This document discusses cyber security and the need for it. It defines cyber security as protecting online information from threats. Major security problems discussed include viruses, hackers, malware, Trojan horses, and password cracking. It provides information on each of these threats and recommends solutions like installing security software, using strong passwords, firewalls, and being aware of social engineering. The conclusion emphasizes that cyber security is everyone's responsibility.
The termcyber security is used to refer to the
security offered through on-line services to
protect your online information.
With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm are
increasing also.
Introduction
3.
What is the
meaningof
the word
CYBER
What is the need
of Cyber Security
What are the
security
problems in
Cyber field
How to
implement and
maintain
Security of a
Cyber field
around us.
4.
It isa combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
5.
Need of cybersecurity
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
How To preventhacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
12.
Malware
The word"malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
13.
To Stop Malware
Download an anti-malware
program that also
helps prevent infections.
Activate Network Threat
Protection,
Firewall, Antivirus.
14.
Trojan Horses
Trojanhorses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
15.
How to AvoidTrojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
16.
Password Cracking
Passwordattacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
17.
Securing Password
Usealways Strong password.
Never use same password for two different sites.
Cyber Security Strategy– India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
20.
India stands 10thin the cyber
crime in the world
usa
china
germany
britain
brazil
spain
italy
france
turkey
india
22.
Conclusion
I hope thatmy presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
helps to spread awareness among normal
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.