3. Introduction
The term cyber security is used to refer tothe
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasingalso.
4. What is the need
of Cyber Security
What is the
meaning of
the word
CYBER is the need
of Cyber Security
How to
implement and
maintain
Security of a
Cyber field
around us.
What are the
security
problems in
Cyber field
5. Meaning of the WordCYBER
It is a combining form relating to information
technology, the Internet, and virtualreality.
6. Need of cybersecurity
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system fromviruses.
13. How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
14. Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
15. To Stop Malware
Download an anti-malware
program thatalso
helps preventinfections.
Activate Network Threat
Protection,
Firewall, Antivirus.
16. Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threatsto
computers
17. How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
18. Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
21. Cyber Security Strategy –
• S
Ie
nc
du
r
iai
t
yPolicy, Legal Framework
– ITAct, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computercrimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
23. 65 MILLION
Linkedin Passwords
were pur at risk AND
30,000
Pa><word1 were cracked
One Cyber Theft
l'aclc.edtt',e ,nforma1 ion
of
24 MILLION
7appof:/Amazon c1.Hlomen
•
In
link me
198 MILLION
Android owners met'OO()' card(
AT RISK
1. MILLION
C
5a
r
dNumbers: were
STOLEN
by malicious link or app.
-
e H
1. MILLION Security Hole
discovered allow<
e
5
Harmony Passwords
were s-tolen in 2012
&
Hackers
to ln<ta11 1nallc.ioui ~oftwa~ on
Windows computers
1,656,227
computer Viru<E'i, worms &
Trojans
were found
VIRUS
27 MILLION
user acccunt compromhed
Hackers Obtained
users. pa,swords. credtt card number
24. Conclusion
I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
normal
helps to spread awareness among
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.