SlideShare a Scribd company logo
1 of 36
Cyber security
Dr. Soumen Kayal
Librarian
Maharaja Manindra Chandra College
Ph. No- 7980395362
Value added Course
What is Cyber space?
Cyber Space is the virtual space that connects all of us and enables the
information exchange, necessary to support interactions in the digital era
Cyberspace refers to the virtual space that provides the infrastructure, electronic
medium and related elements necessary for online global communication.
The Origin of Cyberspace
• The term “cyberspace” is derived from the word ‘cybernetics’ which in turn is
extracted from ancient Greek word kubernētēs, that refers to steersman or to give
direction.
• The term cyberspace first came into existence in various contexts in visual arts
and science fiction during 1940, 1960 and 1984. However, the first reference was
made by the founder of Electronic Frontier Foundation, in the year 1990 and later
in 1991 by Mr. Benedict, which is close to the existing relationship of computer
and telecommunication systems.
Levels of Cyber space
Extended Cyberspace
Core cyber Space
Component of Cyber Space
Physical Device Computer And Software Data
Intermediaries
Network
Internet
Cyber Space Cyber crime Cyber security
Introduction to cyber Security
The term cyber security is used to refer to the security offered through
online services to protect your on-line information.
With an increasing amount of people getting connected to internet, the
security threats that cause massive harm are increasing also.
Cyber Security - Definition
Cyber security refers to the actions which are taken in order to prevent the computer
systems or the Internet from unauthorized access or against attacks.
(Source: Webster online Dictionary)
Cyber Security includes techniques that protect computers, networks,
programs and data from illegal access or outbreaks that may be misused.
Cyber Security refers to protection of computer resources or information from theft ,
compromise or confront using deterrent measures through a consideration of possible
information threats, like malwares and other malevolent codes. Identity management, risk
management and incident management are some of the common cyber security strategies
in practice
To Under Stand
What is the meaning of Cyber
What are the security problem
in Cyber field
How to implement and
maintain security of a cyber
field
What is the need of Cyber
Security
Meaning of the Word Cyber
• It is a combining form relating to information technology, the
internet, and the virtual reality
Need of Cyber Security
Cyber security is necessary since it helps in securing data from threats such as
data theft or misuse, also safeguards your system from virus.
Elements of Cyber security
Common tolls
used to prevent
data leakage
Network & gateway security
Application Security
Data Loss Prevention
Network Access Control (NAC)
Antivirus Security
Major security problems
• Virus
• Malwarwe
• Trojan Horses
• Password cracking
• Hackers
A virus is a programme that is loaded into your computer without
your knowledge and runs against your wishes
Viruses
Solution
Install a security suite that protects the computer against threats such as viruses and worms
Malware = “malicious software”
Malware is any kind of unwanted software that is installed without your
consent on your computer and other digital devices.
Viruses, Worms, Trojan horses, Bombs, Spyware, Adware, Ransomware are
subgroups of malware.
Malware
To stop Malware
Download an anti-malweare programme that also helps prevent infection
Activate network Threat protection, Firewall, Antivirus
Trojan horse: is a program or software designed to look like a useful or legitimate file.
