Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Introduction to Cyber Security
Understanding the need for CYBERSECURITY
Major security problems
Virus.
Malware.
Trojan Horses
Password Cracking
Hacker.
Types of Hackers
Role of a White Hat Hacker
Feel free to edit or modify or use it
PPT Theme Source/Credit-Aliena · SlidesCarnival
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
In this presentation, every possible effort has been made to highlight the major aspects related to the topic in 'An Introduction to Cyber Security.'
To make it easier different tabular & diagrammatic approach has been used which help in understanding the terms.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
Presentation based on cyber security for knowledge purpose.
if you want more interesting stuffs or more info. related to the same
then head on to my,
E-mail = yatendrayk28@gmail.com
Overview of Hot Technologies that are tearing up the security ecosystem. Cyber security experts now have to ‘Move their Cheese’ and deal with threats created by the Cloud, the Internet of Things, mobile/wireless and wearable technology.
We at AVANZO Strongly believe that PREVENTION IS BETTER THAN CURE and so an awareness program in schools named as Cyber Awareness Program (CAP) is introduced for schools across the country....
In this PowerPoint presentation, you can understand the basics of cybersecurity such as how cybersecurity emerged, know about cyber threat evolution, types of cybercrime, how to take preventive measures in order to control the threats, learn various security reasons as well as methods.
Cybercrimes are becoming a threat for every individual. So, it is really important to educate ourselves about these crimes and the preventive measures available.
Cyber security talks 2019 by theko moimaTheko Moima
Cyber awareness for Lesotho armed forces including LMPS. LCS, LDF, NSS and various ministries.
Lesotho is the most cyber insecure country as compared to its peers in the SADC. According to the ITU, Lesotho does not have any Cyber-security strategy etc; but now we are in the process with various stakeholders to make people aware about the need to secure our cyber space by hacking or leaking some information in the presence of the audience.
Here you learn about the Cyber Security - Terminologies and its basics and cbyer security threats as well. Slides covering digital knowledge of internet.After going through the slides you will become aware of cyber security basics.
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
Courtney Pachucki, IT Specialist at MePush, wrote this amazing Internet hygiene presentation for users on the Web to stay safe and avoid being hacked, phished, or infected with malware. This is a basic set of guidelines to help you identify your risks on the web.
Introduction to Cyber Security
Understanding the need for CYBERSECURITY
Major security problems
Virus.
Malware.
Trojan Horses
Password Cracking
Hacker.
Types of Hackers
Role of a White Hat Hacker
Feel free to edit or modify or use it
PPT Theme Source/Credit-Aliena · SlidesCarnival
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
In this presentation, every possible effort has been made to highlight the major aspects related to the topic in 'An Introduction to Cyber Security.'
To make it easier different tabular & diagrammatic approach has been used which help in understanding the terms.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
Presentation based on cyber security for knowledge purpose.
if you want more interesting stuffs or more info. related to the same
then head on to my,
E-mail = yatendrayk28@gmail.com
Overview of Hot Technologies that are tearing up the security ecosystem. Cyber security experts now have to ‘Move their Cheese’ and deal with threats created by the Cloud, the Internet of Things, mobile/wireless and wearable technology.
We at AVANZO Strongly believe that PREVENTION IS BETTER THAN CURE and so an awareness program in schools named as Cyber Awareness Program (CAP) is introduced for schools across the country....
In this PowerPoint presentation, you can understand the basics of cybersecurity such as how cybersecurity emerged, know about cyber threat evolution, types of cybercrime, how to take preventive measures in order to control the threats, learn various security reasons as well as methods.
Cybercrimes are becoming a threat for every individual. So, it is really important to educate ourselves about these crimes and the preventive measures available.
Cyber security talks 2019 by theko moimaTheko Moima
Cyber awareness for Lesotho armed forces including LMPS. LCS, LDF, NSS and various ministries.
Lesotho is the most cyber insecure country as compared to its peers in the SADC. According to the ITU, Lesotho does not have any Cyber-security strategy etc; but now we are in the process with various stakeholders to make people aware about the need to secure our cyber space by hacking or leaking some information in the presence of the audience.
Here you learn about the Cyber Security - Terminologies and its basics and cbyer security threats as well. Slides covering digital knowledge of internet.After going through the slides you will become aware of cyber security basics.
