Cyber security is the body of technologies , processes and practices designed to protect networks , computers , programs and data from attack , damage or unauthorized access . In a computing context , security includes both cyber security and physical security .
2. Introduction :
The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
1
4. Needof cyber security:
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
3
6. Viruses & worms:
A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
5
7. solution:
Install a security suite that protects the
computer against threats such as viruses and
worms.
6
8. Malware:
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
7
9. Hackers:
In common a hacker is a person who
breaks into computers, usually by gaining
access to administrative controls.
8
10. DEFINING CYBER CRIME:
Crime committed using a computer and the
internet to steal data or information.
Illegal imports.
Malicious programs.
9
11. Types of Hackers:
White Hat
Hacker
Grey Hat Hacker
Black Hat Hacker
10
13. How To prevent hacking:
It may be impossible to prevent computer hacking,
however effective security controls including
strong passwords, and the use of firewalls can
helps.
12
14. Trojan Horses :
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats
to computers
13
15. PasswordCracking:
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to
different protected electronic areas and social
network sites.
14
16. Securing Password:
Use always Strong password.
Never use same password for two different sites.
15
17. CYBERATTACK:
A malicious attempt, using digital
technologies, to cause personal or property
loss or damage, and/or steal or alter
confidential personal or organisational
data.
16
18. Scope of cyber security:
Techniques of threat and attack analysis
and mitigation
Protection and recovery technologies,
processes and procedures for individuals,
business and government
Policies, laws and regulation relevant to
the use of computers and the Internet
17
19. Securing Password:
Use always Strong password.
Never use same password for two different sites.
18