Once the program is installed and opened it steals information or deletes data.
Trojan horses compared to other types of malware is that it usually runs only once and
then is done functioning.
Some create back-door effects
Another distribution of Trojans is by infecting a server that hosts websites.
Trojans Horse
How to avoid Trojans
Security suits, such as Avast, internet security will prevent you from
downloading Trojan Horse
Password Cracking
• Password attack are attack by hackers that are able to determine passwords or find
passwords to different protected electronic areas and social network sites
Securing Password
Use always strong password
Never use same password for two different sites
In common a hackers is person who breaks
into computer, usually by gaining access to
administrative control.
Hackers
Type of Hacking
• Website/ Server Hacking
• Networking Hacking
• E-mail Hacking
• Ethical Hacking
• Password acking
• Computer Hacking
• Server Hacking
Types of Hackers
How to prevent Hacking
 Hackers generally use viruses, malware, Trojans, worms, phishing techniques, email
spamming, social engineering, exploit operating system vulnerabilities, or port
vulnerabilities to access any victim's
It May be impossible to prevent computer hacking, however effective security
controls including strong passwords, and the use of firewalls can help
Denial of Service Attack
Common tools of Cyber security
Common tolls
used to prevent
data leakage
Passwords
Anti-virus/ Anti malware sofweare
Firewalls
Authentication
Encryption
Cyber Crime
Cyber Crime is a generic term that refers to all criminal activities done
using the medium of communication devices, computers, mobile phones,
tablets etc. It can be categorized in three ways:
•The computer as a target – attacking the computers of others.
•The computer as a weapon- Using a computer to commit “traditional
crime” that we see in the physical world.
•The computer as an accessory- Using a computer as a “fancy filing
cabinet” to store illegal or stolen information.
False Sense of Security?
COVID-19 Cyber Threats
COVID-19 Cyber Threats
COVID-19 Cyber Threats
COVID-19 Cyber Threats
How do you look like to Bad guys?
66.233.160.64
What does a Cyber Security Professional look like?
What does a Cyber Security Professional look like?
How We Protect Information?
People
Training, education, awareness, repetition
Process
Governance, oversight, policy, reporting
Technology
Firewalls, IDS/ISP
, SIEM, anti-malware
Strong passwords, Logging/monitoring
Which is the weakest link?
Cyber Security Act -India
• Security policy, Legal Framework
-IT Act, 2000
--IT (Amendment ) Bill, 2006- Data Protection & Computer crimes
 Cyber Punishment
Creating a fake account in someone else’s name or misusing login credentials of someone else. It is
a crime under section 66C and 66D of the Information Technology Act, 2000. Punishment for
carrying out such a crime is 3 years in jail and fine up to Rs 1 lakh
Sending and publication of obscene or sexually explicit material -- Is an offence under sections
Section 67 and Section 67A of the Information Technology Act, 2000. Under section 67, publishing
or transmitting obscene material is liable to imprisonment of 3 years with fine up to Rs 5 Lakhs.
Under section 67 A, publishing or transmitting sexually explicit material is liable to imprisonment of
5 years with fine up to Rs 10 Lakhs.
Cyber terrorism, threatening unity, integrity, security or sovereignty of India - Cyber terrorism is
an offence under section 66F of the Information Technology Act, 2000. It is punishable with
imprisonment for life
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt

