SlideShare a Scribd company logo
CENTRAL UNIVERSITY OF RAJASTHAN
DEPARTMENT OF MANAGEMENT
DATA SECURITY
PRESENTED BY :-
HITESH KUMAR
2019MBA011
DATA SECURITY
1) INTRODUCTION
2) COMMON TYPES OF CYBER ATTACK
3) ONLINE SAFETY BASICS
4) KEY ACCOUNTS & DEVICES
5) MANAGING YOUR PRIVACY
6) AADHAAR CARD CONTROVERSY
7) CONCLUSION
8) REFERENCES
1) INTRODUCTION
Data security is a key asset in today’s era
For organizations, protecting privacy and personal data is an
issue of risk and trust.
Protecting privacy mitigates risks of costly incidents,
reputational harm, regulatory penalties, and other harms.
 An organization depends upon the trust of its existing and
prospective customers, clients, business partners, vendors, and
employees.
 When this trust is lost, it can have a devastating impact on an
organization.
2) COMMON TYPES OF CYBER ATTACKS
 MALWARE
 SPYWARE
MALWARE
VIRUS WORMS TROJANS
 VIRUS: Damage Particular file or software
• First Virus Term : Fred Cohen (1985)
• First Network Virus : Creeper [ARPANET - 1970],
oAnti Virus – Reaper (Bob Thomas)
• First PC Virus – ELK Cloner (Richard Skrenla, 1982)
 WORMS : Multiples & Copy, affects speed & Memory
 TROJANS : Fake software i.e. ads like speed boosters, Memory
clearness, Antivirus, affects Backdoor security
NEWS AT GLANCE
 SPYWARE :-
• Key Logger : Get all the information by installing software on
computer system
• Cookies : Software installing for mass marketing & advertising
• Macro Virus : Damages macro programmed software i.e. MS Office
• Boot Sector Virus : Damages Hard disk of Computer, slow speed,
Finish space
• Ransomware : Lock the computer and asks money
3) ONLINE SAFTEY BASICS
i) Spam and Phishing : Cybercriminals attempts to lure people in and
get you to click on a link or open an attachment
 If you are unsure whether an email request is legitimate, try to verify it with
these steps:
• Contact the company directly
• Search for the company online
Enable filters on your email programs
Report spam
Own your online presence
 Keep a clean machine
 What to Do if You Are a Victim
• Report it to the appropriate people within the organization, including
network administrators
• If you believe your financial accounts may be compromised, contact your
financial institution immediately and close the account(s).
• Watch for any unauthorized charges to your account.
• Consider reporting the attack to your local police department, and file a
report with the Federal Trade Commission or the Internet Crime Complaint
Centre.
ii) Shopping Online :-
• Conduct research: new website, positive or negative reviews
• When in doubt, throw it out: Links in emails, posts and texts
• Personal information is like money: value it and protect it, you only need to fill out
required fields at checkout.
• Use safe payment options: Credit cards are generally the safest option
• Don’t be disappointed: Read return policies if the purchase doesn’t go as planned.
• Verify security level : Sure the site is security enabled with https://
iii)Back It Up : Protect yourself against data loss by
making electronic copies – or backups – of important
files.
CDs, DVDs and flash drives
External hard drive
Online backup services
4) SECURING KEY ACCOUNTS AND DEVICES
 Passphrases
• Make your passphrase a sentence
• Unique account, unique passphrase
• Don’t Write it down and keep in mind
Lock down your login
• Fortify your online accounts by enabling the strongest authentication
tools available, such as biometrics, security keys or a unique one-time
code through an app on your mobile device
5) MANAGING YOUR PRIVACY
 Share with care – What you post can last a lifetime
Post only about others as you would like to have them post about you
Own your online presence
Remain positively engaged
Stay current. Keep pace with new ways to stay safe online
6) RIGHT TO PRIVACY ACT
 The Information Technology Act, 2000 (IT Act) is the main act
which deals with the legislation in India governing cybercrimes.
Some of the Sections dealing with Cyber Theft are: -
Section 43: To destroy computer system liable to fine
• Section 66: Three years or with fine which may extend to five lakh
rupees or with both.
• Section 66B: Three years or with fine which may extend to rupees
one lakh or with both.
• Section 66C: Three years and shall also be liable to fine with may
extend to rupees one lakh.
7) AADHAAR CARD CONTROVERSY
AADHAAR
CARD
PASSPORT
PAN CARD
BANK
ACCOUNT
IDENTITY
ADDRESS
PROOF
VOTER ID
• Section 33(2) that allows UIDAI to share data with specially authorized
officers in the interest of national security, was also struck down.
• Aadhaar requirement by CBSE, NEET, and UGC has been struck down, but
Aadhaar-PAN linkage has been upheld.
• Seeding Aadhaar with mobile phone numbers and bank accounts is not
needed. Schools too, cannot insist on Aadhaar for admission of students
• Data collected for authentication purposes can ben held for only six months.
The Aadhaar Act had said that data can be held for five years
7) CONCLUSION
 An attacker needs three things:
• method—the skill and knowledge to perform a successful attack;
• opportunity—time and access by which to attack;
• motive—a reason to want to attack.
o Alas, none of these three is in short supply, which means attacks are inevitable
 Security situations arise in many everyday activities, although sometimes it can be difficult
to distinguish between a security attack and an ordinary human or technological breakdown.
• Alas, clever attackers realize this confusion, so they may make their attack seem like a
simple, random failure
 Therefore, try to control certain threats and vulnerabilities, apply countermeasures that are
reasonable, and accept the risk of harm from uncountered cases
8) REFERENCES
• The HINDU newspaper
• https://staysafeonline.org
• http://www.informit.com
• Fundamentals-Cyber-Security
oBy Mayank-Bhushan


