SlideShare a Scribd company logo
CYBER SECURITY
ThisPhotobyUnknownAuthorislicensedunderCCBY-SA-NC
 INTRODUCTION
 TYPES OF CYBER SECURITY THREATE
 CYBER SECURITY VENDORS
 ADVANTAGE IN CYBER SECURITY
 DISADVANTAGE IN CYBER SECURITY
 BENEFITS IN CYBER SECURITY
 CAREER IN CYBER SECURITY
 CONCLUSION This Photo by Unknown Author is licensed under CC BY
INTRODUCTION
• CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS
INCLUDING ,HARDWARE,SOFTWARE,
• AND DATA FROM CYBERATTACKS.
• MEANING OF CYBER
• IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE
INTERNET AND VIRTUAL REALITY
• NEED OF CYBER SECURITY
• CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM
THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR
SYSTEM FROM VIRUS.
•
•
•
•
TYPES OF CYBER SECURITY THREATE
The process of keeping up with new
technologies security trends and
threat intelligence is a challenging
task . However, it is necessary in
order to protect information and
other assets from cyber threats,
which take many forms they are ….
• ransomware
• Malware
• Social engineering
• phishing
RANSOMWARE:
Ransome ware is a type of
malware that involve an
attacked locking the victims
computer system files
typically through encryption-
and demanding a payment
to decrypt and unlock them.
This Photo by Unknown Author is licensed under CC BY
MALWARE:
Malware is any file
or program used to
harm a computer
user, such as
worms, computer
viruses, trojan
horses and spyware.
This Photo by Unknown Author is licensed under CC BY
SOCIAL ENGINEERING:
Social engineering is an
attack that relies on human
interactions to trick users
into breaking security
producers in order to gain
sensitive information that is
typically protected.
This Photo by Unknown Author is licensed under CC BY-SA
PHISHING:
Phishing is a form where
fraudulent emails are sent
that resemble emails
from reputable of these
emails is to steel sensitive
data such as credit card or
login information.
This Photo by Unknown Author is licensed under CC BY-SA-NC
CYBER SECURITY VENDORS
Vendors in cyber security
fields will typically use
endpoint ,network,and
advanced
threat,protection security
as well as data loss
prevention .
three commonaly
cybersecurity
vendors are..
cisco Mcafee Trend micro.
This Photo by Unknown
Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY-SA
ADVANTAGE OF CYBER SECURITY
 it will defend from hacks and virus.
 the application of cyber security used in ourpc
needs update everyweek
The security develpers will update their database
every week once. Henc the new virus also deleted
DIS ADVANTAGE OF CYBER SECURITY
 make the system slower than before
Need to keep uploading the new software
In order to keep security up to date
Could be costly for average user
BENEFITS IN CYBER SECURITY
Protection for data and network
Prevention of unauthorized users
Improve recovery time after a breech
Protection to end users
CAREER IN CYBER SECURITY
• AS the cyber threat land scape continues to grow and
emerging threats such as the internet of things require
hardware and software skills. it is estimated that there are
1 million unfilled cyber security job world wide. IT
professionals and other computer specialist are needed in
security job.
CISO (CHIEF INFORMATION SECURITY OFFICER)
SECURITY ENGINEER
ARCHITECT
ANALYST
This Photo by Unknown Author is licensed under CC BY-SA
CONCLUSION
• The only system which is truly secure is one
which is switched off and unplugged.
• So, only way to be safe is pay attention and act
smart
This Photo by Unknown Author is
licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is
licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by Unknown
Author is licensed under CC
BY-SA-NC
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by
Unknown Author
is licensed under
CC BY
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY
This Photo by
Unknown Author is
licensed under CC
BY-ND
BY- ABITHA JAYAVEL
ECE-1ST YEAR
R M K ENGINEERING COLLEGE
KAVARAIPETTAI.

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber security cyber security
cyber security
 
Information security
Information securityInformation security
Information security
 

Similar to cyber security

Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
srikmhh
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
Jason Bloomberg
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
KAVYAC21
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Cyber crime
Cyber crimeCyber crime
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
tanyamudgal4
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
Cyber security
Cyber securityCyber security
Cyber security
AmanLodhi3
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
Sudeshna Biswas
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
Muhammad Khalid
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
Avanishsahu
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
MamthaMam1
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Similar to cyber security (20)

Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 

cyber security

  • 2.  INTRODUCTION  TYPES OF CYBER SECURITY THREATE  CYBER SECURITY VENDORS  ADVANTAGE IN CYBER SECURITY  DISADVANTAGE IN CYBER SECURITY  BENEFITS IN CYBER SECURITY  CAREER IN CYBER SECURITY  CONCLUSION This Photo by Unknown Author is licensed under CC BY
  • 3. INTRODUCTION • CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, • AND DATA FROM CYBERATTACKS. • MEANING OF CYBER • IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE INTERNET AND VIRTUAL REALITY • NEED OF CYBER SECURITY • CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR SYSTEM FROM VIRUS. • • • •
  • 4. TYPES OF CYBER SECURITY THREATE The process of keeping up with new technologies security trends and threat intelligence is a challenging task . However, it is necessary in order to protect information and other assets from cyber threats, which take many forms they are …. • ransomware • Malware • Social engineering • phishing
  • 5. RANSOMWARE: Ransome ware is a type of malware that involve an attacked locking the victims computer system files typically through encryption- and demanding a payment to decrypt and unlock them. This Photo by Unknown Author is licensed under CC BY
  • 6. MALWARE: Malware is any file or program used to harm a computer user, such as worms, computer viruses, trojan horses and spyware. This Photo by Unknown Author is licensed under CC BY
  • 7. SOCIAL ENGINEERING: Social engineering is an attack that relies on human interactions to trick users into breaking security producers in order to gain sensitive information that is typically protected. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. PHISHING: Phishing is a form where fraudulent emails are sent that resemble emails from reputable of these emails is to steel sensitive data such as credit card or login information. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 9. CYBER SECURITY VENDORS Vendors in cyber security fields will typically use endpoint ,network,and advanced threat,protection security as well as data loss prevention . three commonaly cybersecurity vendors are.. cisco Mcafee Trend micro. This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA
  • 10. ADVANTAGE OF CYBER SECURITY  it will defend from hacks and virus.  the application of cyber security used in ourpc needs update everyweek The security develpers will update their database every week once. Henc the new virus also deleted
  • 11. DIS ADVANTAGE OF CYBER SECURITY  make the system slower than before Need to keep uploading the new software In order to keep security up to date Could be costly for average user
  • 12. BENEFITS IN CYBER SECURITY Protection for data and network Prevention of unauthorized users Improve recovery time after a breech Protection to end users
  • 13.
  • 14. CAREER IN CYBER SECURITY • AS the cyber threat land scape continues to grow and emerging threats such as the internet of things require hardware and software skills. it is estimated that there are 1 million unfilled cyber security job world wide. IT professionals and other computer specialist are needed in security job.
  • 15. CISO (CHIEF INFORMATION SECURITY OFFICER) SECURITY ENGINEER ARCHITECT ANALYST This Photo by Unknown Author is licensed under CC BY-SA
  • 16. CONCLUSION • The only system which is truly secure is one which is switched off and unplugged. • So, only way to be safe is pay attention and act smart
  • 17. This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA-NC This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-ND
  • 18.
  • 19. BY- ABITHA JAYAVEL ECE-1ST YEAR R M K ENGINEERING COLLEGE KAVARAIPETTAI.