More Related Content

Similar to Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt

Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
Cyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxCyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxBhulanDeb
 

Similar to Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt (20)

Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxCyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptx
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...Suhani Kapoor
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateSoham Mondal
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boodykojalkojal131
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University Certificate
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt

  • 1. Cyber security Dr. Soumen Kayal Librarian Maharaja Manindra Chandra College Ph. No- 7980395362 Value added Course
  • 2. What is Cyber space? Cyber Space is the virtual space that connects all of us and enables the information exchange, necessary to support interactions in the digital era Cyberspace refers to the virtual space that provides the infrastructure, electronic medium and related elements necessary for online global communication.
  • 3. The Origin of Cyberspace • The term “cyberspace” is derived from the word ‘cybernetics’ which in turn is extracted from ancient Greek word kubernētēs, that refers to steersman or to give direction. • The term cyberspace first came into existence in various contexts in visual arts and science fiction during 1940, 1960 and 1984. However, the first reference was made by the founder of Electronic Frontier Foundation, in the year 1990 and later in 1991 by Mr. Benedict, which is close to the existing relationship of computer and telecommunication systems.
  • 4. Levels of Cyber space Extended Cyberspace Core cyber Space
  • 5. Component of Cyber Space Physical Device Computer And Software Data Intermediaries Network Internet
  • 6. Cyber Space Cyber crime Cyber security
  • 7. Introduction to cyber Security The term cyber security is used to refer to the security offered through online services to protect your on-line information. With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also.
  • 8. Cyber Security - Definition Cyber security refers to the actions which are taken in order to prevent the computer systems or the Internet from unauthorized access or against attacks. (Source: Webster online Dictionary) Cyber Security includes techniques that protect computers, networks, programs and data from illegal access or outbreaks that may be misused. Cyber Security refers to protection of computer resources or information from theft , compromise or confront using deterrent measures through a consideration of possible information threats, like malwares and other malevolent codes. Identity management, risk management and incident management are some of the common cyber security strategies in practice
  • 9. To Under Stand What is the meaning of Cyber What are the security problem in Cyber field How to implement and maintain security of a cyber field What is the need of Cyber Security
  • 10. Meaning of the Word Cyber • It is a combining form relating to information technology, the internet, and the virtual reality
  • 11. Need of Cyber Security Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from virus.
  • 12. Elements of Cyber security Common tolls used to prevent data leakage Network & gateway security Application Security Data Loss Prevention Network Access Control (NAC) Antivirus Security
  • 13. Major security problems • Virus • Malwarwe • Trojan Horses • Password cracking • Hackers
  • 14. A virus is a programme that is loaded into your computer without your knowledge and runs against your wishes Viruses Solution Install a security suite that protects the computer against threats such as viruses and worms
  • 15. Malware = “malicious software” Malware is any kind of unwanted software that is installed without your consent on your computer and other digital devices. Viruses, Worms, Trojan horses, Bombs, Spyware, Adware, Ransomware are subgroups of malware. Malware To stop Malware Download an anti-malweare programme that also helps prevent infection Activate network Threat protection, Firewall, Antivirus
  • 16. Trojan horse: is a program or software designed to look like a useful or legitimate file. Once the program is installed and opened it steals information or deletes data. Trojan horses compared to other types of malware is that it usually runs only once and then is done functioning. Some create back-door effects Another distribution of Trojans is by infecting a server that hosts websites. Trojans Horse How to avoid Trojans Security suits, such as Avast, internet security will prevent you from downloading Trojan Horse
  • 17. Password Cracking • Password attack are attack by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites Securing Password Use always strong password Never use same password for two different sites
  • 18. In common a hackers is person who breaks into computer, usually by gaining access to administrative control. Hackers
  • 19. Type of Hacking • Website/ Server Hacking • Networking Hacking • E-mail Hacking • Ethical Hacking • Password acking • Computer Hacking • Server Hacking
  • 21. How to prevent Hacking  Hackers generally use viruses, malware, Trojans, worms, phishing techniques, email spamming, social engineering, exploit operating system vulnerabilities, or port vulnerabilities to access any victim's It May be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can help
  • 23. Common tools of Cyber security Common tolls used to prevent data leakage Passwords Anti-virus/ Anti malware sofweare Firewalls Authentication Encryption
  • 24. Cyber Crime Cyber Crime is a generic term that refers to all criminal activities done using the medium of communication devices, computers, mobile phones, tablets etc. It can be categorized in three ways: •The computer as a target – attacking the computers of others. •The computer as a weapon- Using a computer to commit “traditional crime” that we see in the physical world. •The computer as an accessory- Using a computer as a “fancy filing cabinet” to store illegal or stolen information.
  • 25.
  • 26. False Sense of Security?
  • 31. How do you look like to Bad guys? 66.233.160.64
  • 32. What does a Cyber Security Professional look like?
  • 33. What does a Cyber Security Professional look like?
  • 34. How We Protect Information? People Training, education, awareness, repetition Process Governance, oversight, policy, reporting Technology Firewalls, IDS/ISP , SIEM, anti-malware Strong passwords, Logging/monitoring Which is the weakest link?
  • 35. Cyber Security Act -India • Security policy, Legal Framework -IT Act, 2000 --IT (Amendment ) Bill, 2006- Data Protection & Computer crimes  Cyber Punishment Creating a fake account in someone else’s name or misusing login credentials of someone else. It is a crime under section 66C and 66D of the Information Technology Act, 2000. Punishment for carrying out such a crime is 3 years in jail and fine up to Rs 1 lakh Sending and publication of obscene or sexually explicit material -- Is an offence under sections Section 67 and Section 67A of the Information Technology Act, 2000. Under section 67, publishing or transmitting obscene material is liable to imprisonment of 3 years with fine up to Rs 5 Lakhs. Under section 67 A, publishing or transmitting sexually explicit material is liable to imprisonment of 5 years with fine up to Rs 10 Lakhs. Cyber terrorism, threatening unity, integrity, security or sovereignty of India - Cyber terrorism is an offence under section 66F of the Information Technology Act, 2000. It is punishable with imprisonment for life