has two schedules: •First Schedule – Deals with documents to which the Act shall not apply. •Second Schedule – Deals with electronic signature or electronic authentication method.
  • 16. Safety Tips for Cyber Crime:  Use strong password  Keep your software updated  Protect your Data  Talk to your children about the internet  Block spyware attacks  Secure your computer
  • 17. Advantage and Disadvantage of Cyber Security: Advantage:  Protects system against viruses, worms, spyware and other unwanted programs.  It twill protect your business.  Protects the computer from being hacked.  Minimizes computer freezing and crashes.  Gives privacy to users.
  • 18. Disadvantage:  Firewalls can be difficult to configure correctly.  Makes the system slower than before.  Could be costly for average user.  Need to keep updating the new software in order to keep security up to date.
  • 19. Conclusion: Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats of it are hard to deny, so it is crucial to learn how to defend from them and teach others how to do it .