SlideShare a Scribd company logo
CYBER SECURITY
PRESENTED BY : Bhaliya Shital A.
Definition
Cyber security is the protection to defend internet-
connected devices and services from malicious attacks
by hackers, spammers, and cybercriminals.
Cyber security is a discipline that covers how to defend
devices and services from electronic attacks by
nefarious actors such as hackers, spammers, and
cybercriminals.
INTRODUCTION
Importance of cyber security : "Cybersecurity is crucial in safeguarding digital
assets, including personal information, financial data, and critical infrastructure,
from cyber threats such as hacking, malware, and data breaches.
Role of literature : "Literature serves as a reflection of society, capturing
human experiences, emotions, and ideas through storytelling.
INTRODUCTION
purpose of integration : "The
integration of cybersecurity and
literature aims to bridge disciplines,
providing insights into complex cyber
issues through the lens of storytelling.
It enhances understanding, fosters
interdisciplinary thinking, and
encourages creative approaches to
addressing cybersecurity challenges."
Relevance to audience : "The
integration of cybersecurity and
literature is relevant to the audience as
it offers new perspectives on
cybersecurity issues, connects to
everyday experiences with technology,
and encourages critical thinking about
digital security in a rapidly evolving
world."
literary themes in cyber security :
1. Betrayal trust
2. Deception
3. Identity
Betrayal and
trust :
• Betrayal and trust delve into the manipulation
of digital trust, mirroring themes in
literature. Cyberattacks exploit trust through
tactics like phishing, echoing literary narratives
of deception and loyalty.
Deception :
• Deception, a common theme in literature,
explores the complexities of truth and
falsehood. In cybersecurity, deception is
utilized by attackers through tactics like
phishing and social engineering to exploit
vulnerabilities. This theme highlights the
importance of skepticism and verification in
both literature and digital security.
Identity :
• The theme of identity in literature delves into
the exploration of self-awareness, authenticity,
and personal transformation. In cybersecurity,
protecting digital identity is paramount to
safeguarding personal information and
preventing identity theft.
Cyber security in literature example :
1. "1984 by George Orwell" : "1984" by George Orwell is a dystopian novel set in a totalitarian society
ruled by the oppressive Party led by Big Brother. It explores themes of surveillance, government
control, and the manipulation of truth. The novel follows protagonist Winston Smith as he rebels
against the Party's oppressive regime, highlighting the dangers of unchecked power and the erosion
of individual freedoms. "1984" remains a timeless warning about the dangers of authoritarianism and
the importance of defending personal liberty.
2. "Neuromancer by William Gibson" : "Neuromancer" by William Gibson is a groundbreaking
cyberpunk novel that explores a dystopian future where technology and virtual reality intertwine with
human consciousness. The story follows Case, a washed-up computer hacker, who is hired by a
mysterious employer for a dangerous heist in cyberspace. Set in a gritty, high-tech world,
"Neuromancer" explores themes of artificial intelligence, corporate power, and the blurring boundaries
between humans and machines. It's considered one of the seminal works of science fiction,
influencing the cyberpunk genre and shaping our understanding of the digital age.
literatures
impact on
cyber security
awareness :
• Literature's, particularly science fiction, plays a
pivotal role in shaping cyber security
awareness Through captivating narratives, it
illuminates the risks of cyber threats, sparking
dialogue and encouraging proactive measures to
protect digital assets.
Cyber safety tips - protect yourself against
cyberattacks
1. Update your software and
operating system : This
means you benefit from the
latest security patches.
2. Use anti-virus software :
Security solutions like
Kaspersky Total Security will
detect and removes threats.
Keep your software updated
for the best level of protection.
3. Use strong passwords :
Ensure your passwords are
not easily guessable.
4. Do not open email
attachments from unknown
senders : These could be
infected with malware.
5. Do not click on links in
emails from unknown
senders or unfamiliar
websites : This is a common
way that malware is spread.
6. Avoid using unsecure
WiFi networks in public
places : Unsecure networks
leave you vulnerable to man-
in-the-middle attacks.
THANK YOU

