Cyber Security
The Present World Threat
1. Mahir Faysal 2015-2-55-0281. Mahir Faysal 2015-2-55-028
2. Md. Mohiuddin Murad 2015-2-55-0272. Md. Mohiuddin Murad 2015-2-55-027
3.Md. Jahirul Islam3.Md. Jahirul Islam 2015-2-55-0082015-2-55-008
4. Sadia Islam 2015-2-55-0204. Sadia Islam 2015-2-55-020
5. Md. Sagir Ahmed5. Md. Sagir Ahmed 2014-1-55-0382014-1-55-038
Presented ByPresented By
CONTENTS
INTRODUCTION ABOUT CYBER SECURITY
DESCRIPTION
TYPES OF ATTACKS
SECURITY/PREVENTIVE MEASURES
ADVANTAGES
DISADVANTAGES
CONCLUSION
Cyber Security:
 Cyber security is the body of technologies, processes and
practices designed to protect networks, computers, programs and
data from attack, damage or unauthorized access.
 With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm are
increasing also.
 It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Need of cyber security
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
 Ransomware
Viruses and Worms
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Solution
 Install a security suite that protects the computer
against threats such as viruses and worms.
Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
 Download an anti-malware
program that also
helps prevent infections.
 Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
How to Avoid Password Cracking
Murad 302Murad 302
EncryptionEncryption
203 daruM203 daruM
DecryptionDecryption
Murad 302Murad 302
Ransomware & Present Cyber
Security Situation in Bangladesh
Ransomware :
Malware that locks out computer and demands a ransom (payment) in exchange for
access.
Recent Attact
Bangladesh e-Government Computer Incident Response Team
Cyber Security Is Everyone’sCyber Security Is Everyone’s
ResponsibilityResponsibility
Cyber Security Strategy – Bangladesh
• Security Policy, Legal Framework
– ICT Act, 2006.
– Digital Security Act 2016(Amendment) Bill, 2016 – Data Protection &
Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
ADVANTAGES OF CYBER SECURITY
PROTECTS THE COMPUTERS AGAINST
VIRUS,WORMS AND MALWARE.
PROTECTS AGAINST THE DATA FROM THEFT
INCREASE IN CYBER DEFENSE
INCREASES THE SECURITY
WE CAN BROWSE THE SAFE WEBSITE
INCREASE IN CYBER SPEED
PROTECTS NETWORKS AND RESOURCES
DIS ADVANTAGES OF CYBER CRIMES
MAKES THE SYSTEM SLOWER THAN BEFORE.
FIREWALLS WOULD BE DIFFICULT TO CONFIGURE
CORRECTLY.
HUGE AMOUNT OF LOSS IN MONEY FOR THE
BANKS,COMPANIES ETC
HUGE AMOUNT OF DATA LOSS OCCURS IN THE
DATABASE
Conclusion
The only system which is truly secure is one
which is switched off and unplugged.
So , only way to be safe is Pay attention and
Act smart.
Cyber Security in Bangladesh
Cyber Security in Bangladesh

Cyber Security in Bangladesh

  • 1.
    Cyber Security The PresentWorld Threat 1. Mahir Faysal 2015-2-55-0281. Mahir Faysal 2015-2-55-028 2. Md. Mohiuddin Murad 2015-2-55-0272. Md. Mohiuddin Murad 2015-2-55-027 3.Md. Jahirul Islam3.Md. Jahirul Islam 2015-2-55-0082015-2-55-008 4. Sadia Islam 2015-2-55-0204. Sadia Islam 2015-2-55-020 5. Md. Sagir Ahmed5. Md. Sagir Ahmed 2014-1-55-0382014-1-55-038 Presented ByPresented By
  • 2.
    CONTENTS INTRODUCTION ABOUT CYBERSECURITY DESCRIPTION TYPES OF ATTACKS SECURITY/PREVENTIVE MEASURES ADVANTAGES DISADVANTAGES CONCLUSION
  • 3.
    Cyber Security:  Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 4.
     It isa combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 5.
    Need of cybersecurity Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 6.
    Major security problems Virus  Hacker  Malware  Trojan horses  Password cracking  Ransomware
  • 7.
    Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 8.
    Solution  Install asecurity suite that protects the computer against threats such as viruses and worms.
  • 10.
    Hackers In common ahacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11.
    Types of Hackers WhiteHat Hacker Grey Hat Hacker Black Hat Hacker
  • 12.
    How To preventhacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 13.
    Malware The word "malware"comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 14.
    To Stop Malware Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 15.
    Trojan Horses Trojan horsesare email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 16.
    How to AvoidTrojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 17.
    Password Cracking Password attacksare attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 18.
    How to AvoidPassword Cracking Murad 302Murad 302 EncryptionEncryption 203 daruM203 daruM DecryptionDecryption Murad 302Murad 302
  • 19.
    Ransomware & PresentCyber Security Situation in Bangladesh Ransomware : Malware that locks out computer and demands a ransom (payment) in exchange for access.
  • 20.
  • 21.
    Bangladesh e-Government ComputerIncident Response Team
  • 22.
    Cyber Security IsEveryone’sCyber Security Is Everyone’s ResponsibilityResponsibility
  • 23.
    Cyber Security Strategy– Bangladesh • Security Policy, Legal Framework – ICT Act, 2006. – Digital Security Act 2016(Amendment) Bill, 2016 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  • 25.
    ADVANTAGES OF CYBERSECURITY PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE. PROTECTS AGAINST THE DATA FROM THEFT INCREASE IN CYBER DEFENSE INCREASES THE SECURITY WE CAN BROWSE THE SAFE WEBSITE INCREASE IN CYBER SPEED PROTECTS NETWORKS AND RESOURCES
  • 26.
    DIS ADVANTAGES OFCYBER CRIMES MAKES THE SYSTEM SLOWER THAN BEFORE. FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY. HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE
  • 27.
    Conclusion The only systemwhich is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart.