SlideShare a Scribd company logo
CYBER SECURITY
AND
DATA PROTECTION
By
Dr. Hemant Kumar Singh
Associate Professor & Head,
Deptt. of Computer Science & Engineering
INDEX
INTRODUCTION
IMPORTANCE/NEED OF CYBER SECURITY
SECURITY THREATS TO DATA
THREATS AND SOLUTIONS
CYBER LAW
IT ACT 2000/2008
CONCLUSION
Digital Era
Today we are living in digital era
Internet is used today-
 Booking hotels
 Ordering foods
 Booking cabs
Big data is generating today that is stored on cloud on huge data
servers or data centers
Array of devices used to access data stored on cloud.
For Hackers it is golden edge
A lot of access point, IP addresses.
Introduction
 Cyber security is the practice of protecting information and data from
outside sources on the Internet. Cyber security professionals provide
protection for networks, servers, intranets and computer systems.
 It also ensures that only authorized people have access to that
information.
 Cyber is related to the technology which contains systems, network
and programs or data. Whereas security related to the protection
which includes systems security, network security and application
and information security.
Why is cyber security important?
 Cyber security is necessary since it helps in securing data from threats
such as data theft or misuse, also safeguards your system from viruses.
 We all live in a world which is networked together, from internet
banking to government infrastructure, where data is stored on
computers and other devices. A portion of that data can be sensitive
information, whether that be intellectual property, financial data,
personal information, or other types of data for which unauthorized
access or exposure could have negative consequences.
 Cyber-attack is now an international concern and has given many
concerns that hacks and other security attacks could endanger the
global economy. Organizations transmit sensitive data across
networks and to other devices in the course of doing businesses,
and cyber security describes to protect that information and the
systems used to process or store it.
History
 1969- A professor in UCLA sent a message to standard research
institute.
 1970-Robert Thomson created first virus namely CREEPER
I am CREEPER Catch me if you can
Antivirus for creeper was PREEPER
 1986-Rassian used cyber power as weapons
 1988-American scientestist created program to check size of
internet
 After that we people started working on cyber security.
Security Goals(CIA)
 Confidentiality: No unauthorized access
 Integrity: What you sent,
received without alter
 Availability: 24X7 Access availability to authorized user
use encryption
HELLO HELLO
Cyber Threats
INTRUDER
Malware
Phishing
Password
Attacks
Man in
Middle
attack
DDOS
Trapdoors
Logic
bombs
Spoof
Macro
Virus
Malware
 The word "malware" comes from the term "MALicious softWARE“.
 Code with malicious intends steals data and destroys data from
computer eg. Trojan, Virus, Bombs
 To Stop Malware:
 Download an anti-malware program that also helps prevent
infections.
 Activate Network Threat Protection, Firewall, Antivirus.
Virus & Worms
 A piece of software that are designed to spread one computer to another
. Almost all viruses are executable files. A virus can spread using
 Network
 Disk
 File sharing
 Email attachments
 VLC download
Mail
Virus
Attachment
 Worms are piece of malware program that replicates and spreads
one computer to another. It spreads to itself to connected computers.
 Solution: Install a security suite that protects the computer against
threats such as viruses and worms.
Mail
WORM
(I LOVE YOU)2K
Trojan Horse
 Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
 It tricks user to running it behind the trusted program
 These viruses are the most serious threats to computers.
How to Avoid Trojans?
 Security suites, such as Avast Internet Security,
will prevent you from downloading trojan Horses.
Phishing
 Phishing attacks are sent in e mail and said by user to click on it
 Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
Password Attack
DDOS
Logic Bombs
Logic bombs attacks on system on specific condition
Eg. Saturday @10 o’clock
Trapdoors
Secret entry point in to a program that allows to gain access
system without using security access procedure.
Android – google can enter
Spoofing
Spoofing is often the way a bad actor gains access in order to execute a
larger cyber attack . E mail spoofing,Caller id spoof,Website spoof
DNS Spoofing
Man in Middle attack
Macro virus
Not created in any programming languages
Cyber Law
 Cyber Law is the law governing cyber space.
 Cyber space includes computers, networks, software's, data storage devices (such
as hard disks, USB disks etc), the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Law Deals with
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
IT ACT 2000
 The Information Technology Act, 2000 (IT Act), came into force on 17
October 2000.
 The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records with the
Government.
 Information Technology Act 2000 consisted of 94 sections segregated
into 13 chapters.
 To provide legal recognition for transactions
 To facilitate electronic filing of documents with the Government
agencies.
IT ACT 2000
Important Cyber Law Provisions in India
Offence Section under IT Act
 Tampering with Computer source documents
(with out the permission of in charge) Sec.43
 Hacking with Computer systems, Data alteration Sec.66
 Publishing obscene information Sec.67
 Un-authorized access to protected system Sec.70
 Breach of Confidentiality and Privacy Sec.72
 Publishing false digital signature certificates Sec.73
 Sending threatening & Defamatory messages by email
Sec 503 & 499 IPC
 Forgery of electronic records Sec 463 IPC
 Bogus websites, cyber frauds Sec 420 IPC
 Email spoofing & Abuse Sec 463 & 500 IPC
 Web-Jacking Sec 383 IPC
 Online sale of Drugs NDPS Act
 Online sale of Arms Arms Act
If any person uses a computer or system network without
permission of the owner or any other person who is in charge &
Access, download, Copy any data from such computer
 Introduces Computer Virus into any computer.
 Damages any computer network or computer.
Changes Account Settings.
Punishment
He shall be liable to pay damages by the way of compensation not
exceeding 1 Crore to affected person
Eg.-Section 43
Amendment IT ACT 2008
The IT Act 2008 has been notified on October 27, 2009
ITA-2008, is a new version of IT Act 2000
Provides additional focus on Information Security.
Added several new sections on offences including Cyber Terrorism and
Data Protection.
 124 sections and 14 chapters
Data Protection
 Personal data is any information relating to you, whether it relates
to your private, professional, or public life.
 Data protection means you should be able to decide whether or not
you want to share some information, who has access to it, for how
long, for what reason.
 The Data Protection Act 2018 controls how your personal
information is used by organizations, businesses or the government.
 Under the Data Protection Act 2018, you have the right to find out
what information the government and other organisations store
about you.
Conclusion
 In this presentation covers cyber security and information security as
well. Further we came to learn what is the need and history of it.
 Next, we learn about threats which are harmful for the data and system
and also came to know about their solutions.
 Finally cyber law and related acts and its sections and brief
introduction about the data protection.
Thinkbeforeyouclick.
THANK YOU

