SlideShare a Scribd company logo
1 of 20
Introduction :
 The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
1
virus dissemination:
Malicious software that attaches itself to
other software. (virus, worms, Trojan Horse,
web jacking, e-mail bombing etc.)
2
Needof cyber security:
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
3
Major security problem:
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
4
Viruses & worms:
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
5
solution:
 Install a security suite that protects the
computer against threats such as viruses and
worms.
6
Malware:
 The word "malware" comes from the term
 "MALicious softWARE."
 Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
7
Hackers:
 In common a hacker is a person who
breaks into computers, usually by gaining
access to administrative controls.
8
DEFINING CYBER CRIME:
Crime committed using a computer and the
internet to steal data or information.
Illegal imports.
Malicious programs.
9
Types of Hackers:
 White Hat
Hacker
 Grey Hat Hacker
 Black Hat Hacker
10
Hacking:
Hacking in simple terms means an illegal
intrusion into a computer system and/or network.
11
How To prevent hacking:
 It may be impossible to prevent computer hacking,
however effective security controls including
strong passwords, and the use of firewalls can
helps.
12
Trojan Horses :
 Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
 These viruses are the
most serious threats
to computers
13
PasswordCracking:
 Password attacks are attacks by hackers that are able
to determine passwords or find passwords to
different protected electronic areas and social
network sites.
14
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
15
CYBERATTACK:
A malicious attempt, using digital
technologies, to cause personal or property
loss or damage, and/or steal or alter
confidential personal or organisational
data.
16
Scope of cyber security:
Techniques of threat and attack analysis
and mitigation
Protection and recovery technologies,
processes and procedures for individuals,
business and government
Policies, laws and regulation relevant to
the use of computers and the Internet
17
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
18
Cyber security

More Related Content

What's hot

10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information securityRashad Aliyev
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 

What's hot (18)

10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 

Viewers also liked

El grito de independencia
El grito de independenciaEl grito de independencia
El grito de independenciaMariana Delgado
 
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.Norbert Niemirski
 
Budget Presentation for Budget Managers
Budget Presentation for Budget Managers Budget Presentation for Budget Managers
Budget Presentation for Budget Managers Diana Antezana
 
3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin Hatfield3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin HatfieldDustin Hatfield
 
Angeles cobo segundo parcial
Angeles cobo segundo parcialAngeles cobo segundo parcial
Angeles cobo segundo parcialAngeles Cobo
 

Viewers also liked (9)

Likoni farming centre
Likoni farming centreLikoni farming centre
Likoni farming centre
 
The Rag Doll
The Rag DollThe Rag Doll
The Rag Doll
 
El grito de independencia
El grito de independenciaEl grito de independencia
El grito de independencia
 
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
 
Reforma Tributaria ADF
Reforma Tributaria ADFReforma Tributaria ADF
Reforma Tributaria ADF
 
Ppt ch07
Ppt ch07Ppt ch07
Ppt ch07
 
Budget Presentation for Budget Managers
Budget Presentation for Budget Managers Budget Presentation for Budget Managers
Budget Presentation for Budget Managers
 
3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin Hatfield3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin Hatfield
 
Angeles cobo segundo parcial
Angeles cobo segundo parcialAngeles cobo segundo parcial
Angeles cobo segundo parcial
 

Similar to Cyber security

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 

Similar to Cyber security (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cyber security
Cyber securityCyber security
Cyber security
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

More from Sajid Hasan

Digital differential analyzer
Digital differential analyzerDigital differential analyzer
Digital differential analyzerSajid Hasan
 
Rgb and Cmy color model
Rgb and Cmy color modelRgb and Cmy color model
Rgb and Cmy color modelSajid Hasan
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security AttacksSajid Hasan
 
Lcs & fractional knapsack
Lcs & fractional knapsackLcs & fractional knapsack
Lcs & fractional knapsackSajid Hasan
 
Bar chart, pie chart, histogram
Bar chart, pie chart, histogramBar chart, pie chart, histogram
Bar chart, pie chart, histogramSajid Hasan
 
Rangpur as a division in Bangladesh
Rangpur as a division in BangladeshRangpur as a division in Bangladesh
Rangpur as a division in BangladeshSajid Hasan
 
Basic array in c programming
Basic array in c programmingBasic array in c programming
Basic array in c programmingSajid Hasan
 

More from Sajid Hasan (11)

Digital differential analyzer
Digital differential analyzerDigital differential analyzer
Digital differential analyzer
 
Rgb and Cmy color model
Rgb and Cmy color modelRgb and Cmy color model
Rgb and Cmy color model
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Line coding
Line codingLine coding
Line coding
 
Plasmid
PlasmidPlasmid
Plasmid
 
Lcs & fractional knapsack
Lcs & fractional knapsackLcs & fractional knapsack
Lcs & fractional knapsack
 
Bar chart, pie chart, histogram
Bar chart, pie chart, histogramBar chart, pie chart, histogram
Bar chart, pie chart, histogram
 
Semiconductor
SemiconductorSemiconductor
Semiconductor
 
Rangpur as a division in Bangladesh
Rangpur as a division in BangladeshRangpur as a division in Bangladesh
Rangpur as a division in Bangladesh
 
Basic array in c programming
Basic array in c programmingBasic array in c programming
Basic array in c programming
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Cyber security

  • 1.
  • 2. Introduction :  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. 1
  • 3. virus dissemination: Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 2
  • 4. Needof cyber security:  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses. 3
  • 5. Major security problem:  Virus  Hacker  Malware  Trojan horses  Password cracking 4
  • 6. Viruses & worms:  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes 5
  • 7. solution:  Install a security suite that protects the computer against threats such as viruses and worms. 6
  • 8. Malware:  The word "malware" comes from the term  "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission. 7
  • 9. Hackers:  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls. 8
  • 10. DEFINING CYBER CRIME: Crime committed using a computer and the internet to steal data or information. Illegal imports. Malicious programs. 9
  • 11. Types of Hackers:  White Hat Hacker  Grey Hat Hacker  Black Hat Hacker 10
  • 12. Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network. 11
  • 13. How To prevent hacking:  It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps. 12
  • 14. Trojan Horses :  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers 13
  • 15. PasswordCracking:  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. 14
  • 16. Securing Password:  Use always Strong password.  Never use same password for two different sites. 15
  • 17. CYBERATTACK: A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organisational data. 16
  • 18. Scope of cyber security: Techniques of threat and attack analysis and mitigation Protection and recovery technologies, processes and procedures for individuals, business and government Policies, laws and regulation relevant to the use of computers and the Internet 17
  • 19. Securing Password:  Use always Strong password.  Never use same password for two different sites. 18