More Related Content

Similar to Cyber security and literature integration

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
Christina Ramirez
 
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
mbmh111980
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Balvant Biradar
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
jiyalouis
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
Desarae Veit
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
Olusegun Mosugu
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
assanesignate
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
graphhoc
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
MSR Buzz
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
Potato
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
Randi Lovelett
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 

Similar to Cyber security and literature integration (17)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 

Recently uploaded

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

Cyber security and literature integration

  • 1. CYBER SECURITY PRESENTED BY : Bhaliya Shital A.
  • 2. Definition Cyber security is the protection to defend internet- connected devices and services from malicious attacks by hackers, spammers, and cybercriminals. Cyber security is a discipline that covers how to defend devices and services from electronic attacks by nefarious actors such as hackers, spammers, and cybercriminals.
  • 3. INTRODUCTION Importance of cyber security : "Cybersecurity is crucial in safeguarding digital assets, including personal information, financial data, and critical infrastructure, from cyber threats such as hacking, malware, and data breaches. Role of literature : "Literature serves as a reflection of society, capturing human experiences, emotions, and ideas through storytelling.
  • 4. INTRODUCTION purpose of integration : "The integration of cybersecurity and literature aims to bridge disciplines, providing insights into complex cyber issues through the lens of storytelling. It enhances understanding, fosters interdisciplinary thinking, and encourages creative approaches to addressing cybersecurity challenges." Relevance to audience : "The integration of cybersecurity and literature is relevant to the audience as it offers new perspectives on cybersecurity issues, connects to everyday experiences with technology, and encourages critical thinking about digital security in a rapidly evolving world."
  • 5. literary themes in cyber security : 1. Betrayal trust 2. Deception 3. Identity
  • 6. Betrayal and trust : • Betrayal and trust delve into the manipulation of digital trust, mirroring themes in literature. Cyberattacks exploit trust through tactics like phishing, echoing literary narratives of deception and loyalty.
  • 7. Deception : • Deception, a common theme in literature, explores the complexities of truth and falsehood. In cybersecurity, deception is utilized by attackers through tactics like phishing and social engineering to exploit vulnerabilities. This theme highlights the importance of skepticism and verification in both literature and digital security.
  • 8. Identity : • The theme of identity in literature delves into the exploration of self-awareness, authenticity, and personal transformation. In cybersecurity, protecting digital identity is paramount to safeguarding personal information and preventing identity theft.
  • 9. Cyber security in literature example : 1. "1984 by George Orwell" : "1984" by George Orwell is a dystopian novel set in a totalitarian society ruled by the oppressive Party led by Big Brother. It explores themes of surveillance, government control, and the manipulation of truth. The novel follows protagonist Winston Smith as he rebels against the Party's oppressive regime, highlighting the dangers of unchecked power and the erosion of individual freedoms. "1984" remains a timeless warning about the dangers of authoritarianism and the importance of defending personal liberty. 2. "Neuromancer by William Gibson" : "Neuromancer" by William Gibson is a groundbreaking cyberpunk novel that explores a dystopian future where technology and virtual reality intertwine with human consciousness. The story follows Case, a washed-up computer hacker, who is hired by a mysterious employer for a dangerous heist in cyberspace. Set in a gritty, high-tech world, "Neuromancer" explores themes of artificial intelligence, corporate power, and the blurring boundaries between humans and machines. It's considered one of the seminal works of science fiction, influencing the cyberpunk genre and shaping our understanding of the digital age.
  • 10. literatures impact on cyber security awareness : • Literature's, particularly science fiction, plays a pivotal role in shaping cyber security awareness Through captivating narratives, it illuminates the risks of cyber threats, sparking dialogue and encouraging proactive measures to protect digital assets.
  • 11. Cyber safety tips - protect yourself against cyberattacks 1. Update your software and operating system : This means you benefit from the latest security patches. 2. Use anti-virus software : Security solutions like Kaspersky Total Security will detect and removes threats. Keep your software updated for the best level of protection. 3. Use strong passwords : Ensure your passwords are not easily guessable. 4. Do not open email attachments from unknown senders : These could be infected with malware. 5. Do not click on links in emails from unknown senders or unfamiliar websites : This is a common way that malware is spread. 6. Avoid using unsecure WiFi networks in public places : Unsecure networks leave you vulnerable to man- in-the-middle attacks.