Why Should we know about Cyber- Crime
- In this Tech-savvy world of 21st Century every one is engaged with internet,
through whatsapp, twitter, facebook, netbanking & lots of other platforms are
there.
- And some criminal minded persons commit crimes here, which is included under
cybercrime
- So we should be aware about crimes happening around in the cyber-space.
The term cyber security is used to refer to the security
offered through on-line services to protect your online
information. With an increasing amount of people getting
connected to Internet, the security threats that cause
massive harm are increasing also.
Introduction
History
 The first recorded cyber crime was recorded in the year 1820.
 The first spam email took place in 1978 when it was sent over the
Arpanet.
 The first Virus was installed on an Apple Computer in 1982.
What is cyber security?
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the
number of successful cyber security attacks.
 Cyber security refers to the technologies and processes designed
to protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the Internet by cyber
criminals.
 Though, cyber security is important for network, data and
application security.
What is the
meaning of
the word
CYBER
What is the need
of Cyber Security
What are the
security
problems in
Cyber field
How to
implement and
maintain
Security of a
Cyber field
around us.
It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Major security problems
Virus
Hacker Malware
Trojan horses
Password cracking
Need of cyber security
Cyber security is necessary since it helps in securing data
from threats such as data theft or misuse, also safeguards
your system from viruses.
Viruses and Worms
A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
Download ananti-malware
program thatalso
helps prevent infections.
Activate NetworkThreat
Protection,
Firewall, Antivirus.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Hackers
In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
Use always Strong password.
Never use same password for two different sites.
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
How To prevent hacking
Cyber Security Is Everyone’s Responsibility
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
Cyber Laws:
There is absolutely no comprehensive law on
Cybercrime any where in the world. This is
reason that the investigating agencies like FBI
are finding the Cyberspace to be an extremely
difficult terrain.
Conclusion
I hope that my presentation will be helpful for my audience
to improve their knowledge about cyber security and to
overcome several security loopholes on their computer
operation. Also it helps to spread awareness among
normal people about emerging security threats. Simple
and practical prevention methods are explained in the
Seminar to prevent PCs from infection.
~ The key to protecting yourself is being aware. Not all
cybercriminals are “hackers.”
~ There is a whole other world that exists in cyberspace…
make sure that your information travels safely. Stay Secure,
Stay

Cyber Security

  • 2.
    Why Should weknow about Cyber- Crime - In this Tech-savvy world of 21st Century every one is engaged with internet, through whatsapp, twitter, facebook, netbanking & lots of other platforms are there. - And some criminal minded persons commit crimes here, which is included under cybercrime - So we should be aware about crimes happening around in the cyber-space. The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Introduction
  • 3.
    History  The firstrecorded cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982. What is cyber security?  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 4.
    What is the meaningof the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 5.
    It is acombining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 6.
    Major security problems Virus HackerMalware Trojan horses Password cracking Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7.
    Viruses and Worms AVirus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 8.
    Malware The word "malware"comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 9.
    To Stop Malware Downloadananti-malware program thatalso helps prevent infections. Activate NetworkThreat Protection, Firewall, Antivirus.
  • 10.
    Trojan Horses Trojan horsesare email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 11.
    How to AvoidTrojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 12.
    Hackers In common ahacker is a person who breaks into computers, usually by gaining access to administrative controls. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  • 13.
    Password attacks areattacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Securing Password Use always Strong password. Never use same password for two different sites. It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps. How To prevent hacking
  • 14.
    Cyber Security IsEveryone’s Responsibility
  • 15.
    Cyber Security Strategy– India • Security Policy, Legal Framework – IT Act, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  • 17.
    Cyber Laws: There isabsolutely no comprehensive law on Cybercrime any where in the world. This is reason that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult terrain.
  • 18.
    Conclusion I hope thatmy presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection. ~ The key to protecting yourself is being aware. Not all cybercriminals are “hackers.” ~ There is a whole other world that exists in cyberspace… make sure that your information travels safely. Stay Secure, Stay