SlideShare a Scribd company logo
1 of 32
Welcome to our presentation
cyber security
SUBMITTED BY:
Roksana Akter
I’d:151-15-4864
Mst Tanha Tasnim
I’d:151-15-5420
Hadiea Rashid
I'd:151-15-5298
Renu Akther
I'd:151-15-5096
SUBMITTED to:
Mohammad Jahangir
LECTURER AT
DEPARTMENT OF CSE
DAFFODIL
INTERNATIONAL
UNIVERSITY
Roksana Akter
I’d:151-15-4864
WHAT IS CYBER SECURITY??
The security offered
through on-line services to
protect your online
information is Called Cyber
Security.
MEANING OF THE WORD CYBER
It is a combining form
relating to information
technology, the Internet,
and virtual reality.
NEED OF CYBER SECURITY
 Cyber security is necessary
since it helps in securing
data from threats such as
data theft or misuse, also
safeguards your system
from viruses.
MAJOR SECURITY PROBLEMS
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Mst Tanha Tasnim
I’d:151-15-5420
Viruses
Solution
Install a security suite that protects the
computer against threats such as viruses and
worms
Hackers
In common a hacker is a person who
breaks into computers, usually by
gaining access to administrative
controls
Types of Hackers
How To prevent hacking
Hadiea Rashid
I'd:151-15-5298
Malware
Where malware comes from?
How to recognize malware?
How to remove malware?
Trojan Virus
How Trojans can impact you
 Backdoor
 Exploit
 Rootkit
 rojan-Banker
 Trojan-Downloader
 Trojan-Dropper
 Trojan-SMS
 Trojan-Spy
How to protect against Trojan
By installing effective anti-malware software,
you can defend your devices.A rigorous anti-
malware solution – such as Kaspersky Anti-
Virus – will detect and prevent Trojan attacks
on your devices. Kaspersky Lab has anti-
malware products that defend the following
devices against Trojans
 Windows PCs
 Linux computers
 Apple Macs
 Smart phones
Password Cracking & Securing Password
In computersecurity, password cracking is
the process of
recovering passwords from data that have
been stored in or transmitted by a computer
system. A common approach is to try guesses
repeatedly for the password and check them
against an available cryptographic hash of the
password.
Software:
There are many password cracking software tools,
but the most popular are Aircrack, Cain and
Abel, John the Ripper, Hashcat,Hydra and so on.
Securing Password from cracking by following this
method “Easy to remember, hard to guess”
Renu akther
I'd:151-15-5096
Big cyber attacks on
2016
Why should we care ?
It is a criminal activity committed on the
internet .
Cyber crime – where computer is either a
tool or target or both.
Advantage of cyber
security It will defend from hacks and virus.
 The application of cyber security used in our
PC needs update every week.
 The security developers will update their
database every week once. Hence the new
virus also deleted.
Our responsibility
Conclusion
The only system which is truly
secure is one which is switched
off and unplugged. So , only way
to be safe is Pay attention and
Act smart
CYBER SECURITY

More Related Content

What's hot

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Similar to CYBER SECURITY

Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 

Similar to CYBER SECURITY (20)

Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 

More from Mohammad Shakirul islam

Relationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertensionRelationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertensionMohammad Shakirul islam
 
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...Mohammad Shakirul islam
 
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNNBayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNNMohammad Shakirul islam
 
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsShot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsMohammad Shakirul islam
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...Mohammad Shakirul islam
 
Useful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental DegradationUseful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental Degradation Mohammad Shakirul islam
 

More from Mohammad Shakirul islam (20)

Relationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertensionRelationship between serum uric acid and hypertension
Relationship between serum uric acid and hypertension
 
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
 
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNNBayanno-Net: Bangla Handwritten Digit Recognition using CNN
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
 
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsShot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
 
Start With Why
Start With WhyStart With Why
Start With Why
 
Gsensor car
Gsensor carGsensor car
Gsensor car
 
All about Uganda
All about Uganda All about Uganda
All about Uganda
 
MEMORY AND STROGE
MEMORY AND STROGEMEMORY AND STROGE
MEMORY AND STROGE
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Applications of numerical methods
Applications of numerical methodsApplications of numerical methods
Applications of numerical methods
 
Multistage transistor
Multistage transistorMultistage transistor
Multistage transistor
 
Fourier series
Fourier seriesFourier series
Fourier series
 
Laser security system
Laser security systemLaser security system
Laser security system
 
Useful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental DegradationUseful Knowledge Of Ecosystem & Environmental Degradation
Useful Knowledge Of Ecosystem & Environmental Degradation
 
Student information-result-system
Student information-result-systemStudent information-result-system
Student information-result-system
 
Presentation on Programming Languages.
Presentation on Programming Languages.Presentation on Programming Languages.
Presentation on Programming Languages.
 
INTERFERNCE & DIFFRACTION
INTERFERNCE & DIFFRACTIONINTERFERNCE & DIFFRACTION
INTERFERNCE & DIFFRACTION
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

CYBER SECURITY

  • 1. Welcome to our presentation
  • 2. cyber security SUBMITTED BY: Roksana Akter I’d:151-15-4864 Mst Tanha Tasnim I’d:151-15-5420 Hadiea Rashid I'd:151-15-5298 Renu Akther I'd:151-15-5096 SUBMITTED to: Mohammad Jahangir LECTURER AT DEPARTMENT OF CSE DAFFODIL INTERNATIONAL UNIVERSITY
  • 4. WHAT IS CYBER SECURITY?? The security offered through on-line services to protect your online information is Called Cyber Security.
  • 5. MEANING OF THE WORD CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. NEED OF CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. MAJOR SECURITY PROBLEMS  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 10. Solution Install a security suite that protects the computer against threats such as viruses and worms
  • 11.
  • 12. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls
  • 14. How To prevent hacking
  • 17. Where malware comes from? How to recognize malware? How to remove malware?
  • 19. How Trojans can impact you  Backdoor  Exploit  Rootkit  rojan-Banker  Trojan-Downloader  Trojan-Dropper  Trojan-SMS  Trojan-Spy
  • 20. How to protect against Trojan By installing effective anti-malware software, you can defend your devices.A rigorous anti- malware solution – such as Kaspersky Anti- Virus – will detect and prevent Trojan attacks on your devices. Kaspersky Lab has anti- malware products that defend the following devices against Trojans
  • 21.  Windows PCs  Linux computers  Apple Macs  Smart phones
  • 22. Password Cracking & Securing Password In computersecurity, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.
  • 23.
  • 24. Software: There are many password cracking software tools, but the most popular are Aircrack, Cain and Abel, John the Ripper, Hashcat,Hydra and so on. Securing Password from cracking by following this method “Easy to remember, hard to guess”
  • 26. Big cyber attacks on 2016
  • 27.
  • 28. Why should we care ? It is a criminal activity committed on the internet . Cyber crime – where computer is either a tool or target or both.
  • 29. Advantage of cyber security It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 31. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart