SlideShare a Scribd company logo
Presented by:-
Ayesha Javed
 Inroduction
 Defination
 The security offered through on-line services
to protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats
that cause massive harm are increasing also.
 Cyber security or information
technology security
 The techniques of protecting
 Computers
 Networks
 programs and data from unauthorized
access or attacks that are aimed for
exploitation. ...
 Cyber security is the protection of computer
systems from
 theft or damage to their hardware, software
or electronic data, as well as from disruption
or misdirection of the services they provide.
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
 Taking some simple actions and practising
safe behaviours will reduce online threats.
 Move away from using UNSUPPORTED
software
 Always DOWNLOAD AND INSTALL the latest
software and app updates
 RUN up-to-date ANTI-VIRUS SOFTWARE
 Use Strong Password
 DELETE suspicious Emails and Avoid clicking
on unknown attachments or LINKS
 Back up your DATA
 Train tour staff to be CYBER AWARE
 Manage security relationships with supplier
and partners
Cyber security Information security
Cyber security Information security
Cyber security Information security

More Related Content

What's hot

Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
Parth Makadiya
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 

What's hot (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber security
cyber securitycyber security
cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber security Information security

CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
Info-Tech
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
KRISHNARAJ207
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Home
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
online Marketing
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
20ArnavKumar8F
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
RavirajChavan10
 
Cyber security
Cyber securityCyber security
Cyber security
RavikantGautam8
 
Cyber security
Cyber securityCyber security
Cyber security
RIPPER95
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
Vamshi963187
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
ANURAGYADAV265
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
SoftwareDeals
 
cyber security-v4 slide for training purposes
cyber security-v4 slide for training purposescyber security-v4 slide for training purposes
cyber security-v4 slide for training purposes
ssuser250038
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
SejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
RahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 

Similar to Cyber security Information security (20)

CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
cyber security-v4 slide for training purposes
cyber security-v4 slide for training purposescyber security-v4 slide for training purposes
cyber security-v4 slide for training purposes
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from AYESHA JAVED

Neural network basic
Neural network basicNeural network basic
Neural network basic
AYESHA JAVED
 
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHYJOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
AYESHA JAVED
 
The recommendations system for source code components retrieval
The recommendations system for source code components retrievalThe recommendations system for source code components retrieval
The recommendations system for source code components retrieval
AYESHA JAVED
 
Jhon dewey __final document........#######____@@@ayesha javed
Jhon dewey  __final document........#######____@@@ayesha javedJhon dewey  __final document........#######____@@@ayesha javed
Jhon dewey __final document........#######____@@@ayesha javed
AYESHA JAVED
 
Normalization
NormalizationNormalization
Normalization
AYESHA JAVED
 
Lecture for 10 oct 2019 sentence types-workshop
Lecture for 10 oct 2019  sentence types-workshopLecture for 10 oct 2019  sentence types-workshop
Lecture for 10 oct 2019 sentence types-workshop
AYESHA JAVED
 
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
AYESHA JAVED
 
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
AYESHA JAVED
 
This is an empirical study of industry practice in the management of softwar...
This is an empirical study of  industry practice in the management of softwar...This is an empirical study of  industry practice in the management of softwar...
This is an empirical study of industry practice in the management of softwar...
AYESHA JAVED
 
Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...
AYESHA JAVED
 
A strand lead to success in project management
A strand lead to success in project managementA strand lead to success in project management
A strand lead to success in project management
AYESHA JAVED
 
PETROL SYSTEM
PETROL SYSTEMPETROL SYSTEM
PETROL SYSTEM
AYESHA JAVED
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
AYESHA JAVED
 
Eclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATIONEclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATION
AYESHA JAVED
 
Moore and mealy machines
Moore and mealy machinesMoore and mealy machines
Moore and mealy machines
AYESHA JAVED
 
Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB                                Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB
AYESHA JAVED
 
Hec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMINGHec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMING
AYESHA JAVED
 
VISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEWVISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEW
AYESHA JAVED
 
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAMVISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
AYESHA JAVED
 
Boyer moore algorithm
Boyer moore algorithmBoyer moore algorithm
Boyer moore algorithm
AYESHA JAVED
 

More from AYESHA JAVED (20)

Neural network basic
Neural network basicNeural network basic
Neural network basic
 
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHYJOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
 
The recommendations system for source code components retrieval
The recommendations system for source code components retrievalThe recommendations system for source code components retrieval
The recommendations system for source code components retrieval
 
Jhon dewey __final document........#######____@@@ayesha javed
Jhon dewey  __final document........#######____@@@ayesha javedJhon dewey  __final document........#######____@@@ayesha javed
Jhon dewey __final document........#######____@@@ayesha javed
 
Normalization
NormalizationNormalization
Normalization
 
Lecture for 10 oct 2019 sentence types-workshop
Lecture for 10 oct 2019  sentence types-workshopLecture for 10 oct 2019  sentence types-workshop
Lecture for 10 oct 2019 sentence types-workshop
 
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
 
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
 
This is an empirical study of industry practice in the management of softwar...
This is an empirical study of  industry practice in the management of softwar...This is an empirical study of  industry practice in the management of softwar...
This is an empirical study of industry practice in the management of softwar...
 
Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...
 
A strand lead to success in project management
A strand lead to success in project managementA strand lead to success in project management
A strand lead to success in project management
 
PETROL SYSTEM
PETROL SYSTEMPETROL SYSTEM
PETROL SYSTEM
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
Eclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATIONEclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATION
 
Moore and mealy machines
Moore and mealy machinesMoore and mealy machines
Moore and mealy machines
 
Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB                                Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB
 
Hec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMINGHec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMING
 
VISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEWVISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEW
 
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAMVISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
 
Boyer moore algorithm
Boyer moore algorithmBoyer moore algorithm
Boyer moore algorithm
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Cyber security Information security

  • 3.
  • 4.
  • 5.
  • 6.
  • 7.  The security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 8.
  • 9.  Cyber security or information technology security  The techniques of protecting  Computers  Networks  programs and data from unauthorized access or attacks that are aimed for exploitation. ...
  • 10.
  • 11.  Cyber security is the protection of computer systems from  theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
  • 12.
  • 13.
  • 14.  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.  Taking some simple actions and practising safe behaviours will reduce online threats.
  • 24.  Move away from using UNSUPPORTED software  Always DOWNLOAD AND INSTALL the latest software and app updates  RUN up-to-date ANTI-VIRUS SOFTWARE  Use Strong Password  DELETE suspicious Emails and Avoid clicking on unknown attachments or LINKS
  • 25.  Back up your DATA  Train tour staff to be CYBER AWARE  Manage security relationships with supplier and partners