CYBER SECURITY
INTRODUCTION
• The term cyber security is used to refer to the security offered through on-
line services to protect your online information.
• With an increasing amount of people getting connected to Internet, the
security threats that cause massive harm are increasing also.
• Cyber security refers to the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack,
damage, or unauthorized access. Cyber security may also be referred to as
information technology security.
Meaning of theWord CYBER
• It is a combining form relating to information technology, the Internet, and
virtual reality.
• Computer is just a type of box which is widely used in all over the world as a
machine. But actually it is a type of machine which is used to do the most
hard or difficult work easily. And now i am coming to the topic which is cyber
world introduction. Cyber means meant net, and world is world as all we
know. So that Cyber world means a a world of net in which anyone can
trapped of easily access your own personal identity.
Need of cyber security
• Cyber security is necessary since it helps in securing data from threats such
as data theft or misuse, also safeguards your system from viruses
• The increasing reliance of our information age economies and governments
on cyber (computer-based) infrastructure makes them progressively more
vulnerable to cyber attacks on our computer systems, networks and data. In
their most disruptive form, cyber attacks target the enterprise, government,
military, or other infrastructural assets of a nation or its citizens..
Major security problems
• Virus
• Hacker Malware
• Trojan horses
• Spyware
• Password cracking
Viruses andWorms
• AVirus is a “program that is loaded onto your computer without your
knowledge and runs against your wishes.
Malware
• The word "malware" comes from the term "MALicious softWARE.“
• Malware is any software that infects and damages a computer system
without the owner's knowledge or permission.
Trojan Horses
• Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers.
Hackers
• In common a hacker is a person who breaks into computers, usually by
gaining access to administrative controls.
Password Cracking
• Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
HowTo prevent hacking
• It may be impossible to prevent computer hacking, however effective
security controls including strong passwords, and the use of firewalls can
helps.
Types of Hackers
• White Hat Hacker
• The term "white hat" in Internet slang refers to an ethical computer hacker,
or a computer security expert, who specializes in penetration testing and in
other testing methodologies that ensures the security of an organization's
information systems.
• Grey Hat Hacker
• The term "grey hat" refers to a computer hacker or computer security expert
who may sometimes violate laws or typical ethical standards, but does not
have the malicious intent typical of a black hat hacker.
• Black Hat Hacker
• A black hat hacker is a hacker who "violates computer security for little
reason beyond maliciousness or for personal gain".
Solution
• Install a security suite that protects the computer against threats such as
viruses and worms.
To Stop Malware
• Download an anti-malware program that also helps prevent infections.
• Activate NetworkThreat Protection, Firewall, Antivirus.
How to AvoidTrojans
• Security suites, such as Avast Internet Security, will prevent you from
downloadingTrojan Horses.
Securing Password
• Use always Strong password.
• Never use same password for two different sites.
Cyber Security Is Everyone’s Responsibility
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes.
Capacity building
– Skill & Competence development
Research and Development
– Cyber Monitoring
– Network Security
International Collaboration
India stands 2nd in the cyber crime in the
World
Cyber attacks in india
• ransomeware attack:-
• the global ransomeware attacks that hit hundred of system to phishing an
dsccaningh rackets ,
• at least one cybercrime was reported every 10 minutes inIndia in the first six
month of 2017.
Cosmos online bank robbery
• Attackers managed to siphon off over Rs 94 crore through a malware attack
on the server of Pune-based Cosmos Bank and cloning thousands of the
bank's debit cards over a period of two days .
• The fraudulent transactions were carried out onAugust 11 and August 13
and the malware attack by the hackers originated in Canada.
Conclusion
• I hope that my presentation will be helpful for my audience to improve their
knowledge about cyber security and to overcome several security loopholes
on their computer operation. Also it helps to spread awareness among
normal people about emerging security threats. Simple and practical
prevention methods are explained in the Seminar to prevent PCs from
infection.
THANK YOU

Cyber security(2018 updated)

  • 1.
  • 2.
    INTRODUCTION • The termcyber security is used to refer to the security offered through on- line services to protect your online information. • With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. • Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 3.
    Meaning of theWordCYBER • It is a combining form relating to information technology, the Internet, and virtual reality. • Computer is just a type of box which is widely used in all over the world as a machine. But actually it is a type of machine which is used to do the most hard or difficult work easily. And now i am coming to the topic which is cyber world introduction. Cyber means meant net, and world is world as all we know. So that Cyber world means a a world of net in which anyone can trapped of easily access your own personal identity.
  • 4.
    Need of cybersecurity • Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses • The increasing reliance of our information age economies and governments on cyber (computer-based) infrastructure makes them progressively more vulnerable to cyber attacks on our computer systems, networks and data. In their most disruptive form, cyber attacks target the enterprise, government, military, or other infrastructural assets of a nation or its citizens..
  • 5.
    Major security problems •Virus • Hacker Malware • Trojan horses • Spyware • Password cracking
  • 6.
    Viruses andWorms • AVirusis a “program that is loaded onto your computer without your knowledge and runs against your wishes.
  • 7.
    Malware • The word"malware" comes from the term "MALicious softWARE.“ • Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 8.
    Trojan Horses • Trojanhorses are email viruses that can duplicate themselves, steal information, or harm the computer system. • These viruses are the most serious threats to computers.
  • 9.
    Hackers • In commona hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 10.
    Password Cracking • Passwordattacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 11.
    HowTo prevent hacking •It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 12.
    Types of Hackers •White Hat Hacker • The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems. • Grey Hat Hacker • The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. • Black Hat Hacker • A black hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
  • 13.
    Solution • Install asecurity suite that protects the computer against threats such as viruses and worms.
  • 14.
    To Stop Malware •Download an anti-malware program that also helps prevent infections. • Activate NetworkThreat Protection, Firewall, Antivirus.
  • 15.
    How to AvoidTrojans •Security suites, such as Avast Internet Security, will prevent you from downloadingTrojan Horses.
  • 16.
    Securing Password • Usealways Strong password. • Never use same password for two different sites.
  • 17.
    Cyber Security IsEveryone’s Responsibility
  • 18.
    Cyber Security Strategy– India • Security Policy, Legal Framework – IT Act, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes. Capacity building – Skill & Competence development Research and Development – Cyber Monitoring – Network Security International Collaboration
  • 19.
    India stands 2ndin the cyber crime in the World
  • 20.
    Cyber attacks inindia • ransomeware attack:- • the global ransomeware attacks that hit hundred of system to phishing an dsccaningh rackets , • at least one cybercrime was reported every 10 minutes inIndia in the first six month of 2017.
  • 21.
    Cosmos online bankrobbery • Attackers managed to siphon off over Rs 94 crore through a malware attack on the server of Pune-based Cosmos Bank and cloning thousands of the bank's debit cards over a period of two days . • The fraudulent transactions were carried out onAugust 11 and August 13 and the malware attack by the hackers originated in Canada.
  • 22.
    Conclusion • I hopethat my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection.
  • 23.