SlideShare a Scribd company logo
o Introduction
o Definition
o History
o Major cyber security issues
o Cyber security aspects
o Cyber hygiene
o Conclusion
o preventative methods used to protect information
from being stolen, compromised or attacked.
o requires an understanding of potential information
threats,
such as Viruses and other malicious code.
1989 -Robert Morris –first computer worm.
• Phishing and identity theft
• Ads, apps and other security
breaches
Computer
as a target
• Online predators
• Terrorism through social networking
or websites
Computer
as a
weapon
o Hacking
o Denial of service attack
o Virus dissemination
o Computer vandalism
o Cyber terrorism
o Child pornography
o Software piracy
o Illegal intrusion into a computer System or
network.
Denial of service
attack:
o Act by the criminal, who floods the bandwidth of
the victims network
o Sending spam mails that deprives him of services
o Malicious software that attaches itself to the
other software
o Examples: Trojan horse, virus, worms, web
jacking,
email bombing etc.,
Computer vandalism:
o Damaging or destroying the system data
rather than stealing
o Transmitting malwares
o Use of internet based attacks in terrorist
activities
o Techno-savvy terrorist are using a 512-bit
encryption
which is highly impossible to decrypt.
Film Influence:
o Theft of software through the illegal
copying of genuine programs
o Distribution of products intended to
pass for the original
o Information Security
o Network Security
o System Security
o Application Security
o Database Security
o Language Security
o Protect us from critical attacks
o Browse the safe website
o Internet security processes
o Using Antivirus Soft wares
o Excess usage may affect system
o Install firewall & Pop-up blocks
o Smart passwords keep you from becoming extinct
online.
o Too much of anything is good for nothing.
o Be careful before you share anything.
o Technology is destructive only in the
hands of
some people who do not realize that
they are
one and same process as the
universe
Presented by
Shivaani Srinivas ,
Bsc (Biotechnology)
Roll.No:15btu061
Thanks for watching my
presentation.
Any questions ?

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
Niloy Biswas
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 

Viewers also liked

Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?
Feer Fuentes
 
Perifericos de salida
Perifericos de salidaPerifericos de salida
Perifericos de salida
brayan quispe
 
Year 8 Rock - Squire SQUC
Year 8 Rock - Squire SQUCYear 8 Rock - Squire SQUC
Year 8 Rock - Squire SQUC
christen Squire
 
What is Damaging Power
What is Damaging PowerWhat is Damaging Power
What is Damaging Power
ThorTechnologies
 
Nidia peña actividad1_2mapac.pdf
Nidia peña actividad1_2mapac.pdfNidia peña actividad1_2mapac.pdf
Nidia peña actividad1_2mapac.pdf
Nidia Janeth Peña Bello
 
The economist
The economistThe economist
Perifricos mixtos
Perifricos mixtosPerifricos mixtos
Perifricos mixtos
brayan quispe
 
Investment Presentation
Investment PresentationInvestment Presentation
Investment PresentationMesfin Ayenew
 
Sijo Sunny Portfolio
Sijo Sunny PortfolioSijo Sunny Portfolio
Sijo Sunny PortfolioSijo Sunny
 
Ceo report
Ceo reportCeo report
Dissertation Final PDF
Dissertation Final PDFDissertation Final PDF
Dissertation Final PDFArsalan Javaid
 
Smart Protect4
Smart Protect4Smart Protect4
Smart Protect4
ThorTechnologies
 
Software
SoftwareSoftware
Software
brayan quispe
 

Viewers also liked (20)

Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?Transgénicos ¿alimentos beneficiosos o nocivos?
Transgénicos ¿alimentos beneficiosos o nocivos?
 