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
Courtney Pachucki, IT Specialist at MePush, wrote this amazing Internet hygiene presentation for users on the Web to stay safe and avoid being hacked, phished, or infected with malware. This is a basic set of guidelines to help you identify your risks on the web.
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
Choosing the Right Network Security for Your Business - Minerva.pdfonline Marketing
In a world where cyber-crime is at its highest rate ever, having a secure network is paramount. Cyber criminals are making no exceptions, businesses of all sizes and industries are being targeted, with the aim of obtaining personal/sensitive company information, fraud, deleting important data or holding the individual/organisation at ransom. Please visit: https://www.minervauk.com/blog/choosing-the-right-network-security-for-your-business-minerva/
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
Cyberattacks against small and midsize organizations have increased from 11 percent to 15 percent in 2020, according to an Avast survey. Nonprofits are no exception to this alarming trend, which results in lost productivity, damaged reputations, and serious financial implications. Whether you’re a one-person IT team or a nontechnical concerned stakeholder, this webinar will help you
- Protect your organization from common malware attacks
- Set up a strong cybersecurity strategy for your organization
- Identify solutions to help minimize cyberattack risks
WebHawk® prevents spoofing & dangerous malware from getting in and out of your computer systems and going through your corporate data.
WebHawk® secures you from inside to outside and also outside to inside Threats.
Cyber security threats and its solutionsmaryrowling
There are a lot of cyber threats in the cyber world, but some of them are really disastrous for your system and data. Cyber threats are increasing rapidly so it is important to know how to prevent them.
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
Information security awareness is an essential part of your information security program (ISMS - Information Security Management System). You can find a comprehensive set of security policies and frameworks at https://templatesit.com.
Mitisol is the perfect solution for Cyber security and risk management, Cyber security and risk management, Cyber Security Company in Dhaka, Bangladesh.
We are the best instutute for Cyber security courses, Cyber Security Course Training, Advanced Cyber security courses in Dhaka, Bangladesh. So keep visiting our websites to get update on regular basis.
Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”
Web development is the work involved in developing a web site for the Internet or an intranet. Web development can range from developing a simple single static page of plain text to complex web-based internet applications, electronic businesses, and social network services.
Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components.
Mobile Application Development By Rahul NayanRahul Nayan
Mobile App. Development is the process by which a mobile app is developed for mobile devices, such as personal digital assistants, enterprise digital assistants or mobile phones.
Build Once, Deploy Everywhere; Easily Test, Monitor, and Update Dynamically. App Development Articles. Code Patterns. Join The Community. Training & Tutorials. Types: Artificial Intelligence, Analytics, Node.js, Blockchain, Containers, Serverless.
Motivational Lecture about Career and Character BuildingRahul Nayan
Motivational Lecture for Teachers Day
Engineering
Career and Character Building
Career Development
Paraadigm Shift
The High Five Principle
Life Work Design
PDP
Skills
8 Strengths of Character
Ethical Learning Community
Quotes
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
1. Workshop on Cyber Security
Niks Technology Private Limited
By: Dr. Rahul Nayan
2. Niks Technology Private Limited
Cyber Security Defined
Cyber Security’s goal: Protect our information and
information systems
Cyber Security is: “Protection of information
systems against unauthorized access to or
modification of information, whether in storage,
processing or transit, and against the denial of
service to authorized users, including those
measures necessary to detect, document, and
counter such threats.”
3. Role Of Cyber Security
Why Is It Important
Anything that relies on the internet for communication, or is connected to a
computer or other smart device, can be affected by a breach in security. This
includes:
Communication systems, like email, phones and text messages.
Transportation systems, including traffic control, car engines, airplane
navigation systems.
Government databases, including Social Security numbers, licenses, tax
records.
Financial systems, including bank accounts, loans and pay checks.
Medical systems, including equipment and medical records.
Educational systems, including grades, report cards and research information.
4. Benefits of Cyber Security
It Can Protect Your Business
Protect Personal Info
Allows Employees to Work Safely
Protects Productivity
Stop Your Website from Going Down
Denies Spyware
Prevents Adware
A Consolidated Solution
Support Your IT Expert
Inspire Confidence in Your Customers
7. Youshareyour computer with others
Youtravel and usepublicWiFi
Personal& financialdata is on your
computer
Businessfiles are on your computer
Youuseasmartphone likeacomputer
YouarerunningWindowsXP/7
8. What is Cyber-Security?
Protecting your computer,
network, and information
from onlinethreats
What isCyber-Crime?
