Cyber Security
Action against cyber crime
Presented by:
MD. Abdur Rahman
Dept of CSE
What is cyber
security?
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to
minimize the number of successful cyber security attacks.
 Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered via
the Internet by cyber criminals.
 Though, cyber security is important for network, data and
application security.
What is cyber
security?
 Communication security-protecting organization
communication media , technology , and content.
 Network security-is the protection of networking
components, connection and content.
 Information security-protection of information and its
critical elements , including the systems and hardware
that use , store or transmit that information.
What is cyber crime?
 The former descriptions were "computer crime",
"computer-related crime" or "crime by computer". With
the pervasion of digital technology, some new terms
like "high-technology" or "information-age" crime
were added to the definition. Also, Internet brought
other new terms, like "cybercrime" and "net" crime.
 Other forms include "digital", "electronic", "virtual" ,
"IT", "high-tech" and technology-enabled" crime .
History
 The first recorded cyber crime was recorded in the
year 1820.
 The first spam email took place in 1978 when it
was sent over the Arpanet.
 The first Virus was installed on an Apple
Computer in 1982.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Why should we care?
 It is a criminal activity committed on the internet.
 Cyber crime-Where computer is either a tool or
target or both.
How can we protect?
 Read Privacy policy carefully when you submit the
data through internet.
 Encryption: lots of website uses SSL (secure
socket layer)to encrypt a data.
 Disable remote connectivity.
Advantage of cyber security
 It will defend from hacks and virus.
 The application of cyber security used in our PC
needs update every week.
 The security developers will update their database
every week once. Hence the new virus also
deleted.
Safety tips …
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal
information unless required
Conclusion
 The only system which is truly secure is one
which is switched off and unplugged.
 So , only way to be safe is Pay attention and
Act smart.
THANK YOU
For Watching MY
Presentation……

Cyber Security

  • 1.
    Cyber Security Action againstcyber crime Presented by: MD. Abdur Rahman Dept of CSE
  • 2.
    What is cyber security? Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 3.
    What is cyber security? Communication security-protecting organization communication media , technology , and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
  • 4.
    What is cybercrime?  The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.  Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .
  • 5.
    History  The firstrecorded cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.
  • 6.
    Cyber crimes includes Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 7.
    Why should wecare?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.
  • 8.
    How can weprotect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 9.
    Advantage of cybersecurity  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 10.
    Safety tips … Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 11.
    Conclusion  The onlysystem which is truly secure is one which is switched off and unplugged.  So , only way to be safe is Pay attention and Act smart.
  • 12.
    THANK YOU For WatchingMY Presentation……