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
Prashant Sharma
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Vasundhara Singh Gautam
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Computer security
Computer securityComputer security
Computer security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 

Similar to Cyber security & Data Protection

Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
KajalSingh970833
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
BWUBTS19022
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
RobertBhattarai
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
ShailendraPandey96
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
windows21
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
KarthikShivanand
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
AashiGupta46
 
Cyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxCyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptx
BhulanDeb
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 

Similar to Cyber security & Data Protection (20)

Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxCyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from Dr. Hemant Kumar Singh

Datascience
DatascienceDatascience
Engineers day
Engineers dayEngineers day
Engineers day
Dr. Hemant Kumar Singh
 
Data science
Data scienceData science
Ubuntu(Linux)
Ubuntu(Linux)Ubuntu(Linux)
Ubuntu(Linux)
Dr. Hemant Kumar Singh
 
Efficient approach for website design ppt
Efficient approach for website design pptEfficient approach for website design ppt
Efficient approach for website design ppt
Dr. Hemant Kumar Singh
 
SMS CISCO Networking Academy
SMS CISCO Networking AcademySMS CISCO Networking Academy
SMS CISCO Networking Academy
Dr. Hemant Kumar Singh
 

More from Dr. Hemant Kumar Singh (6)

Datascience
DatascienceDatascience
Datascience
 
Engineers day
Engineers dayEngineers day
Engineers day
 
Data science
Data scienceData science
Data science
 
Ubuntu(Linux)
Ubuntu(Linux)Ubuntu(Linux)
Ubuntu(Linux)
 
Efficient approach for website design ppt
Efficient approach for website design pptEfficient approach for website design ppt
Efficient approach for website design ppt
 
SMS CISCO Networking Academy
SMS CISCO Networking AcademySMS CISCO Networking Academy
SMS CISCO Networking Academy
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 

