CYBER SECURITY
BY ASIM ZUBAIR
INTRODUCTION
TYPES OF CYBER SECURITY THREATE
CYBER SECURITY VENDORS
ADVANTAGE IN CYBER SECURITY
DISADVANTAGE IN CYBER SECURITY
BENEFITS IN CYBER SECURITY
CONCLUSION
CONTENTS
INTODUCTION
CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED
SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, AND DATA FROM
CYBERATTACKS.
• MEANING OF CYBER •
IT IS A COMBINING FORM RELATING TO INFORMATION
TECHNOLOGY, THE INTERNET AND VIRTUAL REALITY
• NEED OF CYBER SECURITY •
CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA
FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO
SAFEGUARDS YOUR SYSTEM FROM VIRUS.
TYPES OF CYBER SECURITY
THREATE
The process of keeping up with new technologies security
trends and threat intelligence is a challenging task . However,
it is necessary in order to protect information and other
assets from cyber threats, which take many forms they are ….
• ransomware
• Malware
• Social engineering
• phishing
RANSOMWARE
Ransomeware is a type of
malware that involve an
attacked locking the victims
computer system files typically
through encryption and
demanding a payment to
decrypt and unlock them.
Malware, or malicious software, is
any program or file that is harmful
to a computer user. Types
of malware can include computer
viruses, worms, Trojan horses and
spyware. These malicious programs
can perform a variety of different
functions such as stealing,
encrypting or deleting sensitive
data, altering or hijacking core
computing functions and
monitoring users' computer activity
without their permission.
MALWARE
SOCIAL ENGINEERING
Social engineering is an attack
that relies on human
interactions to trick users into
breaking security producers in
order to gain sensitive
information that is typically
protected.
PHISHING
Phishing is a form where
fraudulent emails are sent that
resemble emails from reputable
of these emails is to steel
sensitive data such as credit card
or login information.
CYBER SECURITY VENDORS
Vendors in cyber security fields will typically use endpoint , network , and advanced
threat , protection security as well as data loss prevention .
Three commonaly cyber security vendors are
ADVANTAGE OF CYBER
SECURITY
– It will defend from hacks and virus.
– The application of cyber security used in our pc needs
update everyweek.
– The security develperes will update their database every
week once. Hence the new virus also deleted
DIS ADVANTAGE OF CYBER
SECURITY
– make the system slower than before.
– Need to keep uploading the new software.
– In order to keep security up to date.
– Could be costly for average user.
BENEFITS IN CYBER
SECURITY
– Protection for data and network.
– Prevention of unauthorized users.
– Improve recovery time after a breech .
– Protection to end users.
Cyber security ppt

Cyber security ppt

  • 1.
  • 2.
    INTRODUCTION TYPES OF CYBERSECURITY THREATE CYBER SECURITY VENDORS ADVANTAGE IN CYBER SECURITY DISADVANTAGE IN CYBER SECURITY BENEFITS IN CYBER SECURITY CONCLUSION CONTENTS
  • 3.
    INTODUCTION CYBER SECURITY ISTHE PROTECTION OF INTERNET-CONNECTED SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, AND DATA FROM CYBERATTACKS. • MEANING OF CYBER • IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY, THE INTERNET AND VIRTUAL REALITY • NEED OF CYBER SECURITY • CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR SYSTEM FROM VIRUS.
  • 4.
    TYPES OF CYBERSECURITY THREATE The process of keeping up with new technologies security trends and threat intelligence is a challenging task . However, it is necessary in order to protect information and other assets from cyber threats, which take many forms they are …. • ransomware • Malware • Social engineering • phishing
  • 5.
    RANSOMWARE Ransomeware is atype of malware that involve an attacked locking the victims computer system files typically through encryption and demanding a payment to decrypt and unlock them.
  • 6.
    Malware, or malicioussoftware, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission. MALWARE
  • 7.
    SOCIAL ENGINEERING Social engineeringis an attack that relies on human interactions to trick users into breaking security producers in order to gain sensitive information that is typically protected.
  • 8.
    PHISHING Phishing is aform where fraudulent emails are sent that resemble emails from reputable of these emails is to steel sensitive data such as credit card or login information.
  • 9.
    CYBER SECURITY VENDORS Vendorsin cyber security fields will typically use endpoint , network , and advanced threat , protection security as well as data loss prevention . Three commonaly cyber security vendors are
  • 10.
    ADVANTAGE OF CYBER SECURITY –It will defend from hacks and virus. – The application of cyber security used in our pc needs update everyweek. – The security develperes will update their database every week once. Hence the new virus also deleted
  • 11.
    DIS ADVANTAGE OFCYBER SECURITY – make the system slower than before. – Need to keep uploading the new software. – In order to keep security up to date. – Could be costly for average user.
  • 12.
    BENEFITS IN CYBER SECURITY –Protection for data and network. – Prevention of unauthorized users. – Improve recovery time after a breech . – Protection to end users.