SlideShare a Scribd company logo
1 of 9
CYBER
SECURITY
A presentation by VIPIN BOPANWAR
CONTENTS
● Introduction
● Cyber Security
● Categories of cyber crime
● Merits and Demerits of cyber security
● Types of cyber crime
● Conclusion
INTRODUCTION
In this world of 8 Billion peoples, security has been our first
priority and our daily need for surfing a safe internet. In this
busy world, threats and cyber attacks are increasing day by
day at a light speed. So to protect the system, some Cyber
Security steps have been taken. This helps protect our
system from malware practices and online threats. One
should surf the internet and need an environment to be
safe.
● Cyber-Security refers to the act of protecting and ensuring the
safety of computer systems and electronic devices from targeted
cyber-attacks, opportunist malware (- viruses, trojans and bugs)
or accidental introduction of malware by users.
CYBER SECURITY
● These cyber attacks are usually aimed at
accessing, changing, or destroying
sensitive information; extorting money
from users; or interrupting normal
business processes.
We can categorize the cyber crime in two different ways -
● THE COMPUTER AS A TARGET - using a computer to attack
other computers eg. Hacking, Virus/Worms attacks, DoS attack;
etc.
● THE COMPUTER AS A WEAPON - Using a computer to
commit real world crime eg. Credit Card fraud; etc.
CATEGORIES OF CYBER CRIME
MERITS AND DEMERITS OF
CYBER SECURITY
MERITS DEMERITS
● Cyber security will defend us from
critical cyber- attacks.
● It helps us to browse safe websites.
● It will defend us from hacks & viruses.
● The application of cyber security used
in our PC needs to update every week.
● Internet security processes all the
incoming & outgoing data on our
computers.
● Gives us privacy.
● It is expensive; most of the users can’t
afford this.
● A normal user can’t use this properly,
requiring special expertise.
● Lack of knowledge is the main
problem.
● It was not easy to use.
● It makes the system slower.
● It could take hours to days to fix a
breach in security.
TYPES OF CYBER CRIME
PHISHING SPAM EMAIL SPYWARE / ADWARE
Phishing is a fraudulent
attempt, usually made
through email, to steal your
personal information.
A common online phishing
scam starts with an email
message that appears to
come from a trusted source
(legitimate site) but
actually directs recipients
to provide information to a
fraudulent website.
Email Scam is the
electronic version of junk
mail.
It involves sending
unwanted messages, often
unsolicited advertising, to a
large number of recipients.
Spam is a serious security
concern as it can be used to
deliver Trojan horses,
Viruses, worms; etc.
Spyware is a type of
malware that hackers use
to spy on you in order to
gain access to your
personal information,
banking details; etc.
Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that could
potentially be dangerous
for your device.
CONCLUSION
Today due to high internet penetration, Cyber security is
one of the biggest need of the world as cyber security
threats are very dangerous to the country’s security. Not
only the government but also the citizens should spread
awareness among the people to always update your
system and network security settings and to the use
proper anti-virus so that the use proper antivirus so that
your system and network security settings stay virus
and malware-free.
THANK YOU
EVERYONE !

More Related Content

Similar to #CYBER SECURITY.pptx

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 

Similar to #CYBER SECURITY.pptx (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
cyber security
cyber security cyber security
cyber security
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

#CYBER SECURITY.pptx

  • 2. CONTENTS ● Introduction ● Cyber Security ● Categories of cyber crime ● Merits and Demerits of cyber security ● Types of cyber crime ● Conclusion
  • 3. INTRODUCTION In this world of 8 Billion peoples, security has been our first priority and our daily need for surfing a safe internet. In this busy world, threats and cyber attacks are increasing day by day at a light speed. So to protect the system, some Cyber Security steps have been taken. This helps protect our system from malware practices and online threats. One should surf the internet and need an environment to be safe.
  • 4. ● Cyber-Security refers to the act of protecting and ensuring the safety of computer systems and electronic devices from targeted cyber-attacks, opportunist malware (- viruses, trojans and bugs) or accidental introduction of malware by users. CYBER SECURITY ● These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
  • 5. We can categorize the cyber crime in two different ways - ● THE COMPUTER AS A TARGET - using a computer to attack other computers eg. Hacking, Virus/Worms attacks, DoS attack; etc. ● THE COMPUTER AS A WEAPON - Using a computer to commit real world crime eg. Credit Card fraud; etc. CATEGORIES OF CYBER CRIME
  • 6. MERITS AND DEMERITS OF CYBER SECURITY MERITS DEMERITS ● Cyber security will defend us from critical cyber- attacks. ● It helps us to browse safe websites. ● It will defend us from hacks & viruses. ● The application of cyber security used in our PC needs to update every week. ● Internet security processes all the incoming & outgoing data on our computers. ● Gives us privacy. ● It is expensive; most of the users can’t afford this. ● A normal user can’t use this properly, requiring special expertise. ● Lack of knowledge is the main problem. ● It was not easy to use. ● It makes the system slower. ● It could take hours to days to fix a breach in security.
  • 7. TYPES OF CYBER CRIME PHISHING SPAM EMAIL SPYWARE / ADWARE Phishing is a fraudulent attempt, usually made through email, to steal your personal information. A common online phishing scam starts with an email message that appears to come from a trusted source (legitimate site) but actually directs recipients to provide information to a fraudulent website. Email Scam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern as it can be used to deliver Trojan horses, Viruses, worms; etc. Spyware is a type of malware that hackers use to spy on you in order to gain access to your personal information, banking details; etc. Adware is a type of malware that bombards you with endless ads and pop-up windows that could potentially be dangerous for your device.
  • 8. CONCLUSION Today due to high internet penetration, Cyber security is one of the biggest need of the world as cyber security threats are very dangerous to the country’s security. Not only the government but also the citizens should spread awareness among the people to always update your system and network security settings and to the use proper anti-virus so that the use proper antivirus so that your system and network security settings stay virus and malware-free.