SlideShare a Scribd company logo
•Networks
•Computers
•Programs
•Data from attack
•Damage
•Unauthorized access
CYBER SECURITY
1
IS THE BODY OF TECHNOLOGIES PROCESSES AND PRACTICES DESIGNED TO PROTECT
Jatins
•Loss or damage to computer hardware
•Software
•Data
• Information
Some breaches to computer security are accidental, but
some are planned. Any illegal act involving a computer is
generally referred to as a computer crime.
RISKS OF COMPUTER SECURITY
2Jatins
Information systems security is INFOSEC, refers to the
processes and methodologies involved with keeping :
•Information confidential
•Available
•Assuring its integrity
It also refers to: Access controls, which prevent unauthorized
personnel from entering or accessing a system.
SECURITY SYSTEM
3Jatins
CYBER TECHNOLOGY
4
Field of technology that deals with the development of:
•Artificial devices
•Machines
•Techniques
•Intelligence
•Components
Jatins
5Jatins
Virus protection software is designed to prevent
viruses, worms and Trojan horses from getting onto a
computer as well as remove any malicious software
code that has already infected computer.
COMPUTER PROTECTION
6Jatins
Governments, military, corporations, financial institutions, hospitals
and other businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume and
sophistication of cyber attacks, ongoing attention is required to
protect sensitive business and personal information, as well as
safeguard national security.
7Jatins
AREAS OF CYBER SECURITY
8
Data in a database or on the file system
or a system resource
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity, and availability
Disaster recovery is the area of security planning
that deals with protecting an organization from
the effects of significant negative events.
policies and practices adopted to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network
and network-accessible resources.
Application Security
Information Security
Disaster recovery
Network Security
Jatins
9Jatins
Weakness
Exploitation of Weakness
Protections on Weakness
Plan to reduce Threats
Identify Threats
Cyber Securities
10
SECURE COMPUTER FROM ONLINE
THREATS WHILE SURFING INTERNET
1. Enable windows automatic updates feature
2. Install antivirus software
3. Activate windows firewall
4. Enable pop up blocker of your browser
5. Clean cookies and session data after using internet
6. Be aware from email spam
7. Be aware from phishing and internet frauds
Jatins
11Jatins
COMPUTER SECURITY - THREATS
• Intrusions
– Any attempt to gain unauthorized access to a system
– Cracking
– Hacking
– Social Engineering
– War-driving
WHAT IS CYBERCRIME?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Virus
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
CYBERCRIME COMPONENTS
• Computers
• Cell Phones
• PDA’s
• Game Consoles
COMPUTER SECURITY - TERMINOLOGY
• Script Kiddies
– Someone that calls themselves a ‘hacker’ but really
isn’t
• Ethical Hacker
– Someone hired to hack a system to find vulnerabilities
and report on them.
– Also called a ‘sneaker’
Jatins
16
Allow a program or feature through window Firewall
18Jatins
Setting for each type of Network
19Jatins
20Jatins
21Jatins
22Jatins
23Jatins
24Jatins
25Jatins
26Jatins

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Securing information system
Securing information systemSecuring information system
Securing information system
Tanjim Rasul
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
omriyad
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Computer security
Computer securityComputer security
Computer security
OZ Assignment help
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ankit Ranjan
 
Cyber security
Cyber securityCyber security
Cyber security
Prem Raval
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
Network Security
Network SecurityNetwork Security
Network Security
Joe Baker
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
Vincent Joassin
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
joy grace bagui
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security
Network SecurityNetwork Security
Network Security
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
cyber security
cyber securitycyber security
cyber security
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security tools
Security toolsSecurity tools
Security tools
 

Similar to Cs tations-pps xversion

Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
Royalzig Luxury Furniture
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
TikdiPatel
 
Cybersecurity_Issues and challenges.pptx
Cybersecurity_Issues and challenges.pptxCybersecurity_Issues and challenges.pptx
Cybersecurity_Issues and challenges.pptx
jalajaAnilkumar
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
CAS
 
Network security
Network securityNetwork security
Network security
hajra azam
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
SumitSingh51.pptx
SumitSingh51.pptxSumitSingh51.pptx
SumitSingh51.pptx
65sumitsingh
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Binod Rimal
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
LAVANYAsrietacin
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Cs tations-pps xversion (20)

Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Cybersecurity_Issues and challenges.pptx
Cybersecurity_Issues and challenges.pptxCybersecurity_Issues and challenges.pptx
Cybersecurity_Issues and challenges.pptx
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
SumitSingh51.pptx
SumitSingh51.pptxSumitSingh51.pptx
SumitSingh51.pptx
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from Jatins Anand