More Related Content

What's hot

Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
Darlene Enderez
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
Chiheb Chebbi
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Phishing
PhishingPhishing
Phishing
Alka Falwaria
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
anshutomar6
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
Mayank Kashyap
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
Wisnu Dewobroto
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 

What's hot (20)

Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Phishing
PhishingPhishing
Phishing
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 

Similar to Data security

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Vishwajeet Singh
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyberCyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyber
harshalgkharat
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Cyber security
Cyber securityCyber security
Cyber security
Satbharai Sethar
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
Accenture
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
NilKhunt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Deepak Shrivastava
 
techalpha07
techalpha07techalpha07

Similar to Data security (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyberCyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyber
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
techalpha07
techalpha07techalpha07
techalpha07
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Data security

  • 1. CENTRAL UNIVERSITY OF RAJASTHAN DEPARTMENT OF MANAGEMENT DATA SECURITY PRESENTED BY :- HITESH KUMAR 2019MBA011
  • 2. DATA SECURITY 1) INTRODUCTION 2) COMMON TYPES OF CYBER ATTACK 3) ONLINE SAFETY BASICS 4) KEY ACCOUNTS & DEVICES 5) MANAGING YOUR PRIVACY 6) AADHAAR CARD CONTROVERSY 7) CONCLUSION 8) REFERENCES
  • 3. 1) INTRODUCTION Data security is a key asset in today’s era For organizations, protecting privacy and personal data is an issue of risk and trust. Protecting privacy mitigates risks of costly incidents, reputational harm, regulatory penalties, and other harms.  An organization depends upon the trust of its existing and prospective customers, clients, business partners, vendors, and employees.  When this trust is lost, it can have a devastating impact on an organization.
  • 4. 2) COMMON TYPES OF CYBER ATTACKS  MALWARE  SPYWARE MALWARE VIRUS WORMS TROJANS
  • 5.  VIRUS: Damage Particular file or software • First Virus Term : Fred Cohen (1985) • First Network Virus : Creeper [ARPANET - 1970], oAnti Virus – Reaper (Bob Thomas) • First PC Virus – ELK Cloner (Richard Skrenla, 1982)  WORMS : Multiples & Copy, affects speed & Memory  TROJANS : Fake software i.e. ads like speed boosters, Memory clearness, Antivirus, affects Backdoor security
  • 7.  SPYWARE :- • Key Logger : Get all the information by installing software on computer system • Cookies : Software installing for mass marketing & advertising • Macro Virus : Damages macro programmed software i.e. MS Office • Boot Sector Virus : Damages Hard disk of Computer, slow speed, Finish space • Ransomware : Lock the computer and asks money
  • 8. 3) ONLINE SAFTEY BASICS i) Spam and Phishing : Cybercriminals attempts to lure people in and get you to click on a link or open an attachment  If you are unsure whether an email request is legitimate, try to verify it with these steps: • Contact the company directly • Search for the company online Enable filters on your email programs Report spam Own your online presence
