CYBER SECURITY
Submitted by
S . VioletJebaMalini ,
M . Pavithra
SYNOPSIS
 Introduction
 What is Cyber Security?
 Need for Cyber Security
 Major Security Problems
 Cyber Security India’s Rank
 Example Cyber Attacks
 Advantages of Cyber Security
 Disadvantages of Cyber Security
 Safety Tips
 Conclusion
INTRODUCTION
 The term cyber security is used to refer to the
security offered through on-line services to
protect our online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
CYBER SECURITY
 Cyber security refers to the technologies and
processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks
delivered via the Internet by cyber criminals.
 Cyber security is important for network, data
and application security.
NEED FOR CYBER SECURITY• To secure our financial information
• To protect ourselves from online fraud and
identity theft.
• To safeguards our system from viruses.
MAJOR SECURITY PROBLEMS
Virus
Hacker
Malware
Trojan horses
Password cracking
VIRUSES AND WORMS
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes.
Solution
 Install a security suite that protects the
HACKERS
 In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
 Types of Hackers
1.White Hat Hacker
2.Grey Hat Hacker
3.Black Hat Hacker
HOW TO PREVENT HACKING
 It may be impossible to prevent computer
hacking , however effective security controls
including strong passwords, and the use of
firewalls can helps.
MALWARE
 The word "malware" comes from the term
"MALicious softWARE."
 Malware is any software that infects and
damages a
computer system without the owner's knowledge
or
permission.
TO STOP MALWARE
 Download an anti-malware program that also
helps prevent infections.
 Activate Network Threat Protection, Firewall,
Antivirus
TROJAN HORSES
 Trojan horses are email viruses that can
duplicate themselves, steal information, or
harm the computer system.
 These viruses are the most serious threats to
computers.
 How to Avoid Trojans
Security suites ,will prevent us from
downloading Trojan Horses.
PASSWORD CRACKING
 Password attacks are attacks by hackers that are
able to
determine passwords or find passwords to different
protected electronic areas and social network sites.
 Securing Password
1.Use always Strong password.
2.Never use same password for two different
sites.
CYBER SECURITY
COUNTRIES RANKSThe top 10 most committed countries to cyber security are
 Singapore,
 United States,
 Malaysia,
 Oman,
 Estonia,
 Mauritius,
 Australia,
 Georgia,
 France and
 Canada.
 Russia is ranked 11th.
INDIA’S RANK
 India is ranked 23rd on the index with a score of 0.683 and has
been listed in the "maturing" category, which refers to 77 countries
that have developed complex commitments to cyber security and
engage in cyber security programmes and initiatives.
The index has been topped by Singapore with a 0.925 score.
CYBER ATTACKS IN 2017
 Petya
The second massive cyber attack, a variant of the ransomware
hit organizations worldwide, especially Ukraine. It is found to
exploit MS Office and SMBv1 vulnerabilities and has worm
capabilities, which allows it to spread quickly across infected
networks.
 Skype
Another cyber attacks was launched by unleashing a virus on
the instant messaging app 'Skype', exploiting it's zero day
vulnerability. This Skype virus allows attackers to remotely
crash the application with an unexpected exception error, to
overwrite the active process registers, and to execute malicious
code.
 Fireball
Fireball is a Chinese malware that affected nearly 250 million
computers worldwide with India among the worst-hit
countries. This Cyber attack was designed to hijack browsers
and turn them into zombies. It is capable of executing any
code on infected machines, resulting in a wide range of
actions from stealing credentials to dropping additional
software nasties.
 Delta Charlie
Delta Charlie, a botnet malware used by Hidden Cobra, has
affected thousands of computers worldwide. This cyber attack
launches Distributed Denial-of-service attacks on vulnerable
computers that are missing required patches.
 Wannacry
May 12th, 2017 witnessed the biggest ever cyber
attack in the Internet history. A ransomware named
WannaCry stormed through the network. It targeted
computers running Windows OS that are not up-to-
date and brought computer systems from Russia to
China and the US to their knees.
ADVANTAGES OF CYBER SECURITY
 Improved security of Cyber Space.
 Increase in Cyber defense.
 Increase in Cyber speed.
 Protecting company data and information.
 Protects systems and computers against viruses ,
malware , worms and spyware etc.
 Protects networks and resources.
 Fight against computer hackers and identity theft.
DISADVANTAGES OF CYBER SECURITY
 It will be Costly for average users.
 Firewalls can be difficult to configure correctly.
 Need to keep updating the new software in order
to keep security up to date.
 Makes systems slower than before
SAFETY TIPS
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal
information unlessrequired
CONCLUSION
 The cyber crime or cyber issues have been all
time in around as well as information systems are
around us.
