SlideShare a Scribd company logo
1 of 12
Cyber
Security
Action against cyber crime
What is cyber security?
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to
minimize the number of successful cyber security attacks.
 Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered via
the Internet by cyber criminals.
 Though, cyber security is important for network, data and
application security.
What is…?
 Communication security-protecting organization
communication media , technology , and content.
 Network security-is the protection of networking
components, connection and content.
 Information security-protection of information and its
critical elements , including the systems and hardware
that use , store or transmit that information.
What is cyber crime?
 The former descriptions were "computer crime",
"computer-related crime" or "crime by computer".
With the pervasion of digital technology, some
new terms like "high-technology" or "information-
age" crime were added to the definition. Also,
Internet brought other new terms, like
"cybercrime" and "net" crime.
History
 The first recorded cyber crime was recorded in the
year 1820.
 The first spam email took place in 1978 when it
was sent over the Arpanet.
 The first Virus was installed on an Apple
Computer in 1982.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Why should we care?
 It is a criminal activity committed on the internet.
 Cyber crime-Where computer is either a tool or
target or both.
How can we protect?
 Read Privacy policy carefully when you submit the
data through internet.
 Encryption: lots of website uses SSL (secure
socket layer)to encrypt a data.
 Disable remote connectivity.
Advantage of cyber security
 It will defend from hacks and virus.
 The application of cyber security used in our PC
needs update every week.
 The security developers will update their database
every week once. Hence the new virus also
deleted.
Safety tips … Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information unless
required
Conclusion
 The only system which is truly secure is one
which is switched off and unplugged.
 So , only way to be safe is Pay attention
and Act smart.
THANK YOU
 Reference
 Jhandad Berchond

More Related Content

What's hot

Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Information security
 Information security Information security
Information securityJin Castor
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information security
 Information security Information security
Information security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 

Viewers also liked

Launching New Ventures in Virtual Worlds Oct07
Launching New Ventures in Virtual Worlds  Oct07Launching New Ventures in Virtual Worlds  Oct07
Launching New Ventures in Virtual Worlds Oct07Jonathon Richter
 
Evaluation Of A De Technology
Evaluation Of A De TechnologyEvaluation Of A De Technology
Evaluation Of A De Technologyalebdaa
 
Trajo De Sociales
Trajo De SocialesTrajo De Sociales
Trajo De Socialespipe
 
Filhos SãO Como Navios
Filhos SãO Como NaviosFilhos SãO Como Navios
Filhos SãO Como NaviosJNR
 
Programmi Scuba Wellness
Programmi Scuba WellnessProgrammi Scuba Wellness
Programmi Scuba Wellnessscubawellness
 
156 blagues
156 blagues156 blagues
156 blagueslyago
 
Manuel msproject
Manuel msprojectManuel msproject
Manuel msprojectAbde Abde
 
Panel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the cameraPanel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the cameraJohn Blue
 
Competitors analysis and geographical mapping
Competitors analysis and geographical mappingCompetitors analysis and geographical mapping
Competitors analysis and geographical mappingAbhishek Singh
 
Aircraft structural screws
Aircraft structural screwsAircraft structural screws
Aircraft structural screwsjohnschwaner
 
A computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal educationA computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal educationPetric Marina
 
Instel Cultura Ciudadana
Instel Cultura CiudadanaInstel Cultura Ciudadana
Instel Cultura Ciudadanaguest799b95
 
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوستبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوسAbdullrahman Tayshoori
 
Connecticut mesuring and modeling growth
Connecticut   mesuring and modeling growthConnecticut   mesuring and modeling growth
Connecticut mesuring and modeling growthJohn Cronin
 
Redlands City Council Feedback
Redlands City Council FeedbackRedlands City Council Feedback
Redlands City Council FeedbackPlacefocus
 
Unidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperioUnidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperioOMARSAMPERIO
 

Viewers also liked (20)

Launching New Ventures in Virtual Worlds Oct07
Launching New Ventures in Virtual Worlds  Oct07Launching New Ventures in Virtual Worlds  Oct07
Launching New Ventures in Virtual Worlds Oct07
 
Reaction Paper
Reaction PaperReaction Paper
Reaction Paper
 
Evaluation Of A De Technology
Evaluation Of A De TechnologyEvaluation Of A De Technology
Evaluation Of A De Technology
 
Trajo De Sociales
Trajo De SocialesTrajo De Sociales
Trajo De Sociales
 
Filhos SãO Como Navios
Filhos SãO Como NaviosFilhos SãO Como Navios
Filhos SãO Como Navios
 
2014.2 heros,warriors complete
2014.2 heros,warriors complete2014.2 heros,warriors complete
2014.2 heros,warriors complete
 
Programmi Scuba Wellness
Programmi Scuba WellnessProgrammi Scuba Wellness
Programmi Scuba Wellness
 
10 04 19 At Large Regional Meeting
10 04 19 At Large Regional Meeting10 04 19 At Large Regional Meeting
10 04 19 At Large Regional Meeting
 
