Debraj Karmakar
I am pursuing my B. Tech degree in Computer
Science & Engineering from JIS College of
Engineering, Kalyani, Nadia, West Bengal.
Cyber Attack
Cyber Security is the technology and
process that is designed to protect
networks and devices from attack,
damage, or unauthorized access.
Protection of your
business
Increase
productivity
Inspires customer
confidence
Stops your website
from crashing
Protection for your
customers or clients
Confidentiality, Integrity, Availability
have served as the industry standard for
Computer Security since the time of
first mainframes.
The principles of
confidentiality assert that
information and functions
can be accessed only by
authorized parties.
Example: Military Secrets
The principles of confidentiality
assert that information and
functions can be added, altered,
or removed only by authorized
people & means.
Example: Incorrect data entered
by a user in the database
The principles of availability assets that systems,
functions, and data must be available on demand
according to agreed-upon parameters based on
levels of service.
Cybercrime is any criminal
activity that involves a
computer, network device
or a network
Most Cybercrime are
carried out in order to
generate profit for the
Cyber Criminals.
Cybercrime are carried out
against computers or
devices directly to damage
or disable the, spread
malware, steal secret
information, etc.
Fraud, Denial
of Service
(DOS)
Sniffing,
Viruses
Customer
traffickers
Information theft &
manipulating data
Achieving state’s military
objectives
Demanding ransom
Damaging reputation of
the target
Financial loss to the target
Disputing business
continuity
01
White Hat Hacker
02
Black Hat Hacker
03
Gray Hat Hacker
04
Red Hat Hacker
0
5
Hacktivist
0
6
Script Kiddie
A Cyber Security
expert is an individual
employed by an
organization to
protect their data.
Chief Information
Security Officer
₹
Network Security
Engineer
₹
Information
Security Analyst
₹
Security Analyst
₹
Security Manager, IT
₹
Cyber Security
Analyst
₹
Security Consultant,
(Computing /
Networking / IT)
₹
Ethical Hacker
₹
Technical
Consultant
₹
₹
- Kali Linux
💣

Cyber security ppt

  • 1.
    Debraj Karmakar I ampursuing my B. Tech degree in Computer Science & Engineering from JIS College of Engineering, Kalyani, Nadia, West Bengal.
  • 3.
  • 6.
    Cyber Security isthe technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access.
  • 7.
    Protection of your business Increase productivity Inspirescustomer confidence Stops your website from crashing Protection for your customers or clients
  • 9.
    Confidentiality, Integrity, Availability haveserved as the industry standard for Computer Security since the time of first mainframes.
  • 12.
    The principles of confidentialityassert that information and functions can be accessed only by authorized parties. Example: Military Secrets The principles of confidentiality assert that information and functions can be added, altered, or removed only by authorized people & means. Example: Incorrect data entered by a user in the database The principles of availability assets that systems, functions, and data must be available on demand according to agreed-upon parameters based on levels of service.
  • 14.
    Cybercrime is anycriminal activity that involves a computer, network device or a network Most Cybercrime are carried out in order to generate profit for the Cyber Criminals. Cybercrime are carried out against computers or devices directly to damage or disable the, spread malware, steal secret information, etc.
  • 16.
  • 18.
    Information theft & manipulatingdata Achieving state’s military objectives Demanding ransom Damaging reputation of the target Financial loss to the target Disputing business continuity
  • 20.
    01 White Hat Hacker 02 BlackHat Hacker 03 Gray Hat Hacker 04 Red Hat Hacker 0 5 Hacktivist 0 6 Script Kiddie
  • 26.
    A Cyber Security expertis an individual employed by an organization to protect their data.
  • 27.
    Chief Information Security Officer ₹ NetworkSecurity Engineer ₹ Information Security Analyst ₹ Security Analyst ₹ Security Manager, IT ₹ Cyber Security Analyst ₹ Security Consultant, (Computing / Networking / IT) ₹ Ethical Hacker ₹ Technical Consultant ₹
  • 31.
  • 35.
  • 36.