SlideShare a Scribd company logo
CYBER SECURITY
WHAT IS A CYBER SECURITY
• Cyber security is the application of technologies , processes
and controls to protect systems , networks , programs ,
devices and data from cyber attacks.
• Cyber security aims to reduce the risks of cyber attacks and
protect against the unauthorized exploitation of systems ,
networks and technologies.
• It is also known as information technology or electronic
information security
• The term applies in a variety of contexts , from
business to mobile computing , and can be divided
into a few common categories.
1. Network security
2. Application security
3. Information security
4. Operational security
• Network security is the practice of securing a computer
network from intruders , whether targeted attackers or
opportunistic malware.
• Application security focuses on keeping software and
devices free of threats. A compromised application could
provide access to the data its designed to protect. Successful
security begins in the design stage , well before a program or
device is deployed.
• Information security protects the integrity and privacy of
data , both in storage and in transit.
• Operational security includes the processes and decisions
for handling and protecting data assets. The permissions users
have when accessing a network and the producers that
TYPES OF CYBER THREATS
• The threats countered by cyber-security are three-fold:
• 1. Cybercrime includes single actors or groups targeting systems for
financial gain or to cause disruption.
• 2. Cyber-attack often involves politically motivated information
gathering.
• 3. Cyberterrorism is intended to undermine electronic systems to
cause panic or fear.
PHISHING
 Phishing is a type of social engineering where
an attacker sends a fraudulent (e.g., spoofed,
fake, or otherwise deceptive) message
designed to trick a human victim into
revealing sensitive information to the attacker
or to deploy malicious software on the victim's
infrastructure like ransomware.
 It is usually done through email. The goal is to
steal sensitive data like credit card and login
information, or to install malware on the victim's
machine.
PASSWORD
ATTACKS
A password attack refers to any of the
various methods used to maliciously
authenticate into password-protected
accounts
These attacks are typically facilitated through
the use of software that expedites cracking or
guessing passwords.
DISTRIBUTED DENIAL OF
SERVICE
 DDoS (Distributed Denial of Service) is a category
of malicious cyber-attacks that hackers or
cybercriminals employ in order to make an online
service, network resource or host machine
unavailable to its intended users on the Internet.
ROGUE SECURITY
 Rogue security software is a form of malicious
software and internet fraud that misleads users into
believing there is a virus on their computer and aims
to convince them to pay for a fake malware removal
tool that actually installs malware on their computer
 Rogue security software mainly relies on social
engineering (fraud) to defeat the security built into
modern operating system and browser software and
install itself onto victims' computers.
MAN IN THE MIDDLE
 A perpetrator positions himself in a
conversation between a user and an
application—either to eavesdrop or to
impersonate one of the man in the middle
(MITM) attack is a general term for when a
parties, making it appear as if a normal
exchange of information is underway.
DRIVE BY DOWNLOAD
 A drive-by download refers to the unintentional
download of malicious code onto a computer or
mobile device that exposes users to different types
of threats.
 The malicious code is designed to download
malicious files onto the victim's PC without the user
being aware that anything untoward has happened.
MALVERTISING
Malvertising is an attack in which
perpetrators inject malicious code into
legitimate online advertising networks.
The code typically redirects users to
malicious websites.
MALWARE
• Malware means malicious software. One of the most common cyber
threats, malware is software that a cybercriminal or hacker has
created to disrupt or damage a legitimate user’s computer. Often
spread via an unsolicited email attachment or legitimate-looking
download, malware may be used by cybercriminals to make money or
in politically motivated cyber-attacks.
• There are a number of different types of malware, including:
• Virus: A self-replicating program that attaches itself to clean file and
spreads throughout a computer system, infecting files with malicious
code.
• Trojans: A type of malware that is disguised as legitimate software.
Cybercriminals trick users into uploading Trojans onto their computer
• Spyware: A program that secretly records what a user does, so that
cybercriminals can make use of this information. For example,
spyware could capture credit card details.
• Ransomware: Malware which locks down a user’s files and data, with
the threat of erasing it unless a ransom is paid.
• Adware: Advertising software which can be used to spread malware.
• Botnets: Networks of malware infected computers which
cybercriminals use to perform tasks online without the user’s
permission.
BENEFITS FOR CYBER SECURITY
• Valuable information protection.
• Evade loss of crucial data.
• Risk mitigation.
• Privacy of customer and employee is ensured.
• Recovery time is improved.
• It will help us to browse the various websites securely.
• It will defend us from hacks and virus.
DISADVANTAGES OF CYBER SECURITY
• Firewalls can be difficult to configure correctly.
• Incorrectly configured firewalls may block users from
performing certain actions on the internet , until the firewall
configured correctly.
• Makes the system slower than before.
• Need to keep updating the new software in order to keep
security up to date.
• Lack of knowledge and not easy to use.
• To use this special expertise required.
cyber security