156 blagues
156 blagues156 blagues
156 blagues
 
Manuel msproject
Manuel msprojectManuel msproject
Manuel msproject
 
Panel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the cameraPanel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the camera
 
Competitors analysis and geographical mapping
Competitors analysis and geographical mappingCompetitors analysis and geographical mapping
Competitors analysis and geographical mapping
 
Aircraft structural screws
Aircraft structural screwsAircraft structural screws
Aircraft structural screws
 
A computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal educationA computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal education
 
Instel Cultura Ciudadana
Instel Cultura CiudadanaInstel Cultura Ciudadana
Instel Cultura Ciudadana
 
Case Study Barrow V[1]
Case  Study  Barrow V[1]Case  Study  Barrow V[1]
Case Study Barrow V[1]
 
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوستبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
 
Connecticut mesuring and modeling growth
Connecticut   mesuring and modeling growthConnecticut   mesuring and modeling growth
Connecticut mesuring and modeling growth
 
Redlands City Council Feedback
Redlands City Council FeedbackRedlands City Council Feedback
Redlands City Council Feedback
 
Unidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperioUnidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperio
 

Similar to Mian

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )TechnoHacks_Infosystem
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptxkeerthivemireddy
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
 

Similar to Mian (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cyber security
cyber securitycyber security
cyber security
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security (1).pptx
Cyber security (1).pptxCyber security (1).pptx
Cyber security (1).pptx
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 

More from Dom Mike

Mm10lifecycle
Mm10lifecycleMm10lifecycle
Mm10lifecycleDom Mike
 
Lecture ethics
Lecture ethicsLecture ethics
Lecture ethicsDom Mike
 
Lecture 1 prof practices
Lecture 1 prof practicesLecture 1 prof practices
Lecture 1 prof practicesDom Mike
 
Lec51 52 pre and post production
Lec51 52 pre and post productionLec51 52 pre and post production
Lec51 52 pre and post productionDom Mike
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights managementDom Mike
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencingDom Mike
 
Lec28 29 30 animation
Lec28 29 30 animationLec28 29 30 animation
Lec28 29 30 animationDom Mike
 
Lec14 15 16 text
Lec14 15 16 textLec14 15 16 text
Lec14 15 16 textDom Mike
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesDom Mike
 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compressionDom Mike
 
Lec5 interactive multimedia tools
Lec5 interactive multimedia toolsLec5 interactive multimedia tools
Lec5 interactive multimedia toolsDom Mike
 
Lec3 4 mm applications and use
Lec3 4 mm applications and useLec3 4 mm applications and use
Lec3 4 mm applications and useDom Mike
 
Lec1 2 introduction
Lec1 2 introductionLec1 2 introduction
Lec1 2 introductionDom Mike
 
Introduction
IntroductionIntroduction
IntroductionDom Mike
 
Assessing technology landscape
Assessing technology landscapeAssessing technology landscape
Assessing technology landscapeDom Mike
 
Lecture 2 19-2
Lecture 2 19-2Lecture 2 19-2
Lecture 2 19-2Dom Mike
 

More from Dom Mike (20)

Mm10lifecycle
Mm10lifecycleMm10lifecycle
Mm10lifecycle
 
Lecture ethics
Lecture ethicsLecture ethics
Lecture ethics
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1 prof practices
Lecture 1 prof practicesLecture 1 prof practices
Lecture 1 prof practices
 
Lec51 52 pre and post production
Lec51 52 pre and post productionLec51 52 pre and post production
Lec51 52 pre and post production
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights management
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencing
 
Lec28 29 30 animation
Lec28 29 30 animationLec28 29 30 animation
Lec28 29 30 animation
 
Lec14 15 16 text
Lec14 15 16 textLec14 15 16 text
Lec14 15 16 text
 
Lec11
Lec11Lec11
Lec11
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
 
Lec5 interactive multimedia tools
Lec5 interactive multimedia toolsLec5 interactive multimedia tools
Lec5 interactive multimedia tools
 
Lec3 4 mm applications and use
Lec3 4 mm applications and useLec3 4 mm applications and use
Lec3 4 mm applications and use
 
Lec1 2 introduction
Lec1 2 introductionLec1 2 introduction
Lec1 2 introduction
 
Introduction
IntroductionIntroduction
Introduction
 
Ch7
Ch7Ch7
Ch7
 
Ch6
Ch6Ch6
Ch6
 
Assessing technology landscape
Assessing technology landscapeAssessing technology landscape
Assessing technology landscape
 
Lecture 2 19-2
Lecture 2 19-2Lecture 2 19-2
Lecture 2 19-2
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Mian

  • 2. What is cyber security?  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 3. What is…?  Communication security-protecting organization communication media , technology , and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
  • 4. What is cyber crime?  The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information- age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.
  • 5. History  The first recorded cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.
  • 6. Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 7. Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.
  • 8. How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 9. Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 10. Safety tips … Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 11. Conclusion  The only system which is truly secure is one which is switched off and unplugged.  So , only way to be safe is Pay attention and Act smart.
  • 12. THANK YOU  Reference  Jhandad Berchond