2. Table of Content
• Cyber security
• History of cyber security
• Latest report in CS
• How to Protect against Cyber Threats
• Tips to Protect Cyber Attack
• Reference
3. Cyber security:
• Cyber security is the
protection of internet-
connected systems, including
hardware, software and data,
from cyber attacks.
• With an increasing amount of
people getting connected to
internet, the security threats
that cause massive harm are
increasing also.
1/11/2024
https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-
migr/ul/g/38/9c/maas360-pricing-leadspace.component.xl.ts=1699030834702.png/content/adobe-
cms/us/en/topics/cybersecurity/jcr:content/root/leadspace
3
4. History of Cyber
Security:
• 1986 : Russian use cyber power
as weapons
( Break security )
• 1988 : American scientist create
a program (or say as Virus)
( to know the size of
internet )
1/11/2024 Sample Footer Text 4
5. Latest Report in CS:
• A serious threat lurking around, Cyber
attacks on India
Around 1.6 million attacks were reported
in the year 2020.
• SIM Swap Fraud: Two men arrested
doing fraudulent activities concerning
money transfers from the bank accounts
of numerous individuals by getting their
SIM card information through illegal
means.
• Cyber Attack on Cosmos Bank: A
1/11/2024 Sample Footer Text 5
6. How to Protect against Cyber Threats
• Strong Passwords:
• Create unique and complex passwords for all accounts and
update them regularly.
• Enable 2FA when available, adding an extra layer of
security by requiring a second verification method.
• Regular Software Updates
7. Protecting Personal Information
• Avoid sharing personal information on unsecured websites or with
unknown individuals.
• Secure Wi-Fi Networks:
• Use strong passwords and encryption to secure your home or office
Wi-Fi networks.
• Use Virtual Private Networks (VPNs):
8. Tips to Protect
Cyber Attack:
• 1. Make a Backup of your Data
• 2. keep track of Who Access your
System
• 3. Wi-Fi Protection
• 4. Personal Accounts for Employees
• 5. Separate Username and Passwords
• 6. Create Manual Cybersecurity
Policies
• 7. Set Online Safety Guidelines
1/11/2024 Sample Footer Text 8