This PPT will help you to understand the fundamental concepts of cybersecurity as well as it will show you some ways to be get secured in this digital world. Please download the alice font to view this ppt in correct format
Cybersecurity : The unsung hero of the digital world (PPT)
1. The Unsung Hero of the Digital
Age
Made By : Azim Shaikh
Shri Shivaji College , Parbhani
2. Table Of Contents
1
Introduction
What Is Cybersecurity?
What Is Cyber Attack?
Real Life Examples
2
3
4
Histor
y
Need , Types &
Tools
Its Need
Threats And Viruses
Tools Used In CS
Inventor
First Virus
Antivirus
How To Be Safe In This
Digital World
Types Of Security Concerns
Safet
y
5. What Is
Cybersecurity?
Cyber Security is the
protection of internet
connected system including
hardware, software and program
or data from cyber attacks.
6. What Is Cyber Attack
?
A cyberattack is like a digital assault
launched by someone (or something) with
malicious intent. Their goal is to harm,
disrupt, or gain unauthorized access to a
computer system, network, or device.
7. What Is Cyber Threat
?
A cyberthreat refers to anything that has
the potential to cause serious harm to a
computer system. A cyberthreat is something
that may or may not happen, but has the
potential to cause serious damage.
Cyberthreats can lead to attacks on
computer systems, networks and more
8. Real Life
Examples
Locking your
phone with a
PIN
Using strong
password for
online accounts
Having Antivirus
s/w on your
computer
Being careful about
clicking suspicious
links
9. Histor
y
1940 : The time before
cybercrime
Limited Users & Access in 1940-
43
Lacked interconnectivity
John Neumann proposed self-
replicating computer programs
in 1949
10. Histor
y
The Phone Phreaks
Not a digital Crime but start
of it
Phreaks manipulate protocols
and make telecommunication free
of cost.
Remotely operate on the network
Application in the development
of apple computers
11. Histor
y
Birth Of Ethical Hacking
Emerged in 1960s
Initial motivation : Fun &
modification
Technology evolved & hacking
shifted to towards computer
system
1967 IBM incident
Ethical hacking defined
12. ARPANET And The Creeper
Birth of cybersecurity
Bob Thomas created the “Creeper
virus” in 1971 (non-malicious
program)
Replicated across ARPANET
1972 Reaper (Anti-Virus)
13. Antivirus Program &
Threats
1980s witnessed emergence of
first commercial antivirus
program
Popularization of Trojan,
Computer Virus
20. MALWARE
Short for “malicious software”—is
software code written
intentionally to harm a computer
system or its users.
It includes Ransomware, Trojan
Horse, Spyware, Worms
21. SOCIAL ENGINEERING
social engineering(human
hacking) manipulates targets into
taking actions that expose confidential
information, threaten their own or their
organization’s financial well-being, or
otherwise compromise personal or
organizational security.
22. Man In The
Middle(MITM)
In a man-in-the-middle attack, a
cybercriminal eavesdrops on a network
connection to intercept and relay
messages between two parties and
steal data. Unsecured Wi-Fi networks
are often happy hunting grounds for
hackers looking to launch MITM
attacks.
23. Denial-Of-
Service(DDoS)
A denial-of-service attack is a
cyberattack that overwhelms a
website, application, or system
with volumes of fraudulent
traffic, making it too slow to
use or entirely unavailable to
legitimate users
24. OTHER ATTACKS
SQL Injection
Password Attack
IoT Attack
Injection Attacks
And Many More…
26. Being cautious about
clicking on suspicious
links or opening
attachments in emails,
even if they appear to
be from someone you
know.
Suspicious
Links
27. Using strong and unique
passwords for every
online account, and
enabling two-factor
authentication (2FA)
whenever possible.
Authenticatio
n
28. Don’t use common and
general passwords like
starting number series,
phone number, DOB,
nicknames, etc. Use
alphanumeric characters
and symbols
Strong
Password