More Related Content

What's hot

Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 

What's hot (20)

Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Information security
Information securityInformation security
Information security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 

Similar to cyber security

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
Taniya Fansupkar
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
shraddhazad
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
SidakSingh43
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 

Similar to cyber security (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
презентация1
презентация1презентация1
презентация1
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 

Recently uploaded

Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 

cyber security

  • 2.
  • 3. WHAT IS A CYBER SECURITY • Cyber security is the application of technologies , processes and controls to protect systems , networks , programs , devices and data from cyber attacks. • Cyber security aims to reduce the risks of cyber attacks and protect against the unauthorized exploitation of systems , networks and technologies. • It is also known as information technology or electronic information security
  • 4. • The term applies in a variety of contexts , from business to mobile computing , and can be divided into a few common categories. 1. Network security 2. Application security 3. Information security 4. Operational security
  • 5. • Network security is the practice of securing a computer network from intruders , whether targeted attackers or opportunistic malware. • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage , well before a program or device is deployed. • Information security protects the integrity and privacy of data , both in storage and in transit. • Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the producers that
  • 6. TYPES OF CYBER THREATS • The threats countered by cyber-security are three-fold: • 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. • 2. Cyber-attack often involves politically motivated information gathering. • 3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
  • 7.
  • 8. PHISHING  Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.  It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine.
  • 9. PASSWORD ATTACKS A password attack refers to any of the various methods used to maliciously authenticate into password-protected accounts These attacks are typically facilitated through the use of software that expedites cracking or guessing passwords.
  • 10. DISTRIBUTED DENIAL OF SERVICE  DDoS (Distributed Denial of Service) is a category of malicious cyber-attacks that hackers or cybercriminals employ in order to make an online service, network resource or host machine unavailable to its intended users on the Internet.
  • 11. ROGUE SECURITY  Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer  Rogue security software mainly relies on social engineering (fraud) to defeat the security built into modern operating system and browser software and install itself onto victims' computers.
  • 12. MAN IN THE MIDDLE  A perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the man in the middle (MITM) attack is a general term for when a parties, making it appear as if a normal exchange of information is underway.
  • 13. DRIVE BY DOWNLOAD  A drive-by download refers to the unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.  The malicious code is designed to download malicious files onto the victim's PC without the user being aware that anything untoward has happened.
  • 14. MALVERTISING Malvertising is an attack in which perpetrators inject malicious code into legitimate online advertising networks. The code typically redirects users to malicious websites.
  • 15. MALWARE • Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks. • There are a number of different types of malware, including: • Virus: A self-replicating program that attaches itself to clean file and spreads throughout a computer system, infecting files with malicious code. • Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computer
  • 16. • Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details. • Ransomware: Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is paid. • Adware: Advertising software which can be used to spread malware. • Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission.
  • 17. BENEFITS FOR CYBER SECURITY • Valuable information protection. • Evade loss of crucial data. • Risk mitigation. • Privacy of customer and employee is ensured. • Recovery time is improved. • It will help us to browse the various websites securely. • It will defend us from hacks and virus.
  • 18. DISADVANTAGES OF CYBER SECURITY • Firewalls can be difficult to configure correctly. • Incorrectly configured firewalls may block users from performing certain actions on the internet , until the firewall configured correctly. • Makes the system slower than before. • Need to keep updating the new software in order to keep security up to date. • Lack of knowledge and not easy to use. • To use this special expertise required.