 To prevent the cyber issue or to hack in the world,
all countries are wanted to make some important
and harsh laws by which the cyber crimes are
prevented.
 Also, want to stop all the illegal websites that are
unauthorized by the governments of the
countries.
 It is also important to every government for

Cyber security

  • 1.
    CYBER SECURITY Submitted by S. VioletJebaMalini , M . Pavithra
  • 2.
    SYNOPSIS  Introduction  Whatis Cyber Security?  Need for Cyber Security  Major Security Problems  Cyber Security India’s Rank  Example Cyber Attacks  Advantages of Cyber Security  Disadvantages of Cyber Security  Safety Tips  Conclusion
  • 3.
    INTRODUCTION  The termcyber security is used to refer to the security offered through on-line services to protect our online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 4.
    CYBER SECURITY  Cybersecurity refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Cyber security is important for network, data and application security.
  • 5.
    NEED FOR CYBERSECURITY• To secure our financial information • To protect ourselves from online fraud and identity theft. • To safeguards our system from viruses.
  • 6.
  • 7.
    VIRUSES AND WORMS A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. Solution  Install a security suite that protects the
  • 8.
    HACKERS  In commona hacker is a person who breaks into computers, usually by gaining access to administrative controls.  Types of Hackers 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker
  • 9.
    HOW TO PREVENTHACKING  It may be impossible to prevent computer hacking , however effective security controls including strong passwords, and the use of firewalls can helps.
  • 10.
    MALWARE  The word"malware" comes from the term "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 11.
    TO STOP MALWARE Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus
  • 12.
    TROJAN HORSES  Trojanhorses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers.  How to Avoid Trojans Security suites ,will prevent us from downloading Trojan Horses.
  • 13.
    PASSWORD CRACKING  Passwordattacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.  Securing Password 1.Use always Strong password. 2.Never use same password for two different sites.
  • 14.
    CYBER SECURITY COUNTRIES RANKSThetop 10 most committed countries to cyber security are  Singapore,  United States,  Malaysia,  Oman,  Estonia,  Mauritius,  Australia,  Georgia,  France and  Canada.  Russia is ranked 11th.
  • 15.
    INDIA’S RANK  Indiais ranked 23rd on the index with a score of 0.683 and has been listed in the "maturing" category, which refers to 77 countries that have developed complex commitments to cyber security and engage in cyber security programmes and initiatives. The index has been topped by Singapore with a 0.925 score.
  • 16.
    CYBER ATTACKS IN2017  Petya The second massive cyber attack, a variant of the ransomware hit organizations worldwide, especially Ukraine. It is found to exploit MS Office and SMBv1 vulnerabilities and has worm capabilities, which allows it to spread quickly across infected networks.  Skype Another cyber attacks was launched by unleashing a virus on the instant messaging app 'Skype', exploiting it's zero day vulnerability. This Skype virus allows attackers to remotely crash the application with an unexpected exception error, to overwrite the active process registers, and to execute malicious code.
  • 17.
     Fireball Fireball isa Chinese malware that affected nearly 250 million computers worldwide with India among the worst-hit countries. This Cyber attack was designed to hijack browsers and turn them into zombies. It is capable of executing any code on infected machines, resulting in a wide range of actions from stealing credentials to dropping additional software nasties.  Delta Charlie Delta Charlie, a botnet malware used by Hidden Cobra, has affected thousands of computers worldwide. This cyber attack launches Distributed Denial-of-service attacks on vulnerable computers that are missing required patches.
  • 18.
     Wannacry May 12th,2017 witnessed the biggest ever cyber attack in the Internet history. A ransomware named WannaCry stormed through the network. It targeted computers running Windows OS that are not up-to- date and brought computer systems from Russia to China and the US to their knees.
  • 19.
    ADVANTAGES OF CYBERSECURITY  Improved security of Cyber Space.  Increase in Cyber defense.  Increase in Cyber speed.  Protecting company data and information.  Protects systems and computers against viruses , malware , worms and spyware etc.  Protects networks and resources.  Fight against computer hackers and identity theft.
  • 20.
    DISADVANTAGES OF CYBERSECURITY  It will be Costly for average users.  Firewalls can be difficult to configure correctly.  Need to keep updating the new software in order to keep security up to date.  Makes systems slower than before
  • 21.
    SAFETY TIPS  Useantivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unlessrequired
  • 22.
    CONCLUSION  The cybercrime or cyber issues have been all time in around as well as information systems are around us.  To prevent the cyber issue or to hack in the world, all countries are wanted to make some important and harsh laws by which the cyber crimes are prevented.  Also, want to stop all the illegal websites that are unauthorized by the governments of the countries.  It is also important to every government for