SlideShare a Scribd company logo
Name : Ambati Pawan Kalyan
Sub : Industry 4.0
En. No. : 180200117001
Sem : 6th
Class : IC-C
Mentor : Mr. Dipesh Vyas
Government Engineering College Rajkot.
• Introduction
• Meaning of Cyber Security
• Security Threats
• Different types of hackers
• CAI threats
• Cyber attacks
• Cyber security case study
• Reference videos
• Conclusion
• References
i
• Cyber security is the practice of defending computers, servers, mobile and electronic devices etc from malicious
attack
• It is also known as Information Technology Security or Electronic Security.
• With increasing of internet connectivity, huge increasing in hacking and cyber attacks.
• It is very important to protect people from hacker.
• Users data and their personal information protections is big concern to companies.
• In this digital era every device is generates lots of
data.
• This data is stored in the serves of companies like
google, you tube or any other servers.
• Hacker steal this data and they uses for exploitation
purpose.
• For hacking of this data they uses different
techniqiues
• First we have to know different types of hackers.
• A person who gets into other computer system
without permisson by accesing others computer.
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
• The dark web refers to encrypted online contents
that is not indexed by conventional search engines
• It is full of illegal activites and illegal pornography.
• Cryptocurrency is adigital payment system that
doesn’t rely on banks to verify transactions.
• it’s a peer - to peer system that can enable anywhere
to send and recive payments.
• Popular cryptocurrency are bitcoin,binance coin etc.
• Hacker uses darkweb for anonymity and
cryptocurrency for money transfer.
• There are three types of cyber treats
• Cybercrime
• Cyber-attack
• Cyberterrorism
• Malwar stands for MaLiciou softWARE
• Software that has come malicious intent and which is
installed in the user’s consent.
• Often spread via anunsolicated email or legitimate looking
download.
• Malwars may be used by cyber criminals to make money
or in politically motivated cyber crimes.
• There are different types of malwars including :
• Trojan horses are email viruses that can dup;icate
themselves, steal information or harm the computer
system..
• A self-replicating program that attached itself to clean file and spreads
throughout a computer system, infecting files with malicious code.
• A program that secretely records what a user does, so that
cybercriminals can make use of this information.
• For e.g. spyware could capture credit card details.
• Malware which looks down a users files and data, with the threat of
erasing it unless a ransom is paid.
• Advertising software which can be used to spread malware
• Network of malware infected computers which cybercriminals
uses to perfom task online without user’s permission.
• An sql (structured language query ) injection is a type of cyber -
attack used to take control of and steal data form a data base .
• Phishing is when cybercriminals target victims with emails that
appear to be form a legitimate comany asking for sensitive
informations .
• A man-in-the-middle attack is type of cyber threat where a
cybercrimnal intercepts communication between two individuals
in order to steal data .
• Most of the paasword cracking techniques are sucessful due to
weak or easily guessable passwords.
• https://you tube.be/ooJSgsB5flE - Cyber security
• https://you tube.be/3E86t723i1Y - Dark web
• https://you tube.be/H56hbJ0HKq4 - mobiquick
• https://you tube.be/VBejkSsHZ0 - Cyber security hindi
• kaspersky cyber security article
• Edurkha cyber security ppt
• wikipedia
• Hindustan times articles on cyber security
• Prevention of cyber attacks is imposible .
• We are in digital era, often smart devices are connected to internet .
• Due to hacker can hack our gadgets and they can steal our data.
• Be carefull in digital platform.
• Prevention is bettere than cure.
• Use strong passwords , dont share any confidential data on gadgets.
• If you are the bussiness man you have to requiret one ethical hacker.
• Don’t use any antivirus it decreases proccessing speed of system.
• Because our our gadgets getting more smarter
• Keep update your apps.
Cyber security

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Yasmin Ismail
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Unit 2
Unit 2Unit 2
Unit 2
Jigarthacker
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Uday Bhaskarwar
 
Ppt
PptPpt
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
Tejas Wasule
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
Pavan Kuls
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar
 
