3. INTRODUCTION
the term cyber security is used to refer to the security
offered through online services to protect your online
information
With an increasing amount of people getting connected to
internet, the security threats that cause massive harm are
increasing also
4. HISTORY
The first cyber crime was
recorded in the year 1820.
The first spam email took place
in 1978 when it was sent over
the Arpanet.
The first Virus was installed on
an Apple Computer in 1982
5. What is the
meaning of the
word cyber
What is the need of
cyber security
What are the
security
problems in
cyber field
How to implement
and maintain
security of a cyber
field around us.
TO UNDERSTAND
6. Meaning of the word CYBER
It is a combining form relating to information
technology, the internet and virtual reality
7. Need of cyber security
Cyber security is
necessary since it helps
in securing data from
threats such as data
theft and misuse, also
safeguards your system
from viruses
8. Types of ATTACKS
MAN IN THE MIDDLE ATTACK
D-DOS ATTACK
DOS ATTACK
SQL INJECTON
XSS ATTACK
SOCIAL ENGINEERING
PHISHING
19. How To prevent hacking
It may be impossible to
prevent computer
hacking, however
effective security
controls including
strong passwords, and
the use of firewalls can
helps.
20. Malware
The word "malware"
comes from the term
"MALicious softWARE "
Malware is any software
that infects and damages a
computer system without
the owner's knowledge or
permission
21. To Stop Malware
Download an anti-malware
program that also helps
prevent infections.
Activate Network Threat
Protection, Firewall,
Antivirus
22. Trojan Horses
Trojan horses are email
viruses that can duplicate
themselves, steal
information, or harm the
computer system.
These viruses are the most
serious threats to computers
23. How to Avoid Trojan
Security suites, such as
Avast Internet Security, will
prevent you from
downloading Trojan Horses
24. Password Cracking
Password attacks are
attacks by hackers that are
able to determine
passwords or find
passwords to different
protected electronic areas
and social network sites.
25. Securing Password
Use always Strong password.
Never use same password for two different sites
26. PREVENTIVE/SECURE MEASURES
Use antivirus software.
Turn on the firewalls.
Uninstall unnecessary software.
Using the SSL certificates installed
on the server.
Using servers -SSH (secure
method).
Updating software updates.
Avoid spyware/malware.
27. ADVANTAGES OF CYBER SECURITY
Protects the computers against virus,
worms and malware.
Protects against the data from theft
Increase in cyber defense
Increases the security
We can browse the safe website
Increase in cyber speed
Protects networks and resources
28. DISADVANTAGES OF CRIMES SECURITY
Makes the system slower than before.
Firewalls would be difficult to configure correctly.
Huge amount of loss in money for the banks,
companies etc
Huge amount of data loss occurs in the database
Access to different accounts with gained
information
29. Facts about cyber crime
Cyber crime has become an increasingly
severe problem in Pakistan in recent
years. Financial fraud is the most
common type reported; in 2020, of
84,764 total complaints, 20,218
Pakistanis reported falling victim to
financial fraud-related online crimes.
This is ahead of hacking (7966), cyber
harassment (6023) and cyber defamation
(6004).
An increasing number of Pakistanis
have experienced cyber crime through
social media. Between 2018-2021,
financial fraud through social media
increased by 83%. Of 102,356 complaints
received in 2021, 23% of cyber crimes
30. CONCLUSION
Cyber security and
cyber crimes are two
sides of the coin
Cyber crimes are the
ones which cannot be
completely eradicated
but can be prevented
using the cyber
Security