P Lauriano Stiehm Press BizBash
P Lauriano Stiehm Press BizBashP Lauriano Stiehm Press BizBash
P Lauriano Stiehm Press BizBash
 
Perifericos de salida
Perifericos de salidaPerifericos de salida
Perifericos de salida
 
Year 8 Rock - Squire SQUC
Year 8 Rock - Squire SQUCYear 8 Rock - Squire SQUC
Year 8 Rock - Squire SQUC
 
Srinivas Resume
Srinivas ResumeSrinivas Resume
Srinivas Resume
 
What is Damaging Power
What is Damaging PowerWhat is Damaging Power
What is Damaging Power
 
Nidia peña actividad1_2mapac.pdf
Nidia peña actividad1_2mapac.pdfNidia peña actividad1_2mapac.pdf
Nidia peña actividad1_2mapac.pdf
 
The economist
The economistThe economist
The economist
 
Perifricos mixtos
Perifricos mixtosPerifricos mixtos
Perifricos mixtos
 
Resume bilingual 2016
Resume bilingual 2016Resume bilingual 2016
Resume bilingual 2016
 
Investment Presentation
Investment PresentationInvestment Presentation
Investment Presentation
 
Sijo Sunny Portfolio
Sijo Sunny PortfolioSijo Sunny Portfolio
Sijo Sunny Portfolio
 
Exhibit_Designs
Exhibit_DesignsExhibit_Designs
Exhibit_Designs
 
Ceo report
Ceo reportCeo report
Ceo report
 
AOMP_APRIL_2016_S
AOMP_APRIL_2016_SAOMP_APRIL_2016_S
AOMP_APRIL_2016_S
 
CV_Zine Lynda
CV_Zine LyndaCV_Zine Lynda
CV_Zine Lynda
 
Dissertation Final PDF
Dissertation Final PDFDissertation Final PDF
Dissertation Final PDF
 
Certificates
CertificatesCertificates
Certificates
 
Smart Protect4
Smart Protect4Smart Protect4
Smart Protect4
 
Software
SoftwareSoftware
Software
 

Similar to Cyber security

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Fraz Ali
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aashir Khalil
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 

Similar to Cyber security (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 

Recently uploaded (20)

Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 

Cyber security

  • 1.
  • 2. o Introduction o Definition o History o Major cyber security issues o Cyber security aspects o Cyber hygiene o Conclusion
  • 3. o preventative methods used to protect information from being stolen, compromised or attacked. o requires an understanding of potential information threats, such as Viruses and other malicious code.
  • 4. 1989 -Robert Morris –first computer worm.
  • 5.
  • 6. • Phishing and identity theft • Ads, apps and other security breaches Computer as a target • Online predators • Terrorism through social networking or websites Computer as a weapon
  • 7. o Hacking o Denial of service attack o Virus dissemination o Computer vandalism o Cyber terrorism o Child pornography o Software piracy
  • 8. o Illegal intrusion into a computer System or network. Denial of service attack: o Act by the criminal, who floods the bandwidth of the victims network o Sending spam mails that deprives him of services
  • 9. o Malicious software that attaches itself to the other software o Examples: Trojan horse, virus, worms, web jacking, email bombing etc., Computer vandalism: o Damaging or destroying the system data rather than stealing o Transmitting malwares
  • 10. o Use of internet based attacks in terrorist activities o Techno-savvy terrorist are using a 512-bit encryption which is highly impossible to decrypt. Film Influence:
  • 11. o Theft of software through the illegal copying of genuine programs o Distribution of products intended to pass for the original
  • 12. o Information Security o Network Security o System Security o Application Security o Database Security o Language Security
  • 13. o Protect us from critical attacks o Browse the safe website o Internet security processes
  • 14. o Using Antivirus Soft wares o Excess usage may affect system o Install firewall & Pop-up blocks
  • 15. o Smart passwords keep you from becoming extinct online.
  • 16.
  • 17. o Too much of anything is good for nothing. o Be careful before you share anything.
  • 18. o Technology is destructive only in the hands of some people who do not realize that they are one and same process as the universe
  • 19. Presented by Shivaani Srinivas , Bsc (Biotechnology) Roll.No:15btu061 Thanks for watching my presentation. Any questions ?

Editor's Notes

  1. 10 YEARS AGO: Face book, twitter, instagram, drop box didn’t exist. 20 YEARS AGO: There were only 130 websites totally, Google wasn’t around yet, and you have to pay for an email account through ISP. 30 YEARS AGO: There was no internet at all. NOW WHERE WE ARE????????