SlideShare a Scribd company logo
Power Point Presentation On
“Cyber Security”
Submitted By:- Rahul Kirtoniya
Department: CSE-7th
Sem
Subject: Cyber Security
Subject Code: PEC-CS702E
University Roll No: 11800121032
Content
 Introduction
 Categories of Cyber crime
 Types of Cyber crime
 Types of Security tools
 Advantage of Cybersecurity
 Safety tips to Cyber crime
 References
Introduction
Cybersecurity is the practice of protecting computer
systems, networks, and data from cyber threats such as
malware, phishing, and hacking. It ensures confidentiality,
integrity, and availability of information while using tools
like firewalls, encryption, and employee training to
safeguard against attacks. Constant vigilance is crucial as
cyber threats continue to evolve.
The CIA TRIAD of information security
The CIA Triad of information
security: Confidentiality (protecting
data from unauthorized access),
Integrity (ensuring data accuracy and
consistency), and Availability
(ensuring data and systems are
accessible when needed).
Security & Privacy
Security: Protecting data and systems from
unauthorized access and cyber threats.
Privacy: Respecting individuals' rights by
safeguarding personal data from misuse or
disclosure. Both crucial for a secure and
trustworthy digital environment
Categories of Cyber Crime
 Cyber Fraud
 Hacking and Unauthorized Access
 Malware
 Cyber Espionage
 Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
 Cyber Stalking and Harassment
 Online Scams
 Data Breaches
 Cyber Extortion
 Cyberbullying
 Online Child Exploitation
Principles of Computer Security
 Least Privilege
 Defense in Depth
 Patch Management
 Authentication and Authorization
 Secure Configuration
 Encryption
 Intrusion Detection and Prevention
 Incident Response
 Social Engineering Awareness
 Physical Security
Types of Cyber Crime
 Cyber Fraud
 Hacking and Unauthorized Access
 Malware (e.g., viruses, worms, ransomware)
 Cyber Espionage
 Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
 Phishing and Identity Theft
 Online Scams and Fraud
 Data Breaches and Information Theft
 Cyber Extortion
 Cyberbullying and Online Harassment
 Social Engineering Attacks
 Online Child Exploitation and Child Pornography
 Intellectual Property Theft and Piracy
Types of Security Tools
 Antivirus Software
 Firewalls
 Intrusion Detection Systems (IDS)
 Encryption Tools
 Virtual Private Network (VPN)
 Multi-Factor Authentication (MFA)
 Password Managers
 Web Application Firewalls (WAF)
 SSL/TLS Certificates
 Network Scanners
 Data Loss Prevention (DLP) Software
 Security Information and Event Management (SIEM) Software
 Penetration Testing Tools
 Mobile Device Management (MDM) Software
Advantages of Cyber Security
 Protects sensitive data
 Mitigates cyber attacks
 Ensures business continuity
 Builds trust and reputation
 Enables legal compliance
 Prevents financial loss
 Safeguards critical infrastructure
 Enhances national security
 Protects personal privacy
 Prevents identity theft
 Secures digital transactions
 Combats cyberbullying
Safety Tips to Cyber Crime
• Use strong, unique passwords and enable MFA.
• Be cautious with emails and avoid clicking on suspicious links.
• Keep software and devices updated.
• Avoid using public Wi-Fi for sensitive transactions.
• Limit personal information shared on social media.
• Regularly back up important data.
• Be skeptical of online offers and deals that seem too good to be true.
• Stay informed about the latest cyber threats and best practices.
• Secure devices with passwords and security features.
• Install antivirus software and enable firewalls.
References
www.wikipedia.org
www.avtest.org
www.billmullins.com
www.digit/forum.com
www.antivirusnews.com
- Thank You -

More Related Content

Similar to Cyber Security

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Secninjaz Technologies LLP
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
rahulbhardwaj312501
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
Taniya Fansupkar
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
arjunnegi34
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slide
Md. Ismiel Hossen Abir
 
Security in it
Security in it Security in it
Security in it
Yoshan madhumal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
himanshuratnama
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sabiha M
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdf
chanduvarma019
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
AnupmaMunshi
 

Similar to Cyber Security (20)

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slide
 
Security in it
Security in it Security in it
Security in it
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

Cyber Security

  • 1. Power Point Presentation On “Cyber Security” Submitted By:- Rahul Kirtoniya Department: CSE-7th Sem Subject: Cyber Security Subject Code: PEC-CS702E University Roll No: 11800121032
  • 2. Content  Introduction  Categories of Cyber crime  Types of Cyber crime  Types of Security tools  Advantage of Cybersecurity  Safety tips to Cyber crime  References
  • 3. Introduction Cybersecurity is the practice of protecting computer systems, networks, and data from cyber threats such as malware, phishing, and hacking. It ensures confidentiality, integrity, and availability of information while using tools like firewalls, encryption, and employee training to safeguard against attacks. Constant vigilance is crucial as cyber threats continue to evolve.
  • 4. The CIA TRIAD of information security The CIA Triad of information security: Confidentiality (protecting data from unauthorized access), Integrity (ensuring data accuracy and consistency), and Availability (ensuring data and systems are accessible when needed).
  • 5. Security & Privacy Security: Protecting data and systems from unauthorized access and cyber threats. Privacy: Respecting individuals' rights by safeguarding personal data from misuse or disclosure. Both crucial for a secure and trustworthy digital environment
  • 6. Categories of Cyber Crime  Cyber Fraud  Hacking and Unauthorized Access  Malware  Cyber Espionage  Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks  Cyber Stalking and Harassment  Online Scams  Data Breaches  Cyber Extortion  Cyberbullying  Online Child Exploitation
  • 7. Principles of Computer Security  Least Privilege  Defense in Depth  Patch Management  Authentication and Authorization  Secure Configuration  Encryption  Intrusion Detection and Prevention  Incident Response  Social Engineering Awareness  Physical Security
  • 8. Types of Cyber Crime  Cyber Fraud  Hacking and Unauthorized Access  Malware (e.g., viruses, worms, ransomware)  Cyber Espionage  Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks  Phishing and Identity Theft  Online Scams and Fraud  Data Breaches and Information Theft  Cyber Extortion  Cyberbullying and Online Harassment  Social Engineering Attacks  Online Child Exploitation and Child Pornography  Intellectual Property Theft and Piracy
  • 9. Types of Security Tools  Antivirus Software  Firewalls  Intrusion Detection Systems (IDS)  Encryption Tools  Virtual Private Network (VPN)  Multi-Factor Authentication (MFA)  Password Managers  Web Application Firewalls (WAF)  SSL/TLS Certificates  Network Scanners  Data Loss Prevention (DLP) Software  Security Information and Event Management (SIEM) Software  Penetration Testing Tools  Mobile Device Management (MDM) Software
  • 10. Advantages of Cyber Security  Protects sensitive data  Mitigates cyber attacks  Ensures business continuity  Builds trust and reputation  Enables legal compliance  Prevents financial loss  Safeguards critical infrastructure  Enhances national security  Protects personal privacy  Prevents identity theft  Secures digital transactions  Combats cyberbullying
  • 11. Safety Tips to Cyber Crime • Use strong, unique passwords and enable MFA. • Be cautious with emails and avoid clicking on suspicious links. • Keep software and devices updated. • Avoid using public Wi-Fi for sensitive transactions. • Limit personal information shared on social media. • Regularly back up important data. • Be skeptical of online offers and deals that seem too good to be true. • Stay informed about the latest cyber threats and best practices. • Secure devices with passwords and security features. • Install antivirus software and enable firewalls.