What is Cyber security? And how it can
be used?
Divyanshi Garg
170484
Mca final year
CONTENTS
• Difference between cybersecurity and cybercrime
• Definition
• Types
• Types of cyber security by percentage
• How to secure your computer
• Types of hackers
• R interface
• Online troubles for kids and family
• Safety tips
Difference between Cybersecuity v/s
Cybercrime
Cybersecurity Cybercrime
Types of crimes Crimes where a computer
network, software or
hardware is the target for
example
worms,viruses,SQL
injection etc.
Crimes where the human
or the human’s data is the
target for example hate
speech.
Victim Cooperation and
governments
Families and friends
Academic programs Computer science,
Computer Engineering,
Criminology, Psychology
CYBER SECURITY
• Internet security is a branch of computer security specifically related to the
internet
• There is a Quantitative tool and open source successor to the statistics
package S and SPlus is called R software.
CYBERSECURITY
Advantages of Cyber Security:
• Increase in cyber defense.
• Increase in cyber speed.
• Protecting company data and information.
• Protects systems and computers against virus, worms, Malware and Spyware etc.
• Protects individual private information.
Disadvantages of Cyber Security:
• Firewalls can be difficult to configure correctly
• Need to keep updating the new software in order to keep security up to date.
• Make system slower than before.
Types
• Hacking
• Denial of services attack
• Cyber terrorism
• Software Piracy
Hacking
• Hacking in simple terms means illegal intrusion into a
computer system
Denial of Service Attack
• Who flood the bandwidth of the victims network
Cyber Terrorism
• Use of Internet based attack in terrorism
activities.
Software Piracy
• Theft of software through the illegal
copying programs.
Types of Cyber Attack by Percentage
How to secure your Computer
1) Antivirus program
Protects against viruses,Trojans,worms etc
2) Anti spyware software
Prevents adware from installing
Types of Hackers
• White hat hacker
• Grey hat hacker
• Black hat hacker
EXAMPLE
For visualization, I’ll use ggplot2 package.
ggplot(train, aes(x= Item_Visibility, y = Item_Outlet_Sales)) +
geom_point(size = 2.5, color="navy") + xlab("Item Visibility") +
ylab("Item Outlet Sales")
> ggplot(train, aes(Outlet_Identifier, Item_Outlet_Sales)) +
geom_bar(stat = "identity", color = "purple") +theme(axis.text.x
= element_text(angle = 70, vjust = 0.5, color = "black")) +
ggtitle("Outlets vs Total Sales") + theme_bw()
EXAMPLE
Online Troubles for kids and family
• Disturbing
• Viruses and spyware
Safety tips
• Use antivirus software
• Insert firewall
• Maintain backup
• Check security settings
• Use secure connections
• Use strong passwords
CyberSecurity

CyberSecurity

  • 1.
    What is Cybersecurity? And how it can be used? Divyanshi Garg 170484 Mca final year
  • 2.
    CONTENTS • Difference betweencybersecurity and cybercrime • Definition • Types • Types of cyber security by percentage • How to secure your computer • Types of hackers • R interface • Online troubles for kids and family • Safety tips
  • 3.
    Difference between Cybersecuityv/s Cybercrime Cybersecurity Cybercrime Types of crimes Crimes where a computer network, software or hardware is the target for example worms,viruses,SQL injection etc. Crimes where the human or the human’s data is the target for example hate speech. Victim Cooperation and governments Families and friends Academic programs Computer science, Computer Engineering, Criminology, Psychology
  • 4.
    CYBER SECURITY • Internetsecurity is a branch of computer security specifically related to the internet • There is a Quantitative tool and open source successor to the statistics package S and SPlus is called R software.
  • 5.
    CYBERSECURITY Advantages of CyberSecurity: • Increase in cyber defense. • Increase in cyber speed. • Protecting company data and information. • Protects systems and computers against virus, worms, Malware and Spyware etc. • Protects individual private information. Disadvantages of Cyber Security: • Firewalls can be difficult to configure correctly • Need to keep updating the new software in order to keep security up to date. • Make system slower than before.
  • 6.
    Types • Hacking • Denialof services attack • Cyber terrorism • Software Piracy
  • 7.
    Hacking • Hacking insimple terms means illegal intrusion into a computer system
  • 8.
    Denial of ServiceAttack • Who flood the bandwidth of the victims network
  • 9.
    Cyber Terrorism • Useof Internet based attack in terrorism activities.
  • 10.
    Software Piracy • Theftof software through the illegal copying programs.
  • 11.
    Types of CyberAttack by Percentage
  • 12.
    How to secureyour Computer 1) Antivirus program Protects against viruses,Trojans,worms etc 2) Anti spyware software Prevents adware from installing
  • 13.
    Types of Hackers •White hat hacker • Grey hat hacker • Black hat hacker
  • 16.
    EXAMPLE For visualization, I’lluse ggplot2 package. ggplot(train, aes(x= Item_Visibility, y = Item_Outlet_Sales)) + geom_point(size = 2.5, color="navy") + xlab("Item Visibility") + ylab("Item Outlet Sales")
  • 17.
    > ggplot(train, aes(Outlet_Identifier,Item_Outlet_Sales)) + geom_bar(stat = "identity", color = "purple") +theme(axis.text.x = element_text(angle = 70, vjust = 0.5, color = "black")) + ggtitle("Outlets vs Total Sales") + theme_bw() EXAMPLE
  • 18.
    Online Troubles forkids and family • Disturbing • Viruses and spyware
  • 19.
    Safety tips • Useantivirus software • Insert firewall • Maintain backup • Check security settings • Use secure connections • Use strong passwords