Articulating teachers
Articulating teachersArticulating teachers
Articulating teachers
Jatins Anand
 
Measuring monitoring-reporting-performance
Measuring monitoring-reporting-performanceMeasuring monitoring-reporting-performance
Measuring monitoring-reporting-performance
Jatins Anand
 
Articulating teachers
Articulating teachersArticulating teachers
Articulating teachers
Jatins Anand
 
All tasks assessment-501
All tasks assessment-501All tasks assessment-501
All tasks assessment-501
Jatins Anand
 
432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2
Jatins Anand
 
415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf
Jatins Anand
 
309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1
Jatins Anand
 
309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1
Jatins Anand
 
287363813 student workbook-7
287363813 student workbook-7287363813 student workbook-7
287363813 student workbook-7
Jatins Anand
 

More from Jatins Anand (9)

Articulating teachers
Articulating teachersArticulating teachers
Articulating teachers
 
Measuring monitoring-reporting-performance
Measuring monitoring-reporting-performanceMeasuring monitoring-reporting-performance
Measuring monitoring-reporting-performance
 
Articulating teachers
Articulating teachersArticulating teachers
Articulating teachers
 
All tasks assessment-501
All tasks assessment-501All tasks assessment-501
All tasks assessment-501
 
432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2
 
415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf
 
309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1
 
309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1
 
287363813 student workbook-7
287363813 student workbook-7287363813 student workbook-7
287363813 student workbook-7
 

Recently uploaded

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 

Recently uploaded (19)

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 

Cs tations-pps xversion

  • 1. •Networks •Computers •Programs •Data from attack •Damage •Unauthorized access CYBER SECURITY 1 IS THE BODY OF TECHNOLOGIES PROCESSES AND PRACTICES DESIGNED TO PROTECT Jatins
  • 2. •Loss or damage to computer hardware •Software •Data • Information Some breaches to computer security are accidental, but some are planned. Any illegal act involving a computer is generally referred to as a computer crime. RISKS OF COMPUTER SECURITY 2Jatins
  • 3. Information systems security is INFOSEC, refers to the processes and methodologies involved with keeping : •Information confidential •Available •Assuring its integrity It also refers to: Access controls, which prevent unauthorized personnel from entering or accessing a system. SECURITY SYSTEM 3Jatins
  • 4. CYBER TECHNOLOGY 4 Field of technology that deals with the development of: •Artificial devices •Machines •Techniques •Intelligence •Components Jatins
  • 6. Virus protection software is designed to prevent viruses, worms and Trojan horses from getting onto a computer as well as remove any malicious software code that has already infected computer. COMPUTER PROTECTION 6Jatins
  • 7. Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. 7Jatins
  • 8. AREAS OF CYBER SECURITY 8 Data in a database or on the file system or a system resource unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability Disaster recovery is the area of security planning that deals with protecting an organization from the effects of significant negative events. policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Application Security Information Security Disaster recovery Network Security Jatins
  • 9. 9Jatins Weakness Exploitation of Weakness Protections on Weakness Plan to reduce Threats Identify Threats Cyber Securities
  • 10. 10 SECURE COMPUTER FROM ONLINE THREATS WHILE SURFING INTERNET 1. Enable windows automatic updates feature 2. Install antivirus software 3. Activate windows firewall 4. Enable pop up blocker of your browser 5. Clean cookies and session data after using internet 6. Be aware from email spam 7. Be aware from phishing and internet frauds Jatins
  • 12. COMPUTER SECURITY - THREATS • Intrusions – Any attempt to gain unauthorized access to a system – Cracking – Hacking – Social Engineering – War-driving
  • 13. WHAT IS CYBERCRIME? • Using the Internet to commit a crime. – Identity Theft – Hacking – Virus • Facilitation of traditional criminal activity – Stalking – Stealing information – Child Pornography
  • 14. CYBERCRIME COMPONENTS • Computers • Cell Phones • PDA’s • Game Consoles
  • 15. COMPUTER SECURITY - TERMINOLOGY • Script Kiddies – Someone that calls themselves a ‘hacker’ but really isn’t • Ethical Hacker – Someone hired to hack a system to find vulnerabilities and report on them. – Also called a ‘sneaker’
  • 17. Allow a program or feature through window Firewall
  • 18. 18Jatins Setting for each type of Network