1. K S R COLLEGE OF ENGINEERING
Presentation by:
Vishnu Priya T
Mohammed ashik s
Sasireka N
2. The term cyber security is used to refer to the
security offered through on-line service to protect
your online information . It is refer to
technologies and processes designed to protect
computers networks and data from
unauthorization access and attacks delivered via
internet by cyber criminals.
3. Data protection from unauthorised access, loss or deletion.
Preventing financial fraud and embezzlement.
Protection of intellectual property.
Prevention of cyber espionage.
Prevention of fraud through financial transactions like wire transfers etc.
Improves customer confidence.
4. Critical infrastructure security.
Application security.
Network security.
Cloud security.
Internet of Things (IoT) security.
6. A malware attack is a common cyberattack where malware (normally
malicious software) executes unauthorized actions on the victim's system.
The malicious software (a.k.a. virus) encompasses many specific types of
attacks such as ransomware, spyware, command and control, and more.
7. Phishing is when attackers attempt to
trick users into doing 'the wrong
thing', such as clicking a bad link that
will download malware, or direct them
to a dodgy website.
8. A password attack refers to any of the various methods used to
maliciously authenticate into password-protected accounts.
These attacks are typically facilitated through the use of software
that expedites cracking or guessing passwords
9. A man in the middle (MITM) attack is a
general term for when a perpetrator
positions himself in a conversation
between a user and an application—
either to eavesdrop or to impersonate one
of the parties, making it appear as if a
normal exchange of information is
underway.
10. SQL injection, also known as SQLI, is a
common attack vector that uses malicious
SQL code for backend database
manipulation to access information that
was not intended to be displayed. This
information may include any number of items,
including sensitive company data, user lists or
private customer details.
11. A Denial-of-Service (DoS) attack is an
attack meant to shut down a machine or
network, making it inaccessible to its
intended users. DoS attacks accomplish
this by flooding the target with traffic, or
sending it information that triggers a crash.
12.
13. Cyber security will defend us from critical cyber- attacks.
- It helps us to browse the safe website.
- Cyber security will defend us from hacks & virus.
- The application of cyber security used in our PC needs to update
every week.
- Internet security processes all the incoming & outgoing data on
our computer.
- It helps to reduce computer chilling & crashes.
- Gives us privacy.
14. - It was expensive; most of the users can’t afford this.
- A normal user can’t use this properly, requiring special expertise.
- Lack of knowledge is the main problem.
- It was not easy to use.
- It makes the system slower.
- It could take hours to days to fix a breach in security.