Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
1. Cyber security
Dr. Soumen Kayal
Librarian
Maharaja Manindra Chandra College
Ph. No- 7980395362
Value added Course
2. What is Cyber space?
Cyber Space is the virtual space that connects all of us and enables the
information exchange, necessary to support interactions in the digital era
Cyberspace refers to the virtual space that provides the infrastructure, electronic
medium and related elements necessary for online global communication.
3. The Origin of Cyberspace
• The term “cyberspace” is derived from the word ‘cybernetics’ which in turn is
extracted from ancient Greek word kubernētēs, that refers to steersman or to give
direction.
• The term cyberspace first came into existence in various contexts in visual arts
and science fiction during 1940, 1960 and 1984. However, the first reference was
made by the founder of Electronic Frontier Foundation, in the year 1990 and later
in 1991 by Mr. Benedict, which is close to the existing relationship of computer
and telecommunication systems.
7. Introduction to cyber Security
The term cyber security is used to refer to the security offered through
online services to protect your on-line information.
With an increasing amount of people getting connected to internet, the
security threats that cause massive harm are increasing also.
8. Cyber Security - Definition
Cyber security refers to the actions which are taken in order to prevent the computer
systems or the Internet from unauthorized access or against attacks.
(Source: Webster online Dictionary)
Cyber Security includes techniques that protect computers, networks,
programs and data from illegal access or outbreaks that may be misused.
Cyber Security refers to protection of computer resources or information from theft ,
compromise or confront using deterrent measures through a consideration of possible
information threats, like malwares and other malevolent codes. Identity management, risk
management and incident management are some of the common cyber security strategies
in practice
9. To Under Stand
What is the meaning of Cyber
What are the security problem
in Cyber field
How to implement and
maintain security of a cyber
field
What is the need of Cyber
Security
10. Meaning of the Word Cyber
• It is a combining form relating to information technology, the
internet, and the virtual reality
11. Need of Cyber Security
Cyber security is necessary since it helps in securing data from threats such as
data theft or misuse, also safeguards your system from virus.
12. Elements of Cyber security
Common tolls
used to prevent
data leakage
Network & gateway security
Application Security
Data Loss Prevention
Network Access Control (NAC)
Antivirus Security
14. A virus is a programme that is loaded into your computer without
your knowledge and runs against your wishes
Viruses
Solution
Install a security suite that protects the computer against threats such as viruses and worms
15. Malware = “malicious software”
Malware is any kind of unwanted software that is installed without your
consent on your computer and other digital devices.
Viruses, Worms, Trojan horses, Bombs, Spyware, Adware, Ransomware are
subgroups of malware.
Malware
To stop Malware
Download an anti-malweare programme that also helps prevent infection
Activate network Threat protection, Firewall, Antivirus
16. Trojan horse: is a program or software designed to look like a useful or legitimate file.
Once the program is installed and opened it steals information or deletes data.
Trojan horses compared to other types of malware is that it usually runs only once and
then is done functioning.
Some create back-door effects
Another distribution of Trojans is by infecting a server that hosts websites.
Trojans Horse
How to avoid Trojans
Security suits, such as Avast, internet security will prevent you from
downloading Trojan Horse
17. Password Cracking
• Password attack are attack by hackers that are able to determine passwords or find
passwords to different protected electronic areas and social network sites
Securing Password
Use always strong password
Never use same password for two different sites
18. In common a hackers is person who breaks
into computer, usually by gaining access to
administrative control.
Hackers
19. Type of Hacking
• Website/ Server Hacking
• Networking Hacking
• E-mail Hacking
• Ethical Hacking
• Password acking
• Computer Hacking
• Server Hacking
21. How to prevent Hacking
Hackers generally use viruses, malware, Trojans, worms, phishing techniques, email
spamming, social engineering, exploit operating system vulnerabilities, or port
vulnerabilities to access any victim's
It May be impossible to prevent computer hacking, however effective security
controls including strong passwords, and the use of firewalls can help
23. Common tools of Cyber security
Common tolls
used to prevent
data leakage
Passwords
Anti-virus/ Anti malware sofweare
Firewalls
Authentication
Encryption
24. Cyber Crime
Cyber Crime is a generic term that refers to all criminal activities done
using the medium of communication devices, computers, mobile phones,
tablets etc. It can be categorized in three ways:
•The computer as a target – attacking the computers of others.
•The computer as a weapon- Using a computer to commit “traditional
crime” that we see in the physical world.
•The computer as an accessory- Using a computer as a “fancy filing
cabinet” to store illegal or stolen information.
31. How do you look like to Bad guys?
66.233.160.64
32. What does a Cyber Security Professional look like?
33. What does a Cyber Security Professional look like?
34. How We Protect Information?
People
Training, education, awareness, repetition
Process
Governance, oversight, policy, reporting
Technology
Firewalls, IDS/ISP
, SIEM, anti-malware
Strong passwords, Logging/monitoring
Which is the weakest link?
35. Cyber Security Act -India
• Security policy, Legal Framework
-IT Act, 2000
--IT (Amendment ) Bill, 2006- Data Protection & Computer crimes
Cyber Punishment
Creating a fake account in someone else’s name or misusing login credentials of someone else. It is
a crime under section 66C and 66D of the Information Technology Act, 2000. Punishment for
carrying out such a crime is 3 years in jail and fine up to Rs 1 lakh
Sending and publication of obscene or sexually explicit material -- Is an offence under sections
Section 67 and Section 67A of the Information Technology Act, 2000. Under section 67, publishing
or transmitting obscene material is liable to imprisonment of 3 years with fine up to Rs 5 Lakhs.
Under section 67 A, publishing or transmitting sexually explicit material is liable to imprisonment of
5 years with fine up to Rs 10 Lakhs.
Cyber terrorism, threatening unity, integrity, security or sovereignty of India - Cyber terrorism is
an offence under section 66F of the Information Technology Act, 2000. It is punishable with
imprisonment for life