PRESENTED BY:
HIMANSHU BHANDARI
ROLL NO: 23
INTRODUCTIO
N TO CYBER
SECURITY
THE INTERNET IS A GLOBAL INFORMATION
NETWORK THAT CONNECTS MILLIONS OF
COMPUTERS.
THE INTERNET HAS NO SINGLE INVENTOR
INSTEAD IT HAS EVOLVED OVER TIME.
• THE INTERNET GOT ITS START IN THE UNITED
STATES MORE THAN 65 YEARS AGO AS A
GOVERNMENT WEAPON IN THE COLD WAR.
• SCIENTISTS AND RESEARCHERS USED IT TO
COMMUNICATE AND SHARE DATA WITH ONE
ANOTHER THROUGH WHAT WAS KNOWN AS
DARPNET(DEFENSE’S ADVANCED RESEARCH
PROJECT AGENCY NETWORK.
Anatomy of a Web Address
Meaning of Cyber Security
Cyber security refers to the body
of technologies, processes, and
practices designed to protect
networks, devices, programs, and
data from attack, damage, or
unauthorized access. Cyber
security may also be referred to
as information technology
security.
MALWARE
• The word malware stands for “Malicious Software”.
• Malware is any software that infects and damages a computer system without the owner’s knowledge or
permission.
Types are:
• Adware
• Spyware
• Virus
• Worms
• Trojan Horse
• Scareware
•
•
•
•
•
•
•
•
Typesof
Hackers
 White Hat Hackers
 Grey Hat Hackers
 Black Hat Hackers
 Blue Hat Hackers
MOBILE PHONE SECURITY
• Sim Card Lock
• Screen Lock/ App Lock
• Location Setting
• Software Updates
• Keepass Droid
• VPN
• Desktop Site
BANKING SECURITY
■ CHANGE PASSWORDAND PIN (in a period of around 3 months)
■ Do not use your same email password
■ Always use HTTPS server while online transactions
■ Do not share OTP to some other parties
■ Use MPIN in UPITransactions
■ E-wallet Security
z
CYBER SECURITY COUNTER BY
INDIA
 NCTC (Counter Terrorism Center)
 NISAP (National Information Security Assurance Programme)
 MHA (Ministry of Home Affairs)
 NCRB (National Crime Records Bureau)
Thank You
Meaning of
Cyber
Security
Need of Cyber
Security
Implementing
Cyber
Security
To Understand
Major Security Problems
• Virus
• Hacker
• Malware
• Trojan Horse
• Password cracking
Viruses and Worms
• A Virus is a program that is loaded onto your computer without your
knowledge and runs against your wishes
Solution
• Install a security suite that projects the computer against threats such
as viruses and worms.
Hackers
• In common a hacker is a person who breaks into computers, usually
by gaining access to administrative controls.
How to prevent Hacking
• It may be impossible to prevent hacking computer hacking, however
effective security controls including strong passwords, and the use of
firewalls can helps.
To Stop Malware
• Download anti malware program that also help prevent infections.
• Activate Network Threat Protection, Firewall, Antivirus.
Trojan Horse
• Trojan Horse are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers.
Password Cracking
• Password attacks are able to determine passwords or find passwords
to different protected electronic areas and social network sites.

Cyber Security

  • 1.
    PRESENTED BY: HIMANSHU BHANDARI ROLLNO: 23 INTRODUCTIO N TO CYBER SECURITY
  • 2.
    THE INTERNET ISA GLOBAL INFORMATION NETWORK THAT CONNECTS MILLIONS OF COMPUTERS. THE INTERNET HAS NO SINGLE INVENTOR INSTEAD IT HAS EVOLVED OVER TIME.
  • 3.
    • THE INTERNETGOT ITS START IN THE UNITED STATES MORE THAN 65 YEARS AGO AS A GOVERNMENT WEAPON IN THE COLD WAR. • SCIENTISTS AND RESEARCHERS USED IT TO COMMUNICATE AND SHARE DATA WITH ONE ANOTHER THROUGH WHAT WAS KNOWN AS DARPNET(DEFENSE’S ADVANCED RESEARCH PROJECT AGENCY NETWORK.
  • 4.
    Anatomy of aWeb Address
  • 5.
    Meaning of CyberSecurity Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 6.
    MALWARE • The wordmalware stands for “Malicious Software”. • Malware is any software that infects and damages a computer system without the owner’s knowledge or permission. Types are: • Adware • Spyware • Virus • Worms • Trojan Horse • Scareware
  • 7.
  • 8.
    Typesof Hackers  White HatHackers  Grey Hat Hackers  Black Hat Hackers  Blue Hat Hackers
  • 10.
    MOBILE PHONE SECURITY •Sim Card Lock • Screen Lock/ App Lock • Location Setting • Software Updates • Keepass Droid • VPN • Desktop Site
  • 11.
    BANKING SECURITY ■ CHANGEPASSWORDAND PIN (in a period of around 3 months) ■ Do not use your same email password ■ Always use HTTPS server while online transactions ■ Do not share OTP to some other parties ■ Use MPIN in UPITransactions ■ E-wallet Security
  • 12.
    z CYBER SECURITY COUNTERBY INDIA  NCTC (Counter Terrorism Center)  NISAP (National Information Security Assurance Programme)  MHA (Ministry of Home Affairs)  NCRB (National Crime Records Bureau)
  • 13.
  • 14.
    Meaning of Cyber Security Need ofCyber Security Implementing Cyber Security To Understand
  • 15.
    Major Security Problems •Virus • Hacker • Malware • Trojan Horse • Password cracking
  • 16.
    Viruses and Worms •A Virus is a program that is loaded onto your computer without your knowledge and runs against your wishes
  • 17.
    Solution • Install asecurity suite that projects the computer against threats such as viruses and worms.
  • 18.
    Hackers • In commona hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 19.
    How to preventHacking • It may be impossible to prevent hacking computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 20.
    To Stop Malware •Download anti malware program that also help prevent infections. • Activate Network Threat Protection, Firewall, Antivirus.
  • 21.
    Trojan Horse • TrojanHorse are email viruses that can duplicate themselves, steal information, or harm the computer system. • These viruses are the most serious threats to computers.
  • 22.
    Password Cracking • Passwordattacks are able to determine passwords or find passwords to different protected electronic areas and social network sites.