CYBER SECURITY
www.cetpainfotech.com
PHONE NO : 9212172602
Email id : query@cetpainfotech.com
CONTENTS
• What is Cyber Security?
• Why is Cyber Security important ?
• Combating CyberSecurity using Artificial
Intelligence
• Role of Cyber Security
• History
• What is Cyber Crime?
• Contact Us
What is Cyber
Security?
Cybersecurity is the practice of protecting
critical systems and sensitive information
from digital attacks. Also known as
information
technology(IT)security, cybersecurity measu
res are designed to combat threats
against networked systems and
applications, whether those threats
originate from inside or outside of an
organization.
Why is Cyber Security important ?
As humans have become more reliant on
technology, the prevalence and severity of
cybercrimes have grown. For example,
ransomware is a type of cyberattack that
locks an individual’s or organization’s
information until certain demands are
met, including extorted payments. These
attacks have affected financial, healthcare
and education organizations, causing
significant delays and leaks of
information.
Cybersecurity remains important for
anticipating, reacting and assessing
cyberattacks. Professionals in this field
study breaches and malicious actors to
safeguard our most sensitive information
and communications.
COMBATING CYBER SECURITY USING
ARTIFICIAL INTELLIGENCE
Cyber Security & Data Protection India
Summit 2018 aims to convene the best
minds in Cybersecurity under one roof to
create an interactive milieu for exchange
of knowledge and ideas. The event will
endeavour to address the emerging and
continuing threats to Cybersecurity and its
changing landscape, as well as respond to
increasing risk of security breaches and
security governance, application security,
cloud based security, Network, Mobile and
endpoint security and other cyber risks in
the India and abroad.
Role of Cyber Security
In the context of cybersecurity, “entry-level” can
be a bit of a misnomer. For some roles, the
National Security Agency(NSA) defines entry-
level as requiring a bachelor’s degree plus up to
three years of relevant experience—less with
higher-level degrees. With a high school diploma
or GED, you’ll likely need between four and
seven years of relevant...
History
Cyber Security is the practice of Protecting computers, mobile devices, Servers, electronic
Systems, networks, and data from malicious attacks. It is also known as Information Security
(INFOSEC) or Information Assurance (IA), System Security. The first cyber malware virus
developed was pure of innocent mistakes. But cybersecurity has evolved rapidly because of
the impeccable increase in the cybercrime law field on the Web. In this article, we will see the
history of cyber security.
ARPANET and the Creeper in the 1970s:
As these time-sharing systems emerged in the mid to late 1960s and many more jobs are
using web, users were able to run at a similar time, controlling the access to data on the
systems became a major point of concern. So one solution that was using logically classified
data one level at the time of and scan the system after the jobs are from the one level run
before the jobs for the next levels were running and ready for it, thus these approaches are
directed to computer security is called periods processing because these jobs for each level will
be run in a particular time of period the days.
Another effort that occurred in the mid to late 1970s was term Thus Each of these is
discussed in the following Sub connections as some cybersecurity requirements can either be
achieved by requiring procedures to be followed or by using system software mechanisms or
functions to enforce the requirements then the alleviating the need and wants for the
computer software mechanisms that would dealing to its states.
WHAT IS CYBER CRIME?
 Cybercrime is criminal activity that
either targets or uses a computer, a
computer network or a networked
device. Most cybercrime is committed
by cybercriminals or hackers who want
to make money. However, occasionally
cybercrime aims to damage computers
or networks for reasons other than
profit. These could be political or
personal.
 Cybercrime can be carried out by
individuals or organizations. Some
cybercriminals are organized, use
advanced techniques and are highly
technically skilled. Others are novice
hackers.
PHONE NO : 9212172602
Email id : query@cetpainfotech.com
Website : https://www.cetpainfotech.com/
THANK YOU!!!!
CONTACT US
CONTACT US

CYBER SECURITY ppt.pptx

  • 1.
    CYBER SECURITY www.cetpainfotech.com PHONE NO: 9212172602 Email id : query@cetpainfotech.com
  • 2.
    CONTENTS • What isCyber Security? • Why is Cyber Security important ? • Combating CyberSecurity using Artificial Intelligence • Role of Cyber Security • History • What is Cyber Crime? • Contact Us
  • 3.
    What is Cyber Security? Cybersecurityis the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology(IT)security, cybersecurity measu res are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.
  • 4.
    Why is CyberSecurity important ? As humans have become more reliant on technology, the prevalence and severity of cybercrimes have grown. For example, ransomware is a type of cyberattack that locks an individual’s or organization’s information until certain demands are met, including extorted payments. These attacks have affected financial, healthcare and education organizations, causing significant delays and leaks of information. Cybersecurity remains important for anticipating, reacting and assessing cyberattacks. Professionals in this field study breaches and malicious actors to safeguard our most sensitive information and communications.
  • 5.
    COMBATING CYBER SECURITYUSING ARTIFICIAL INTELLIGENCE Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.
  • 6.
    Role of CyberSecurity In the context of cybersecurity, “entry-level” can be a bit of a misnomer. For some roles, the National Security Agency(NSA) defines entry- level as requiring a bachelor’s degree plus up to three years of relevant experience—less with higher-level degrees. With a high school diploma or GED, you’ll likely need between four and seven years of relevant...
  • 7.
    History Cyber Security isthe practice of Protecting computers, mobile devices, Servers, electronic Systems, networks, and data from malicious attacks. It is also known as Information Security (INFOSEC) or Information Assurance (IA), System Security. The first cyber malware virus developed was pure of innocent mistakes. But cybersecurity has evolved rapidly because of the impeccable increase in the cybercrime law field on the Web. In this article, we will see the history of cyber security. ARPANET and the Creeper in the 1970s: As these time-sharing systems emerged in the mid to late 1960s and many more jobs are using web, users were able to run at a similar time, controlling the access to data on the systems became a major point of concern. So one solution that was using logically classified data one level at the time of and scan the system after the jobs are from the one level run before the jobs for the next levels were running and ready for it, thus these approaches are directed to computer security is called periods processing because these jobs for each level will be run in a particular time of period the days. Another effort that occurred in the mid to late 1970s was term Thus Each of these is discussed in the following Sub connections as some cybersecurity requirements can either be achieved by requiring procedures to be followed or by using system software mechanisms or functions to enforce the requirements then the alleviating the need and wants for the computer software mechanisms that would dealing to its states.
  • 8.
    WHAT IS CYBERCRIME?  Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal.  Cybercrime can be carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers.
  • 9.
    PHONE NO :9212172602 Email id : query@cetpainfotech.com Website : https://www.cetpainfotech.com/ THANK YOU!!!! CONTACT US CONTACT US