SlideShare a Scribd company logo
1 of 12
Power Point Presentation On
“Cyber Security”
Submitted By:- Rahul Kirtoniya
Department: CSE-7th
Sem
Subject: Cyber Security
Subject Code: PEC-CS702E
University Roll No: 11800121032
Content
 Introduction
 Categories of Cyber crime
 Types of Cyber crime
 Types of Security tools
 Advantage of Cybersecurity
 Safety tips to Cyber crime
 References
Introduction
Cybersecurity is the practice of protecting computer
systems, networks, and data from cyber threats such as
malware, phishing, and hacking. It ensures confidentiality,
integrity, and availability of information while using tools
like firewalls, encryption, and employee training to
safeguard against attacks. Constant vigilance is crucial as
cyber threats continue to evolve.
The CIA TRIAD of information security
The CIA Triad of information
security: Confidentiality (protecting
data from unauthorized access),
Integrity (ensuring data accuracy and
consistency), and Availability
(ensuring data and systems are
accessible when needed).
Security & Privacy
Security: Protecting data and systems from
unauthorized access and cyber threats.
Privacy: Respecting individuals' rights by
safeguarding personal data from misuse or
disclosure. Both crucial for a secure and
trustworthy digital environment
Categories of Cyber Crime
 Cyber Fraud
 Hacking and Unauthorized Access
 Malware
 Cyber Espionage
 Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
 Cyber Stalking and Harassment
 Online Scams
 Data Breaches
 Cyber Extortion
 Cyberbullying
 Online Child Exploitation
Principles of Computer Security
 Least Privilege
 Defense in Depth
 Patch Management
 Authentication and Authorization
 Secure Configuration
 Encryption
 Intrusion Detection and Prevention
 Incident Response
 Social Engineering Awareness
 Physical Security
Types of Cyber Crime
 Cyber Fraud
 Hacking and Unauthorized Access
 Malware (e.g., viruses, worms, ransomware)
 Cyber Espionage
 Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
 Phishing and Identity Theft
 Online Scams and Fraud
 Data Breaches and Information Theft
 Cyber Extortion
 Cyberbullying and Online Harassment
 Social Engineering Attacks
 Online Child Exploitation and Child Pornography
 Intellectual Property Theft and Piracy
Types of Security Tools
 Antivirus Software
 Firewalls
 Intrusion Detection Systems (IDS)
 Encryption Tools
 Virtual Private Network (VPN)
 Multi-Factor Authentication (MFA)
 Password Managers
 Web Application Firewalls (WAF)
 SSL/TLS Certificates
 Network Scanners
 Data Loss Prevention (DLP) Software
 Security Information and Event Management (SIEM) Software
 Penetration Testing Tools
 Mobile Device Management (MDM) Software
Advantages of Cyber Security
 Protects sensitive data
 Mitigates cyber attacks
 Ensures business continuity
 Builds trust and reputation
 Enables legal compliance
 Prevents financial loss
 Safeguards critical infrastructure
 Enhances national security
 Protects personal privacy
 Prevents identity theft
 Secures digital transactions
 Combats cyberbullying
Safety Tips to Cyber Crime
• Use strong, unique passwords and enable MFA.
• Be cautious with emails and avoid clicking on suspicious links.
• Keep software and devices updated.
• Avoid using public Wi-Fi for sensitive transactions.
• Limit personal information shared on social media.
• Regularly back up important data.
• Be skeptical of online offers and deals that seem too good to be true.
• Stay informed about the latest cyber threats and best practices.
• Secure devices with passwords and security features.
• Install antivirus software and enable firewalls.
References
www.wikipedia.org
www.avtest.org
www.billmullins.com
www.digit/forum.com
www.antivirusnews.com
- Thank You -

More Related Content

Similar to Cyber Security

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT securityarjunnegi34
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slideMd. Ismiel Hossen Abir
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdfchanduvarma019
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 

Similar to Cyber Security (20)

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slide
 
Security in it
Security in it Security in it
Security in it
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdf
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Cyber Security

  • 1. Power Point Presentation On “Cyber Security” Submitted By:- Rahul Kirtoniya Department: CSE-7th Sem Subject: Cyber Security Subject Code: PEC-CS702E University Roll No: 11800121032
  • 2. Content  Introduction  Categories of Cyber crime  Types of Cyber crime  Types of Security tools  Advantage of Cybersecurity  Safety tips to Cyber crime  References
  • 3. Introduction Cybersecurity is the practice of protecting computer systems, networks, and data from cyber threats such as malware, phishing, and hacking. It ensures confidentiality, integrity, and availability of information while using tools like firewalls, encryption, and employee training to safeguard against attacks. Constant vigilance is crucial as cyber threats continue to evolve.
  • 4. The CIA TRIAD of information security The CIA Triad of information security: Confidentiality (protecting data from unauthorized access), Integrity (ensuring data accuracy and consistency), and Availability (ensuring data and systems are accessible when needed).
  • 5. Security & Privacy Security: Protecting data and systems from unauthorized access and cyber threats. Privacy: Respecting individuals' rights by safeguarding personal data from misuse or disclosure. Both crucial for a secure and trustworthy digital environment
  • 6. Categories of Cyber Crime  Cyber Fraud  Hacking and Unauthorized Access  Malware  Cyber Espionage  Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks  Cyber Stalking and Harassment  Online Scams  Data Breaches  Cyber Extortion  Cyberbullying  Online Child Exploitation
  • 7. Principles of Computer Security  Least Privilege  Defense in Depth  Patch Management  Authentication and Authorization  Secure Configuration  Encryption  Intrusion Detection and Prevention  Incident Response  Social Engineering Awareness  Physical Security
  • 8. Types of Cyber Crime  Cyber Fraud  Hacking and Unauthorized Access  Malware (e.g., viruses, worms, ransomware)  Cyber Espionage  Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks  Phishing and Identity Theft  Online Scams and Fraud  Data Breaches and Information Theft  Cyber Extortion  Cyberbullying and Online Harassment  Social Engineering Attacks  Online Child Exploitation and Child Pornography  Intellectual Property Theft and Piracy
  • 9. Types of Security Tools  Antivirus Software  Firewalls  Intrusion Detection Systems (IDS)  Encryption Tools  Virtual Private Network (VPN)  Multi-Factor Authentication (MFA)  Password Managers  Web Application Firewalls (WAF)  SSL/TLS Certificates  Network Scanners  Data Loss Prevention (DLP) Software  Security Information and Event Management (SIEM) Software  Penetration Testing Tools  Mobile Device Management (MDM) Software
  • 10. Advantages of Cyber Security  Protects sensitive data  Mitigates cyber attacks  Ensures business continuity  Builds trust and reputation  Enables legal compliance  Prevents financial loss  Safeguards critical infrastructure  Enhances national security  Protects personal privacy  Prevents identity theft  Secures digital transactions  Combats cyberbullying
  • 11. Safety Tips to Cyber Crime • Use strong, unique passwords and enable MFA. • Be cautious with emails and avoid clicking on suspicious links. • Keep software and devices updated. • Avoid using public Wi-Fi for sensitive transactions. • Limit personal information shared on social media. • Regularly back up important data. • Be skeptical of online offers and deals that seem too good to be true. • Stay informed about the latest cyber threats and best practices. • Secure devices with passwords and security features. • Install antivirus software and enable firewalls.