2. Contents
Introduction
Cyber Security
Ethical hacking
Types of Hacker
Digital Forensics
Scope of Cyber Security
Conclusion
Interactive session
3. Introduction
With the game up for cyber threats and hackers, organizations and their employees
should take a step ahead to deal with them. As we like to connect everything to the
internet, this also increases the chances of vulnerabilities, breaches, and flaws.
Attackers are now using more sophisticated techniques to target the systems.
Individuals, small-scale businesses, or large organizations are all being impacted. So, all
these firms, whether IT or non-IT firms, have understood the importance of Cyber
Security and focusing on adopting all possible measures to deal with cyber threats.
4. Cyber Security
Cyber Security is the process and techniques involved in protecting sensitive data, computer
systems, networks, and software applications from cyber attacks. The Cyber attacks are general
terminology that covers a large number of topics, but some of the popular are:
• Tampering systems and data stored within
• Exploitation of resources
• Unauthorized access to the targeted system and accessing sensitive information
• Disrupting the normal functioning of the business and its processes
• Using ransomware attacks to encrypt data and extort money from victims
5. Ethical Hacking
Ethical Hacking is defined as any form of hacking that is authorized
by the owner of the target system. It can also refer to the process of
taking active security measures to defend systems from hackers
with malicious intentions on data privacy.
7. WHITE HAT HACKER
Perform Ethical Hacking
Have Knowledge on Hacking and Hacker tool set
Locate security weakness and implement countermeasures
Also known as penetration tester
Securing and protecting IT system
8. BLACK HAT HACKER
Perform unethical hacking
Are Criminals hackers and crackers
Use their skill for malicious purpose
Focus on cracking and data stealing
9. GREY HAT HACKER
Are hybrid between white and black hat hacker
Sometimes hack illegally or not
gray hat hacking is considered illegal
Hired by officials both gets benifited
10. Digital Forensics
Digital forensics is the branch of forensic science that deals with the identification and recovery of
digital evidence from the crime scene
BRANCHES:
Mobile forensics
Computer forensics
Database forensics
Network forensics
12. Conclusion
As cyber attackers continue to exploit gaps and introduce new threats and vulnerabilities,
teachers, parents and students must also equip themselves
Cyber security is one of the most important aspects of the fast-paced growing digital
world.