Cyber security & Data Protection

  • 1. CYBER SECURITY AND DATA PROTECTION By Dr. Hemant Kumar Singh Associate Professor & Head, Deptt. of Computer Science & Engineering
  • 2. INDEX INTRODUCTION IMPORTANCE/NEED OF CYBER SECURITY SECURITY THREATS TO DATA THREATS AND SOLUTIONS CYBER LAW IT ACT 2000/2008 CONCLUSION
  • 3.
  • 4. Digital Era Today we are living in digital era Internet is used today-  Booking hotels  Ordering foods  Booking cabs Big data is generating today that is stored on cloud on huge data servers or data centers Array of devices used to access data stored on cloud. For Hackers it is golden edge A lot of access point, IP addresses.
  • 5. Introduction  Cyber security is the practice of protecting information and data from outside sources on the Internet. Cyber security professionals provide protection for networks, servers, intranets and computer systems.  It also ensures that only authorized people have access to that information.
  • 6.  Cyber is related to the technology which contains systems, network and programs or data. Whereas security related to the protection which includes systems security, network security and application and information security.
  • 7. Why is cyber security important?  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.  We all live in a world which is networked together, from internet banking to government infrastructure, where data is stored on computers and other devices. A portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.
  • 8.  Cyber-attack is now an international concern and has given many concerns that hacks and other security attacks could endanger the global economy. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describes to protect that information and the systems used to process or store it.
  • 9. History  1969- A professor in UCLA sent a message to standard research institute.  1970-Robert Thomson created first virus namely CREEPER I am CREEPER Catch me if you can Antivirus for creeper was PREEPER  1986-Rassian used cyber power as weapons  1988-American scientestist created program to check size of internet  After that we people started working on cyber security.
  • 10. Security Goals(CIA)  Confidentiality: No unauthorized access  Integrity: What you sent, received without alter  Availability: 24X7 Access availability to authorized user use encryption HELLO HELLO
  • 12. Malware  The word "malware" comes from the term "MALicious softWARE“.  Code with malicious intends steals data and destroys data from computer eg. Trojan, Virus, Bombs  To Stop Malware:  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 13. Virus & Worms  A piece of software that are designed to spread one computer to another . Almost all viruses are executable files. A virus can spread using  Network  Disk  File sharing  Email attachments  VLC download Mail Virus Attachment
  • 14.  Worms are piece of malware program that replicates and spreads one computer to another. It spreads to itself to connected computers.  Solution: Install a security suite that protects the computer against threats such as viruses and worms. Mail WORM (I LOVE YOU)2K
  • 15. Trojan Horse  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  It tricks user to running it behind the trusted program  These viruses are the most serious threats to computers. How to Avoid Trojans?  Security suites, such as Avast Internet Security, will prevent you from downloading trojan Horses.
  • 16. Phishing  Phishing attacks are sent in e mail and said by user to click on it
  • 17.  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Securing Password:  Use always Strong password.  Never use same password for two different sites. Password Attack
  • 18. DDOS
  • 19. Logic Bombs Logic bombs attacks on system on specific condition Eg. Saturday @10 o’clock
  • 20. Trapdoors Secret entry point in to a program that allows to gain access system without using security access procedure. Android – google can enter
  • 21. Spoofing Spoofing is often the way a bad actor gains access in order to execute a larger cyber attack . E mail spoofing,Caller id spoof,Website spoof DNS Spoofing
  • 22. Man in Middle attack
  • 23. Macro virus Not created in any programming languages
  • 24. Cyber Law  Cyber Law is the law governing cyber space.  Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Cyber Law Deals with  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy
  • 25. IT ACT 2000  The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.  To provide legal recognition for transactions  To facilitate electronic filing of documents with the Government agencies.
  • 26. IT ACT 2000 Important Cyber Law Provisions in India Offence Section under IT Act  Tampering with Computer source documents (with out the permission of in charge) Sec.43  Hacking with Computer systems, Data alteration Sec.66  Publishing obscene information Sec.67  Un-authorized access to protected system Sec.70  Breach of Confidentiality and Privacy Sec.72  Publishing false digital signature certificates Sec.73
  • 27.  Sending threatening & Defamatory messages by email Sec 503 & 499 IPC  Forgery of electronic records Sec 463 IPC  Bogus websites, cyber frauds Sec 420 IPC  Email spoofing & Abuse Sec 463 & 500 IPC  Web-Jacking Sec 383 IPC  Online sale of Drugs NDPS Act  Online sale of Arms Arms Act
  • 28. If any person uses a computer or system network without permission of the owner or any other person who is in charge & Access, download, Copy any data from such computer  Introduces Computer Virus into any computer.  Damages any computer network or computer. Changes Account Settings. Punishment He shall be liable to pay damages by the way of compensation not exceeding 1 Crore to affected person Eg.-Section 43
  • 29. Amendment IT ACT 2008 The IT Act 2008 has been notified on October 27, 2009 ITA-2008, is a new version of IT Act 2000 Provides additional focus on Information Security. Added several new sections on offences including Cyber Terrorism and Data Protection.  124 sections and 14 chapters
  • 30. Data Protection  Personal data is any information relating to you, whether it relates to your private, professional, or public life.  Data protection means you should be able to decide whether or not you want to share some information, who has access to it, for how long, for what reason.  The Data Protection Act 2018 controls how your personal information is used by organizations, businesses or the government.  Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.
  • 31. Conclusion  In this presentation covers cyber security and information security as well. Further we came to learn what is the need and history of it.  Next, we learn about threats which are harmful for the data and system and also came to know about their solutions.  Finally cyber law and related acts and its sections and brief introduction about the data protection.

Editor's Notes

  1. o