SlideShare a Scribd company logo
INTRODUCTION
Cyber crime is an
activity done using
computers and
internet. We can say
that it is an unlawful
acts wherein the
computer either a tool
or target or both.
“Cyber crime encompasses any
criminal act dealing with
computers and networks (called
hacking). Additionally, cyber
crime also includes traditional
crimes conducted through the
Internet.”
What is a Cyber Security?
 ‘Cyber security is the body of
technologies, processes and
practices designed to protect
networks, computers, programs and
data from attack, damage or
unauthorized’
Categories of cyber crime
We can categorize cyber crime in two ways.
 The computer as a target :- using a
computer to attacks other computer, e.g.
Hacking, virus/worms attacks, Dos attack
etc.
 The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud etc.
Why Cyber Security is needed ?
For Securing:
 Information
 Information System
 Maintain individual privacy
 Etc…
Syllabus
 UNIT-1
 Introduction to information systems,
Types of information Systems,
Development of Information Systems,
Introduction to information security, Need
for Information security, Threats to
Information Systems, Information
Assurance, Cyber Security, and Security
Risk Analysis.
 UNIT-2
 Application security (Database, E-mail and
Internet), Data Security Considerations-
Backups, Archival Storage and Disposal of
Data, Security Technology-Firewall and VPNs,
Intrusion Detection, Access Control.
 Security Threats -Viruses, Worms, Trojan
Horse, Bombs, Trapdoors, Spoofs, E-mail
viruses, Macro viruses, Malicious Software,
Network and Denial of Services Attack,
Security Threats to E-Commerce-
 Electronic Payment System, e-Cash,
Credit/Debit Cards. Digital Signature, public
Key Cryptography
 UNIT-3
 Developing Secure Information Systems,
Application Development Security,
Information Security Governance & Risk
Management, Security Architecture &
Design
 Security Issues in Hardware, Data Storage
& Downloadable Devices, Physical
Security of IT Assets, Access Control,
CCTV and intrusion Detection Systems,
Backup Security Measures.
 UNIT-4
 Security Policies, Why Policies should be
developed, WWW policies, Email Security
policies, Policy Review Process-Corporate
policies-Sample Security Policies,
Publishing and Notification Requirement of
the Policies.
 Information Security Standards-ISO, IT
Act, Copyright Act, Patent Law, IPR. Cyber
Laws in India; IT
 Act 2000 Provisions, Intellectual Property
Law: Copy Right Law, Software License,
Semiconductor Law and Patent Law.
Information System
 IS – a set of interrelated components
working together to collect, retrieve,
process, store, and distribute information
for the purpose of control, coordination,
analysis, and decision making in business
organizations
What is an Information
System
Organized combination of
1. Hardware
2. Software
3. Communications Networks
4. Data
5. People
Types of Information
Systems
History Before Usage of IS
 In the 70s, businessmen used a manual
system to run their business
History Before Usage of IS
 They used traditional filling systems to keep
track of their daily transactions.
History Before Usage of IS
 This cause them delays in making decisions
and in planning strategies.
The Usage of Information
Systems
1. Management Information System
(MIS)
2. Transaction Processing System (TPS)
3. Decision Support System (DSS)
4. Executive Information System (EIS)
5. Expert System (ES)
Objective 1
 The usage of Management Information
System (MIS).
Management Information System
(MIS)
 Used to provide regular information about
the daily activities of a business to the
manager
Management Information System
(MIS)
 Help managers make the business
processes and activities more efficient
compared to doing them manually.
Management Information System
(MIS)
 MIS  Manual Systems
Objective 2
 The usage of Transaction Processing
System (TPS)
Transaction Processing System
(TPS)
 Used to record business transactions.
Information and Communication Technology [Form 5]
Transaction Processing System
(TPS)
 Keep track of daily transactions in a
database.
Objective 3
 The usage of Decision Support System
(DSS).
Decision Support System
(DSS)
 Provide managers with information to
make the best decisions.
Information and Communication Technology [Form 5]
Decision Support System
(DSS)
 Most Decision Support System report are
in the form of charts and diagrams.
Objective 4
 The usage of Executive Information
System (EIS).
Executive Information System
(EIS)
 Helps top-level management to plan
strategies.
Executive Information System
(EIS)
 Used to forecast future trends.
Objective 5
 The usage of Expert System (ES).
Expert System(ES)
 Used to store knowledge and make logical
suggestions for the user.
Expert System(ES)
 Expert system users can be professionals
like doctors and scantiest.
Expert System(ES)
 An expert System can suggest conditions
and estimate the probability of having
illness.
Cyber security

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
Vamsee Krishna Kiran
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
cyber security
cyber securitycyber security
cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Viewers also liked

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
Paul McGillicuddy
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
UX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesUX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and Archives
Ned Potter
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of Cyberspace
Amnon Carmel
 
Cyber crime
Cyber crimeCyber crime
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
Symantec
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
isc2-hellenic
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
Cyber Security Infotech
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
wajug
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
Habib Siddiqui
 