  • 9.  Keep a clean machine  What to Do if You Are a Victim • Report it to the appropriate people within the organization, including network administrators • If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s). • Watch for any unauthorized charges to your account. • Consider reporting the attack to your local police department, and file a report with the Federal Trade Commission or the Internet Crime Complaint Centre.
  • 10. ii) Shopping Online :- • Conduct research: new website, positive or negative reviews • When in doubt, throw it out: Links in emails, posts and texts • Personal information is like money: value it and protect it, you only need to fill out required fields at checkout. • Use safe payment options: Credit cards are generally the safest option • Don’t be disappointed: Read return policies if the purchase doesn’t go as planned. • Verify security level : Sure the site is security enabled with https://
  • 11. iii)Back It Up : Protect yourself against data loss by making electronic copies – or backups – of important files. CDs, DVDs and flash drives External hard drive Online backup services
  • 12. 4) SECURING KEY ACCOUNTS AND DEVICES  Passphrases • Make your passphrase a sentence • Unique account, unique passphrase • Don’t Write it down and keep in mind Lock down your login • Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device
  • 13. 5) MANAGING YOUR PRIVACY  Share with care – What you post can last a lifetime Post only about others as you would like to have them post about you Own your online presence Remain positively engaged Stay current. Keep pace with new ways to stay safe online
  • 14. 6) RIGHT TO PRIVACY ACT  The Information Technology Act, 2000 (IT Act) is the main act which deals with the legislation in India governing cybercrimes. Some of the Sections dealing with Cyber Theft are: - Section 43: To destroy computer system liable to fine • Section 66: Three years or with fine which may extend to five lakh rupees or with both. • Section 66B: Three years or with fine which may extend to rupees one lakh or with both. • Section 66C: Three years and shall also be liable to fine with may extend to rupees one lakh.
  • 15. 7) AADHAAR CARD CONTROVERSY AADHAAR CARD PASSPORT PAN CARD BANK ACCOUNT IDENTITY ADDRESS PROOF VOTER ID
  • 16. • Section 33(2) that allows UIDAI to share data with specially authorized officers in the interest of national security, was also struck down. • Aadhaar requirement by CBSE, NEET, and UGC has been struck down, but Aadhaar-PAN linkage has been upheld. • Seeding Aadhaar with mobile phone numbers and bank accounts is not needed. Schools too, cannot insist on Aadhaar for admission of students • Data collected for authentication purposes can ben held for only six months. The Aadhaar Act had said that data can be held for five years
  • 17.
  • 18. 7) CONCLUSION  An attacker needs three things: • method—the skill and knowledge to perform a successful attack; • opportunity—time and access by which to attack; • motive—a reason to want to attack. o Alas, none of these three is in short supply, which means attacks are inevitable  Security situations arise in many everyday activities, although sometimes it can be difficult to distinguish between a security attack and an ordinary human or technological breakdown. • Alas, clever attackers realize this confusion, so they may make their attack seem like a simple, random failure  Therefore, try to control certain threats and vulnerabilities, apply countermeasures that are reasonable, and accept the risk of harm from uncountered cases
  • 19. 8) REFERENCES • The HINDU newspaper • https://staysafeonline.org • http://www.informit.com • Fundamentals-Cyber-Security oBy Mayank-Bhushan
  • 20.