Presented by Sapna Patil
OUTLINE…
 What is cyber crime?
 What is Cyber Security?
 Why is Cyber Security Important?
 Major security problems
 Who is getting attacked?
 Safety tips
 Prons
 Cons
 conclusion
WHAT IS CYBER CRIME?
 to steal data
 disadvantages of internet.
 illegal activity.
WHAT IS CYBER SECURITY?
 information technology security
 Protecting from unauthorized access
WHY IS CYBER SECURITY IMPORTANT?
 Cyber attacks
 To safeguard national security
 Digital spying
 misuse
MAJOR SECURITY PROBLEMS
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Safety tips:
•Use antivirus software
•Insert firewalls , pop up blocker
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Use secure connection
•Open attachments carefully
•Use strong passwords
PROS:
 Defend- hacks and virus.
 The application of cyber security used in our PC needs update every week.
 new virus also deleted.
CONS:
 Interconnected computers.
 Improved viruses, malware and worms.
 Increase in “cyber warfare” possibly.
 More anonymity between hackers.
CONCLUSION
 it will be helpful
 emerging security threats are explained
 Simple and practical prevention methods are
explained
ANY QUESTIONS ??
Cyber security

Cyber security

  • 1.
  • 2.
    OUTLINE…  What iscyber crime?  What is Cyber Security?  Why is Cyber Security Important?  Major security problems  Who is getting attacked?  Safety tips  Prons  Cons  conclusion
  • 3.
    WHAT IS CYBERCRIME?  to steal data  disadvantages of internet.  illegal activity.
  • 4.
    WHAT IS CYBERSECURITY?  information technology security  Protecting from unauthorized access
  • 5.
    WHY IS CYBERSECURITY IMPORTANT?  Cyber attacks  To safeguard national security  Digital spying  misuse
  • 6.
    MAJOR SECURITY PROBLEMS Virus  Hacker  Malware  Trojan horses  Password cracking
  • 8.
    Safety tips: •Use antivirussoftware •Insert firewalls , pop up blocker •Uninstall unnecessary software •Maintain backup •Check security settings •Use secure connection •Open attachments carefully •Use strong passwords
  • 9.
    PROS:  Defend- hacksand virus.  The application of cyber security used in our PC needs update every week.  new virus also deleted.
  • 10.
    CONS:  Interconnected computers. Improved viruses, malware and worms.  Increase in “cyber warfare” possibly.  More anonymity between hackers.
  • 11.
    CONCLUSION  it willbe helpful  emerging security threats are explained  Simple and practical prevention methods are explained
  • 12.