SlideShare a Scribd company logo
Six weeks summer training 2018
Cyber Security (Ethical Hacking)
Submitted by
Sudhanshu Chaurasia
Reg No - 11614772
Cyber Security
Cybersecurity is the protection of internet-connected systems
including hardware, software and data from cyberattacks. The
term cyber security is used to refer to the security offered
through online services to protect our information.
With an increasing population getting connected to internet,
security threats which causes harm are also increasing.
The Meaning of word CYBER
 The combination of information
technology, the internet and
virtual world is called cyber space.
 Cyber space has no physical form
it exist virtually.
Need of cyber security
 With increase in user of internet,
securing privacy, securing data and
credentials are necessary there
cyber security comes in play which
look up to these things.
 In modern technology everything is
only one click away which needs to
be secure to only authentic person.
Major security problems
 Virus, Malwares
 Misuse of privileges
 Hackers
 Identity theft
 Phishing
Virus malware and trojan horses
 A virus is a program that is loaded in computer without user’s knowledge
and runs against his wishes.
 Malwares are malicious software that damages and infects system without
owner’s knowledge and permission.
 Trojan horses are email viruses that can replicate itself and steals the
user’s private information.
Ways to prevent Virus malware
and trojan horses
 Install a security suite (Antivirus) that protects the computer
against these threats.
 Activate network threat protection and firewall of operating
system.
 Use of only secured and authentic software.
 Use software of reliable source.
 Blocking the suspicious emails and links.
 Use of anti malware program.
Hackers
 In common words hacker is a person who breaks into the system
and gain the administrative controls.
 There are 3 types of hackers
1) White hat hacker
2) Black hat hacker
3) Grey hat hacker
Identity theft and phishing
 Identity theft is the deliberate use of someone else’s
identity. Usually in this method imposter get hold of
person’s credential information such as credit/debit card
details, financial details and person information. It is also
known as identity fraud.
 Phishing is a method to steal personal account credentials.
This targets the person by email, text message and some
fake copy of website and tricks them and gather the
information of targeted person.
Conclusion
 I hope this presentation will be helpful for my audience to
improve their knowledge and awareness. And it might be
helpful for prevent and overcoming these problems.
THANK YOU

More Related Content

What's hot

What's hot (20)

Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber security (ethical hacking)

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similar to Cyber security (ethical hacking) (20)

What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 

Cyber security (ethical hacking)

  • 1. Six weeks summer training 2018 Cyber Security (Ethical Hacking) Submitted by Sudhanshu Chaurasia Reg No - 11614772
  • 2. Cyber Security Cybersecurity is the protection of internet-connected systems including hardware, software and data from cyberattacks. The term cyber security is used to refer to the security offered through online services to protect our information. With an increasing population getting connected to internet, security threats which causes harm are also increasing.
  • 3. The Meaning of word CYBER  The combination of information technology, the internet and virtual world is called cyber space.  Cyber space has no physical form it exist virtually.
  • 4. Need of cyber security  With increase in user of internet, securing privacy, securing data and credentials are necessary there cyber security comes in play which look up to these things.  In modern technology everything is only one click away which needs to be secure to only authentic person.
  • 5. Major security problems  Virus, Malwares  Misuse of privileges  Hackers  Identity theft  Phishing
  • 6. Virus malware and trojan horses  A virus is a program that is loaded in computer without user’s knowledge and runs against his wishes.  Malwares are malicious software that damages and infects system without owner’s knowledge and permission.  Trojan horses are email viruses that can replicate itself and steals the user’s private information.
  • 7. Ways to prevent Virus malware and trojan horses  Install a security suite (Antivirus) that protects the computer against these threats.  Activate network threat protection and firewall of operating system.  Use of only secured and authentic software.  Use software of reliable source.  Blocking the suspicious emails and links.  Use of anti malware program.
  • 8. Hackers  In common words hacker is a person who breaks into the system and gain the administrative controls.  There are 3 types of hackers 1) White hat hacker 2) Black hat hacker 3) Grey hat hacker
  • 9. Identity theft and phishing  Identity theft is the deliberate use of someone else’s identity. Usually in this method imposter get hold of person’s credential information such as credit/debit card details, financial details and person information. It is also known as identity fraud.  Phishing is a method to steal personal account credentials. This targets the person by email, text message and some fake copy of website and tricks them and gather the information of targeted person.
  • 10. Conclusion  I hope this presentation will be helpful for my audience to improve their knowledge and awareness. And it might be helpful for prevent and overcoming these problems. THANK YOU