SlideShare a Scribd company logo
1 of 12
Malware protection:
To analyze attack codes malware protection
program is established.
Internet gateway and firewalls:
It watch out all the network entrance. All the
malicious software trying to enter to secure
network are drained to block and detect the
malware activities web filtering, firewall
policies and content checking are used.
Secure configuration: Hardware devices,
operating system are designed with low
security
Patch management: In software program it is
the latest version to prevent infected software
programs.
User access control: Normal user’s privileges
are limited by providing access control policy.
Techniques
used in
Cyber
security
Malicious attacks:
This is used by cyber criminals to delete, modify and alter a secure
data which is known as malwares. E.g. of malwares are:
Spyware:
Overall computer control are taken down in which personal
information are collected without users knowledge.
Viruses:
Files or computer information are corrupted or modified. By a single
software program the virus enter to the system. From one computer
to the other the virus spread by attacking the files in the computer.
Password attacks:
On cracking user’s password the attacks are focused. By following
alphanumeric procedure the user must protect the password.
APPLICATIONS OF CYBER SECURITY PROJECT
CYBER SECURITY
Types of cyber Attack
• Cyber war: Cyber wars are carried out by nation for the
purpose of disturbing and hacking data’s of
neighbouring countries. Advanced persistent threats are
used for extracting the countries data.
• Cybercrime: Group of members or individuals are
attempt cyber crime with an attitude to extract money.
In place of credit & debit card hacking or the crack
online password cyber crime occurs.
• Cyber threats: For illegal activities criminals, spies and
terrorists use cyber based technology as to manipulate
the data, to deny the distributed services or attack a
systems security.
9 D’s Concepts in Cyber
Security
• Cyber security projects use 9D’s concept to avoid
DDoS attack problems. 9D’s are
• Deter attacks,
• Detect attacks,
• Drive up difficulty,
• Differentiate protections,
• Dig beneath the threat,
• Diffuse protection throughout the payload,
• Distract with decoys,
• Divert attackers to other targets,
• Depth of defence.
Pranavi verma-cyber-security-ppt

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 

What's hot (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt
PptPpt
Ppt
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Information security
Information securityInformation security
Information security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Similar to Pranavi verma-cyber-security-ppt

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxFari84
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet BankingChiheb Chebbi
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 

Similar to Pranavi verma-cyber-security-ppt (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
cyber security
cyber security cyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Computer security
Computer securityComputer security
Computer security
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 

More from PranaviVerma

Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economyPranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economyPranaviVerma
 
It(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi vermaIt(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi vermaPranaviVerma
 
It(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi vermaIt(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi vermaPranaviVerma
 
Pranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst pptPranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst pptPranaviVerma
 
Sst geo climate pranavi verma
Sst geo climate pranavi vermaSst geo climate pranavi verma
Sst geo climate pranavi vermaPranaviVerma
 
Enterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-vermaEnterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-vermaPranaviVerma
 
Ict basic-skills-pranavi-verma
Ict basic-skills-pranavi-vermaIct basic-skills-pranavi-verma
Ict basic-skills-pranavi-vermaPranaviVerma
 
Pranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skillsPranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skillsPranaviVerma
 
Pranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentationPranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentationPranaviVerma
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranaviVerma
 
Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)PranaviVerma
 
Pranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typingPranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typingPranaviVerma
 
Pranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheetPranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheetPranaviVerma
 
Pranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processingPranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processingPranaviVerma
 
Pranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranaviVerma
 
Matter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-vermaMatter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-vermaPranaviVerma
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranaviVerma
 
Food Security in India class 9 CBSE
Food Security in India class 9 CBSEFood Security in India class 9 CBSE
Food Security in India class 9 CBSEPranaviVerma
 
Ncc notes and important topics
Ncc notes and important topicsNcc notes and important topics
Ncc notes and important topicsPranaviVerma
 

More from PranaviVerma (20)

Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economyPranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
 
It(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi vermaIt(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi verma
 
It(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi vermaIt(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi verma
 
Pranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst pptPranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst ppt
 
Sst geo climate pranavi verma
Sst geo climate pranavi vermaSst geo climate pranavi verma
Sst geo climate pranavi verma
 
Enterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-vermaEnterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-verma
 
Ict basic-skills-pranavi-verma
Ict basic-skills-pranavi-vermaIct basic-skills-pranavi-verma
Ict basic-skills-pranavi-verma
 
Pranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skillsPranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skills
 
Pranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentationPranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentation
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
 
Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)
 
Pranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typingPranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typing
 
Pranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheetPranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheet
 
Pranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processingPranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processing
 
Pranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computer
 
Matter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-vermaMatter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-verma
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
 
Food Security in India class 9 CBSE
Food Security in India class 9 CBSEFood Security in India class 9 CBSE
Food Security in India class 9 CBSE
 
Ncc notes and important topics
Ncc notes and important topicsNcc notes and important topics
Ncc notes and important topics
 
Bond of love
Bond of loveBond of love
Bond of love
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Pranavi verma-cyber-security-ppt

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Malware protection: To analyze attack codes malware protection program is established. Internet gateway and firewalls: It watch out all the network entrance. All the malicious software trying to enter to secure network are drained to block and detect the malware activities web filtering, firewall policies and content checking are used. Secure configuration: Hardware devices, operating system are designed with low security Patch management: In software program it is the latest version to prevent infected software programs. User access control: Normal user’s privileges are limited by providing access control policy. Techniques used in Cyber security
  • 8. Malicious attacks: This is used by cyber criminals to delete, modify and alter a secure data which is known as malwares. E.g. of malwares are: Spyware: Overall computer control are taken down in which personal information are collected without users knowledge. Viruses: Files or computer information are corrupted or modified. By a single software program the virus enter to the system. From one computer to the other the virus spread by attacking the files in the computer. Password attacks: On cracking user’s password the attacks are focused. By following alphanumeric procedure the user must protect the password.
  • 9. APPLICATIONS OF CYBER SECURITY PROJECT CYBER SECURITY
  • 10. Types of cyber Attack • Cyber war: Cyber wars are carried out by nation for the purpose of disturbing and hacking data’s of neighbouring countries. Advanced persistent threats are used for extracting the countries data. • Cybercrime: Group of members or individuals are attempt cyber crime with an attitude to extract money. In place of credit & debit card hacking or the crack online password cyber crime occurs. • Cyber threats: For illegal activities criminals, spies and terrorists use cyber based technology as to manipulate the data, to deny the distributed services or attack a systems security.
  • 11. 9 D’s Concepts in Cyber Security • Cyber security projects use 9D’s concept to avoid DDoS attack problems. 9D’s are • Deter attacks, • Detect attacks, • Drive up difficulty, • Differentiate protections, • Dig beneath the threat, • Diffuse protection throughout the payload, • Distract with decoys, • Divert attackers to other targets, • Depth of defence.