Cyber security
Cyber securityCyber security
Cyber security
mody10
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
Altoros
 

Viewers also liked (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
UX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesUX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and Archives
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of Cyberspace
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
 

Similar to Cyber security

INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMS
Jennifer De Julio
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
cyber security notes
cyber security notescyber security notes
cyber security notes
SHIKHAJAIN163
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Editor IJCATR
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
GogoOmolloFrancis
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
I0516064
I0516064I0516064
I0516064
IOSR Journals
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
Aleeza Aziz
 
Security management.pptx
Security management.pptxSecurity management.pptx
Security management.pptx
AhmadUsman79
 
Management information system unit v
Management information system unit vManagement information system unit v
Management information system unit v
panibatla neeta
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
Libcorpio
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
AjayKumar73315
 
information of system technology
information of system technologyinformation of system technology
information of system technology
bilal anjum
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
STUDY2BCA
 
ITB - UNIT 1.pdf
ITB - UNIT 1.pdfITB - UNIT 1.pdf
ITB - UNIT 1.pdf
SOMASUNDARAM T
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 

Similar to Cyber security (20)

INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMS
 
Information security
Information securityInformation security
Information security
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
I0516064
I0516064I0516064
I0516064
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
 
Security management.pptx
Security management.pptxSecurity management.pptx
Security management.pptx
 
Management information system unit v
Management information system unit vManagement information system unit v
Management information system unit v
 
It
ItIt
It
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
 
ITB - UNIT 1.pdf
ITB - UNIT 1.pdfITB - UNIT 1.pdf
ITB - UNIT 1.pdf
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 

Recently uploaded

J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 

Recently uploaded (20)

J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

Cyber security

  • 1.
  • 2. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 3. “Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.”
  • 4. What is a Cyber Security?  ‘Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized’
  • 5. Categories of cyber crime We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud etc.
  • 6. Why Cyber Security is needed ? For Securing:  Information  Information System  Maintain individual privacy  Etc…
  • 7. Syllabus  UNIT-1  Introduction to information systems, Types of information Systems, Development of Information Systems, Introduction to information security, Need for Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis.
  • 8.  UNIT-2  Application security (Database, E-mail and Internet), Data Security Considerations- Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control.  Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious Software, Network and Denial of Services Attack, Security Threats to E-Commerce-  Electronic Payment System, e-Cash, Credit/Debit Cards. Digital Signature, public Key Cryptography
  • 9.  UNIT-3  Developing Secure Information Systems, Application Development Security, Information Security Governance & Risk Management, Security Architecture & Design  Security Issues in Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets, Access Control, CCTV and intrusion Detection Systems, Backup Security Measures.
  • 10.  UNIT-4  Security Policies, Why Policies should be developed, WWW policies, Email Security policies, Policy Review Process-Corporate policies-Sample Security Policies, Publishing and Notification Requirement of the Policies.  Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT  Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law.
  • 11. Information System  IS – a set of interrelated components working together to collect, retrieve, process, store, and distribute information for the purpose of control, coordination, analysis, and decision making in business organizations
  • 12. What is an Information System Organized combination of 1. Hardware 2. Software 3. Communications Networks 4. Data 5. People
  • 14. History Before Usage of IS  In the 70s, businessmen used a manual system to run their business
  • 15. History Before Usage of IS  They used traditional filling systems to keep track of their daily transactions.
  • 16. History Before Usage of IS  This cause them delays in making decisions and in planning strategies.
  • 17. The Usage of Information Systems 1. Management Information System (MIS) 2. Transaction Processing System (TPS) 3. Decision Support System (DSS) 4. Executive Information System (EIS) 5. Expert System (ES)
  • 18. Objective 1  The usage of Management Information System (MIS).
  • 19. Management Information System (MIS)  Used to provide regular information about the daily activities of a business to the manager
  • 20. Management Information System (MIS)  Help managers make the business processes and activities more efficient compared to doing them manually.
  • 21. Management Information System (MIS)  MIS  Manual Systems
  • 22. Objective 2  The usage of Transaction Processing System (TPS)
  • 23. Transaction Processing System (TPS)  Used to record business transactions. Information and Communication Technology [Form 5]
  • 24. Transaction Processing System (TPS)  Keep track of daily transactions in a database.
  • 25. Objective 3  The usage of Decision Support System (DSS).
  • 26. Decision Support System (DSS)  Provide managers with information to make the best decisions. Information and Communication Technology [Form 5]
  • 27. Decision Support System (DSS)  Most Decision Support System report are in the form of charts and diagrams.
  • 28. Objective 4  The usage of Executive Information System (EIS).
  • 29. Executive Information System (EIS)  Helps top-level management to plan strategies.
  • 30. Executive Information System (EIS)  Used to forecast future trends.
  • 31. Objective 5  The usage of Expert System (ES).
  • 32. Expert System(ES)  Used to store knowledge and make logical suggestions for the user.
  • 33. Expert System(ES)  Expert system users can be professionals like doctors and scantiest.
  • 34. Expert System(ES)  An expert System can suggest conditions and estimate the probability of having illness.