SlideShare a Scribd company logo
1 of 32
CYBER SECURITY AND
ATTACKS
PRESENTED BY:
Fatima Noor Malik
Rana Shehriyar
Muhammad Tayyab Farooq
INTRODUCTION
 the term cyber security is used to refer to the security
offered through online services to protect your online
information
 With an increasing amount of people getting connected to
internet, the security threats that cause massive harm are
increasing also
HISTORY
 The first cyber crime was
recorded in the year 1820.
 The first spam email took place
in 1978 when it was sent over
the Arpanet.
 The first Virus was installed on
an Apple Computer in 1982
What is the
meaning of the
word cyber
What is the need of
cyber security
What are the
security
problems in
cyber field
How to implement
and maintain
security of a cyber
field around us.
TO UNDERSTAND
Meaning of the word CYBER
It is a combining form relating to information
technology, the internet and virtual reality
Need of cyber security
Cyber security is
necessary since it helps
in securing data from
threats such as data
theft and misuse, also
safeguards your system
from viruses
Types of ATTACKS
 MAN IN THE MIDDLE ATTACK
 D-DOS ATTACK
 DOS ATTACK
 SQL INJECTON
 XSS ATTACK
 SOCIAL ENGINEERING
 PHISHING
Major security problems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses and Worms
A Virus is a "program that
is loaded into your
computer without your
knowledge and runs
against your wishes
SOLUTION
Install a security
suite that protects
the computer
against threats such
as viruses and
worms.
Hackers
In common a hacker is
a person who breaks
into computers,
usually by gaining
access to
administrative
controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to
prevent computer
hacking, however
effective security
controls including
strong passwords, and
the use of firewalls can
helps.
Malware
 The word "malware"
comes from the term
"MALicious softWARE "
 Malware is any software
that infects and damages a
computer system without
the owner's knowledge or
permission
To Stop Malware
Download an anti-malware
program that also helps
prevent infections.
Activate Network Threat
Protection, Firewall,
Antivirus
Trojan Horses
Trojan horses are email
viruses that can duplicate
themselves, steal
information, or harm the
computer system.
These viruses are the most
serious threats to computers
How to Avoid Trojan
Security suites, such as
Avast Internet Security, will
prevent you from
downloading Trojan Horses
Password Cracking
Password attacks are
attacks by hackers that are
able to determine
passwords or find
passwords to different
protected electronic areas
and social network sites.
Securing Password
 Use always Strong password.
 Never use same password for two different sites
PREVENTIVE/SECURE MEASURES
 Use antivirus software.
 Turn on the firewalls.
 Uninstall unnecessary software.
 Using the SSL certificates installed
on the server.
 Using servers -SSH (secure
method).
 Updating software updates.
 Avoid spyware/malware.
ADVANTAGES OF CYBER SECURITY
Protects the computers against virus,
worms and malware.
Protects against the data from theft
Increase in cyber defense
Increases the security
We can browse the safe website
Increase in cyber speed
Protects networks and resources
DISADVANTAGES OF CRIMES SECURITY
 Makes the system slower than before.
 Firewalls would be difficult to configure correctly.
 Huge amount of loss in money for the banks,
companies etc
 Huge amount of data loss occurs in the database
 Access to different accounts with gained
information
Facts about cyber crime
 Cyber crime has become an increasingly
severe problem in Pakistan in recent
years. Financial fraud is the most
common type reported; in 2020, of
84,764 total complaints, 20,218
Pakistanis reported falling victim to
financial fraud-related online crimes.
This is ahead of hacking (7966), cyber
harassment (6023) and cyber defamation
(6004).
 An increasing number of Pakistanis
have experienced cyber crime through
social media. Between 2018-2021,
financial fraud through social media
increased by 83%. Of 102,356 complaints
received in 2021, 23% of cyber crimes
CONCLUSION
 Cyber security and
cyber crimes are two
sides of the coin
 Cyber crimes are the
ones which cannot be
completely eradicated
but can be prevented
using the cyber
Security
CYBER SECURITY
CYBER SECURITY

More Related Content

Similar to CYBER SECURITY

Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 

Similar to CYBER SECURITY (20)

Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

CYBER SECURITY

  • 2. PRESENTED BY: Fatima Noor Malik Rana Shehriyar Muhammad Tayyab Farooq
  • 3. INTRODUCTION  the term cyber security is used to refer to the security offered through online services to protect your online information  With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also
  • 4. HISTORY  The first cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982
  • 5. What is the meaning of the word cyber What is the need of cyber security What are the security problems in cyber field How to implement and maintain security of a cyber field around us. TO UNDERSTAND
  • 6. Meaning of the word CYBER It is a combining form relating to information technology, the internet and virtual reality
  • 7. Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft and misuse, also safeguards your system from viruses
  • 8. Types of ATTACKS  MAN IN THE MIDDLE ATTACK  D-DOS ATTACK  DOS ATTACK  SQL INJECTON  XSS ATTACK  SOCIAL ENGINEERING  PHISHING
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 15. Viruses and Worms A Virus is a "program that is loaded into your computer without your knowledge and runs against your wishes
  • 16. SOLUTION Install a security suite that protects the computer against threats such as viruses and worms.
  • 17. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 18. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  • 19. How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 20. Malware  The word "malware" comes from the term "MALicious softWARE "  Malware is any software that infects and damages a computer system without the owner's knowledge or permission
  • 21. To Stop Malware Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus
  • 22. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 23. How to Avoid Trojan Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses
  • 24. Password Cracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 25. Securing Password  Use always Strong password.  Never use same password for two different sites
  • 26. PREVENTIVE/SECURE MEASURES  Use antivirus software.  Turn on the firewalls.  Uninstall unnecessary software.  Using the SSL certificates installed on the server.  Using servers -SSH (secure method).  Updating software updates.  Avoid spyware/malware.
  • 27. ADVANTAGES OF CYBER SECURITY Protects the computers against virus, worms and malware. Protects against the data from theft Increase in cyber defense Increases the security We can browse the safe website Increase in cyber speed Protects networks and resources
  • 28. DISADVANTAGES OF CRIMES SECURITY  Makes the system slower than before.  Firewalls would be difficult to configure correctly.  Huge amount of loss in money for the banks, companies etc  Huge amount of data loss occurs in the database  Access to different accounts with gained information
  • 29. Facts about cyber crime  Cyber crime has become an increasingly severe problem in Pakistan in recent years. Financial fraud is the most common type reported; in 2020, of 84,764 total complaints, 20,218 Pakistanis reported falling victim to financial fraud-related online crimes. This is ahead of hacking (7966), cyber harassment (6023) and cyber defamation (6004).  An increasing number of Pakistanis have experienced cyber crime through social media. Between 2018-2021, financial fraud through social media increased by 83%. Of 102,356 complaints received in 2021, 23% of cyber crimes
  • 30. CONCLUSION  Cyber security and cyber crimes are two sides of the coin  Cyber crimes are the ones which cannot be completely eradicated but can be prevented using the cyber Security