1. Power Point Presentation On
“Cyber Security”
Submitted By:- Rahul Kirtoniya
Department: CSE-7th
Sem
Subject: Cyber Security
Subject Code: PEC-CS702E
University Roll No: 11800121032
2. Content
Introduction
Categories of Cyber crime
Types of Cyber crime
Types of Security tools
Advantage of Cybersecurity
Safety tips to Cyber crime
References
3. Introduction
Cybersecurity is the practice of protecting computer
systems, networks, and data from cyber threats such as
malware, phishing, and hacking. It ensures confidentiality,
integrity, and availability of information while using tools
like firewalls, encryption, and employee training to
safeguard against attacks. Constant vigilance is crucial as
cyber threats continue to evolve.
4. The CIA TRIAD of information security
The CIA Triad of information
security: Confidentiality (protecting
data from unauthorized access),
Integrity (ensuring data accuracy and
consistency), and Availability
(ensuring data and systems are
accessible when needed).
5. Security & Privacy
Security: Protecting data and systems from
unauthorized access and cyber threats.
Privacy: Respecting individuals' rights by
safeguarding personal data from misuse or
disclosure. Both crucial for a secure and
trustworthy digital environment
6. Categories of Cyber Crime
Cyber Fraud
Hacking and Unauthorized Access
Malware
Cyber Espionage
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
Cyber Stalking and Harassment
Online Scams
Data Breaches
Cyber Extortion
Cyberbullying
Online Child Exploitation
7. Principles of Computer Security
Least Privilege
Defense in Depth
Patch Management
Authentication and Authorization
Secure Configuration
Encryption
Intrusion Detection and Prevention
Incident Response
Social Engineering Awareness
Physical Security
8. Types of Cyber Crime
Cyber Fraud
Hacking and Unauthorized Access
Malware (e.g., viruses, worms, ransomware)
Cyber Espionage
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
Phishing and Identity Theft
Online Scams and Fraud
Data Breaches and Information Theft
Cyber Extortion
Cyberbullying and Online Harassment
Social Engineering Attacks
Online Child Exploitation and Child Pornography
Intellectual Property Theft and Piracy
9. Types of Security Tools
Antivirus Software
Firewalls
Intrusion Detection Systems (IDS)
Encryption Tools
Virtual Private Network (VPN)
Multi-Factor Authentication (MFA)
Password Managers
Web Application Firewalls (WAF)
SSL/TLS Certificates
Network Scanners
Data Loss Prevention (DLP) Software
Security Information and Event Management (SIEM) Software
Penetration Testing Tools
Mobile Device Management (MDM) Software
10. Advantages of Cyber Security
Protects sensitive data
Mitigates cyber attacks
Ensures business continuity
Builds trust and reputation
Enables legal compliance
Prevents financial loss
Safeguards critical infrastructure
Enhances national security
Protects personal privacy
Prevents identity theft
Secures digital transactions
Combats cyberbullying
11. Safety Tips to Cyber Crime
• Use strong, unique passwords and enable MFA.
• Be cautious with emails and avoid clicking on suspicious links.
• Keep software and devices updated.
• Avoid using public Wi-Fi for sensitive transactions.
• Limit personal information shared on social media.
• Regularly back up important data.
• Be skeptical of online offers and deals that seem too good to be true.
• Stay informed about the latest cyber threats and best practices.
• Secure devices with passwords and security features.
• Install antivirus software and enable firewalls.