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
Md Raffiqunnabi Rumman
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Helen Dixon
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Unit 2
Unit 2Unit 2
Unit 2
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Ppt
PptPpt
Ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similar to Cyber security

Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
RavinderSingh172970
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Cyber crime
Cyber crimeCyber crime

Similar to Cyber security (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

Cyber security

  • 1. Name : Ambati Pawan Kalyan Sub : Industry 4.0 En. No. : 180200117001 Sem : 6th Class : IC-C Mentor : Mr. Dipesh Vyas Government Engineering College Rajkot.
  • 2. • Introduction • Meaning of Cyber Security • Security Threats • Different types of hackers • CAI threats • Cyber attacks • Cyber security case study • Reference videos • Conclusion • References
  • 3. i • Cyber security is the practice of defending computers, servers, mobile and electronic devices etc from malicious attack • It is also known as Information Technology Security or Electronic Security. • With increasing of internet connectivity, huge increasing in hacking and cyber attacks. • It is very important to protect people from hacker. • Users data and their personal information protections is big concern to companies.
  • 4. • In this digital era every device is generates lots of data. • This data is stored in the serves of companies like google, you tube or any other servers. • Hacker steal this data and they uses for exploitation purpose. • For hacking of this data they uses different techniqiues • First we have to know different types of hackers.
  • 5. • A person who gets into other computer system without permisson by accesing others computer. • White Hat Hacker • Grey Hat Hacker • Black Hat Hacker
  • 6. • The dark web refers to encrypted online contents that is not indexed by conventional search engines • It is full of illegal activites and illegal pornography. • Cryptocurrency is adigital payment system that doesn’t rely on banks to verify transactions. • it’s a peer - to peer system that can enable anywhere to send and recive payments. • Popular cryptocurrency are bitcoin,binance coin etc. • Hacker uses darkweb for anonymity and cryptocurrency for money transfer.
  • 7. • There are three types of cyber treats • Cybercrime • Cyber-attack • Cyberterrorism
  • 8. • Malwar stands for MaLiciou softWARE • Software that has come malicious intent and which is installed in the user’s consent. • Often spread via anunsolicated email or legitimate looking download. • Malwars may be used by cyber criminals to make money or in politically motivated cyber crimes. • There are different types of malwars including : • Trojan horses are email viruses that can dup;icate themselves, steal information or harm the computer system..
  • 9. • A self-replicating program that attached itself to clean file and spreads throughout a computer system, infecting files with malicious code. • A program that secretely records what a user does, so that cybercriminals can make use of this information. • For e.g. spyware could capture credit card details. • Malware which looks down a users files and data, with the threat of erasing it unless a ransom is paid. • Advertising software which can be used to spread malware • Network of malware infected computers which cybercriminals uses to perfom task online without user’s permission.
  • 10. • An sql (structured language query ) injection is a type of cyber - attack used to take control of and steal data form a data base . • Phishing is when cybercriminals target victims with emails that appear to be form a legitimate comany asking for sensitive informations . • A man-in-the-middle attack is type of cyber threat where a cybercrimnal intercepts communication between two individuals in order to steal data . • Most of the paasword cracking techniques are sucessful due to weak or easily guessable passwords.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. • https://you tube.be/ooJSgsB5flE - Cyber security • https://you tube.be/3E86t723i1Y - Dark web • https://you tube.be/H56hbJ0HKq4 - mobiquick • https://you tube.be/VBejkSsHZ0 - Cyber security hindi • kaspersky cyber security article • Edurkha cyber security ppt • wikipedia • Hindustan times articles on cyber security
  • 22. • Prevention of cyber attacks is imposible . • We are in digital era, often smart devices are connected to internet . • Due to hacker can hack our gadgets and they can steal our data. • Be carefull in digital platform. • Prevention is bettere than cure. • Use strong passwords , dont share any confidential data on gadgets. • If you are the bussiness man you have to requiret one ethical hacker. • Don’t use any antivirus it decreases proccessing speed of system. • Because our our gadgets getting more smarter • Keep update your apps.