Any crime conductedvia
the Internet to cause
damage or stealdata
9. Why do hackershack?
Steal money
Collect information tosteal money, or
commit identitytheft
Why attack smallcompanies?
Least secureingeneral
Unwaryusers
10. Hardware
Unsecured Wi-Fi(Panera) No
Router
Router with defaultpassword
Software
No anti-virus/anti-spyware No
Firewall
Old virusdefinitions
Out of dateWindowsO.S.
PersonalBehavior
Failure to usestrong passwords
Clicking on unsafe links or emails
Downloading questionable files
Leaving computer logged on Leaving
your computeraccessible
12. Change your operating system
No option willbe fun or easy
Done with Microsoft? Switch to Apple orLinux
Want to stay? Update to 8.1 or 10 which worksfine
Youwill probablyneed to buy a new computer
Gotoa reputable reseller and buy a used computer loaded
withWindows 8/8.1/10
20. AccessRoutervia your web
browser
Enter your Routers IPAddress
Enter the default username &
password
Find administration settings
Select Change/ResetPassword
Tip:ToFind IPaddress go to your PC’s
Control Panel >Network and Internet >Network andSharingCenter and click on your network
21. Rule#1
Requireapasswordto accessyour computer
Why?
Prevents unauthorized access
Providesafirst line of defense
Prevents easy accessfrom a
network
TIP: Set up automatic lockout that requires a
password.Agood timeout value is5to 10 minutes.
22. Rule #2
Don’t forget your cell phone
Usestrong passwords–
>8 characters, letters,numbers and symbols
Use“coded” phrases (e.g.H@m5t3@k!)
Don’t store passwords in afile (unencrypted)
Don’t keep them near the computer
Useapassword vault such as“Lastpass”
23. Makesfilesanddisksunreadablewithout theencryption key
Youcanencrypt:
Hard Drive orUSBDrive –Windows BitLocker
Windows 7upgrade $139,Windows 8.1/10
included. Start button>all programs>Windowsanytime
upgrade
Individual Files–Axcrypt– Freeopen source
BusinessEmail –using avirtual personal network(VPN)
Windows Start button >typeVPNinto the program searchwindow
Protects against theft or lossof acomputer
24. Confidential Information your business is
required to protect with encryption includes:
Medical Data defined by
HIPAA
(Health Insurance Portability and Accountability Act)
Must also include staff training
Financial Data defined byPIC
(Payment Card Industry)
Do NOT permanently store card data on your system
Recommend using 3rd party providers
25. SPAMFilters
Keepsout email from
unknown senders
Catches majority ofSPAM
Catches non-SPAM
Allows knownemail
SPAMFilters aren’t
perfect!
WEBFilters
Prohibits bad websites
Pre-examines website
content and warns you
Catches good websites
Allows knownwebsites
Web filters aren’t
perfect!
27. Youand your employees arethe
last line ofdefense
After all the layers of protection,
you are the decisionmaker
DENY!!!
Cyber Security PartIII
28. If you provideWi-Fi forCustomers
Yourexisting router may have a “guest” feature
Besureto useWPA2encryption on your Private Network
Verify firewall
Install dedicated customer“hot spot” hardware and software
Does not require company to have any Wi-Fi exposure.
Protect private proprietary information from public users.
Improve customer internet experience and security
Include filtering to avoid risky or offensive websites
Providesfeatures suchasterms of serviceor time limits.
Worryfree 24x7TechnicalSupport, Monitoring, & Maintenance
29.
30. Provide securitytraining
Have companypolicies
For email & internet use
Company & confidentialinformation
Make them written and update them
Limit administrative and passwordaccess
Restrict software on companycomputers
31. Control Downloads ofSoftware
Never allow “pirate”websites
music, games, movies(BitTorrent)
BewareofALLfree software, know the source
Danger areas
Adobe Flashfiles –updateoften
Shortened urlsyou can’t check–know the source
Email attachments or links –hover over “clickhere”
32. S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?
This is a fake anti-virus program. Once loaded it claims your computer
is infected and directs you to to buy the program via credit card.
