SlideShare a Scribd company logo
1 of 15
Download to read offline
Cyber
Security
Presented by: Careerera
Table of contents
Introduction
History
Conclusion
Career in Cyber Security
Elements of Cyber Security
Disadvantages
Advantages
Tips For Protection
Cyber Attack in India
Types of Cyber Attack
01
02
06
07
08
09
10
03
04
05
Introduction
The term cyber security refers to the security provided by online
services to protect your online information. With an increasing
number of people connecting to the Internet, so do the security
threats that cause massive harm.
History
● The first recorded cyber crime was recorded
in the year 1820.
● The first spam email took place in 1978 when
it was sent over the Arpanet.
● The first Virus was installed on an Apple
Computer in 1982.
● Birth of commercial antivirus in the 1980s
Elements of Cyber Security
● Application security
● Information Security
● Network Security
● Disaster Recovery Planning
● Operational Security
● End User Education
Types of Cyber Attack
Web based attacks
System based attacks
:- Cyber-attacks can be classified into the following categories
Web based attacks
● Injection Attack
● DNS Spoofing
● Session Hijacking
● Phishing
● Brute force
● Denial of Service
● Dictionary attacks
● URL Interpretation
● File Inclusive attacks
● Virus
● Worm
● Trojan horse
System based attacks
● Backdoor
● Bots
Major Cyber Attacks in India
● UIDAI Aadhaar Software Hacked
● Canara Bank ATM System Hacked
● SIM swap scam
● COVID-19 test results of Indian
patients leaked online
● Phishing attack on Wipro
● Exposed healthcare data
Advantages of
Cyber security
● Data safety from
hackers
● Reduces computer
crash
● Decreased data theft
hazard
● System availability and
improved data
● Protect business
reputation
● Detection and deletion
of unwanted and
harmful programs
● Recovery of the
system
Disadvantages of
Cyber security
● Require of constant
monitoring
● Very Costly
● Slow down the
system
● Very risky to
implement
● Incorrect configured
system blocks
firewall
● Not a one time
process
● Security patches
may backfire
Tips
● Use Strong Password
● Set up Two-factor or Multi-factor
Authentication
● Keep your software and systems fully up to date
● Install a Firewall and Antivirus
● Backup your data
● Avoid Unfamiliar Websites
● Don’t Use Public WiFi without a VPN
● Secure Your Data
Career in Cyber Security
Job Profile Avg. Salary(INR)
Chief Information Security Officer 22,10,8565
Ethical Hacker 5,80,200
Security Architect 21,46,150
Cyber Security Engineer 7,43,000
Penetration Tester 6,77,528
Computer Forensics Analyst 7,20,000
Conclusion
I hope that my presentation will assist you in improving
their knowledge of cyber security and overcoming
several security flaws in their computer operation. It also
facilitates in raising public awareness of emerging
security threats.
We live in the digital era, and digital technology has
transformed our lives, affirming the importance of cyber
security. • Because of our reliance on technology, cyber
attacks have begun to affect the majority of systems
today. It is essential that you know what cyber attacks
are and how they affect the system.
Thank You
Visit:- https://www.careerera.com
Email :- info@careerera.com
We are also available on:-

More Related Content

Similar to Cyber Security Careerera

Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
tswong
 

Similar to Cyber Security Careerera (20)

CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Securing the Internet from Cyber Criminals
Securing the Internet from Cyber CriminalsSecuring the Internet from Cyber Criminals
Securing the Internet from Cyber Criminals
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 

Cyber Security Careerera

  • 2. Table of contents Introduction History Conclusion Career in Cyber Security Elements of Cyber Security Disadvantages Advantages Tips For Protection Cyber Attack in India Types of Cyber Attack 01 02 06 07 08 09 10 03 04 05
  • 3. Introduction The term cyber security refers to the security provided by online services to protect your online information. With an increasing number of people connecting to the Internet, so do the security threats that cause massive harm.
  • 4. History ● The first recorded cyber crime was recorded in the year 1820. ● The first spam email took place in 1978 when it was sent over the Arpanet. ● The first Virus was installed on an Apple Computer in 1982. ● Birth of commercial antivirus in the 1980s
  • 5. Elements of Cyber Security ● Application security ● Information Security ● Network Security ● Disaster Recovery Planning ● Operational Security ● End User Education
  • 6. Types of Cyber Attack Web based attacks System based attacks :- Cyber-attacks can be classified into the following categories
  • 7. Web based attacks ● Injection Attack ● DNS Spoofing ● Session Hijacking ● Phishing ● Brute force ● Denial of Service ● Dictionary attacks ● URL Interpretation ● File Inclusive attacks
  • 8. ● Virus ● Worm ● Trojan horse System based attacks ● Backdoor ● Bots
  • 9. Major Cyber Attacks in India ● UIDAI Aadhaar Software Hacked ● Canara Bank ATM System Hacked ● SIM swap scam ● COVID-19 test results of Indian patients leaked online ● Phishing attack on Wipro ● Exposed healthcare data
  • 10. Advantages of Cyber security ● Data safety from hackers ● Reduces computer crash ● Decreased data theft hazard ● System availability and improved data ● Protect business reputation ● Detection and deletion of unwanted and harmful programs ● Recovery of the system
  • 11. Disadvantages of Cyber security ● Require of constant monitoring ● Very Costly ● Slow down the system ● Very risky to implement ● Incorrect configured system blocks firewall ● Not a one time process ● Security patches may backfire
  • 12. Tips ● Use Strong Password ● Set up Two-factor or Multi-factor Authentication ● Keep your software and systems fully up to date ● Install a Firewall and Antivirus ● Backup your data ● Avoid Unfamiliar Websites ● Don’t Use Public WiFi without a VPN ● Secure Your Data
  • 13. Career in Cyber Security Job Profile Avg. Salary(INR) Chief Information Security Officer 22,10,8565 Ethical Hacker 5,80,200 Security Architect 21,46,150 Cyber Security Engineer 7,43,000 Penetration Tester 6,77,528 Computer Forensics Analyst 7,20,000
  • 14. Conclusion I hope that my presentation will assist you in improving their knowledge of cyber security and overcoming several security flaws in their computer operation. It also facilitates in raising public awareness of emerging security threats. We live in the digital era, and digital technology has transformed our lives, affirming the importance of cyber security. • Because of our reliance on technology, cyber attacks have begun to affect the majority of systems today. It is essential that you know what cyber attacks are and how they affect the system.
  • 15. Thank You Visit:- https://www.careerera.com Email :- info@careerera.com We are also available on:-