33. Type Source Purpose Protection
Virus Email Ads
Links
Warnings
Updates
Malicious attack Disable
yourcomputer Destroy
yourdata
Anti-virus software
Firewall software
Firewall hardware Data
back-up
Phishing Email
Website
Steal Identity ormoney Surfingbehavior
Adware Ads Virus delivery, steal
information
Goodpractices
Spyware Stealpersonal
information
Anti-spyware &firewall
software
Tip: Have bothAnti-Virus AND Anti-Spyware installedon your computer..
But DO NOT install two anti-virus programs.
35. Requestspersonalinformation?
Containsgrammatical errors?
misspellings'?
How do they addressyou?
Isit too good to be true?
Have you checked thelink?
Tip: “MouseOver” Doesthe websiteURLlook legitimate?
Tip: Legitimate companies will NEVERaskyou for personalor confidential
information via email, awebsite, telephone,or text message.
36. R eceived Before?
I nside Links?
S ensible Message?
K nowsender?
This email link
delivers a Trojan
Virus right to your
computer
37. Beware of searchengineresults
Do not download unknownor
free software
“Unclick”/DECLINEany
OPTIONAL Downloadsor
Toolbars
UseSucuriSiteCheck
http://sitecheck.sucuri.net/
Tip: When installing programs pay attention to
installation options.They make you think you’re
declining, butyou’re approving!
38. Only loginor sendpersonal information to websitesyou
know areencrypted
Awebsite isencrypted when you seethe“lock” symbol or
https://
Bewareof websitesusingencryption only onthe login page
39. Don't stay signed in toaccounts
When you are done, logout
Don’t do sensitive businesson publicWiFi
Don’t usethe same password,varyit
Keepyour browser(s)up-to-date
Orswitchto Firefox,Chrome,orApple
43. Boots very slowly or hangsup
Respondsslowly,crashes
Programs won’t run or crash
Popups, website redirection
Broken antivirus orsecurity
Tip: You can “right click” on the task bar and select the “Task Manager”
to see the memory and CPU usage that is currently taking place on your
computer.Shouldnot be constantly 100%.
44.
45. Tip:
A foolproof way to keepa
virus from stealing your
personal info -disconnect
the network cable or turn
off the Wi-Fi. THENtake
action.
46. Anti-virus can’t removeit
Computer is notunusable
Your files aremissing
Youmust manually edit Windows
Yournot absolutelysure your actions
won’t make mattersworse!
48. External Hard DriveBackup
Windows Backup
Time Machine(Mac)
CloudBackup
Carbonite
CrashPlan
File SyncService
(not reallyabackup)
Dropbox
GoogleDrive
REGULAR BACKUP
JUST DO IT.
51. • Backupsaves/restores your datafiles
• Backupalsocreatesaseparatesystemimage forrestoringprograms&Windows
Overwrites EVERYTHING whenrestored
Canonly be usedif asystem repair disk wascreated
52. Router 2550 Various –Netgear,Linksys, Belcan,et.Al.
CloudbackupOR
External HardDrive
600/year
3500once
Carbonite -www.carbonite.com
WindowsBackupSoftware
Anti-Virus 940/year AVGAntivirus –www.avg.com
Firewall 0 WindowsFirewall
Anti-Spyware 0 Malwarebytes – www.malwarebytes.org
Anti-spam 0 Builtin toAppleMail &Outlook, needsetup
Passwordvault 0 Great, but dangerous-Lastpass
Totalcost 5000-8000 Do it yourselfcost
(Complete packages, installation, andtraining
available from ComputerTroubleshooters)
53. 1. Usea Router to hidesyourcomputer/network
2. Make sureyour Windows Firewallisenabled
3. Usestrong passwordson your Router andComputer
4. Useanti-virus/anti-spyware todetect/remove malware
5. Backupyour files and data –regularly
6. Practice safesurfing: if you aren’t sure,don’tclick!
7. Don’t Share Confidential information on Social Media
8. Keep your Smartphones Password protected.
9. Use Anti Virus and Anti Malware.
54. Future in Cyber Security
2.5 Million Cyber Security Job Openings globally in 2019.
Niks Technology Private Limited
55. Questions?
Let us all come together to prevent Cyber Crime, as
TOGETHER WE CAN.
Thankyou for the kind support.
NiksTechnology
wishes youall a
QUALITYOF WORKLIFEAHEAD.