SlideShare a Scribd company logo
1 of 10
CYBER
SECURITY
Submitted to: Submitted by:
Ms. Richa Pandey Name: HARSHIT JOSHI
Student ID:23041341
Course: BCA 1st Sem
Graphic Era Hill University
Table of Content
• Cyber security
• History of cyber security
• Latest report in CS
• How to Protect against Cyber Threats
• Tips to Protect Cyber Attack
• Reference
Cyber security:
• Cyber security is the
protection of internet-
connected systems, including
hardware, software and data,
from cyber attacks.
• With an increasing amount of
people getting connected to
internet, the security threats
that cause massive harm are
increasing also.
1/11/2024
https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s-
migr/ul/g/38/9c/maas360-pricing-leadspace.component.xl.ts=1699030834702.png/content/adobe-
cms/us/en/topics/cybersecurity/jcr:content/root/leadspace
3
History of Cyber
Security:
• 1986 : Russian use cyber power
as weapons
( Break security )
• 1988 : American scientist create
a program (or say as Virus)
( to know the size of
internet )
1/11/2024 Sample Footer Text 4
Latest Report in CS:
• A serious threat lurking around, Cyber
attacks on India
Around 1.6 million attacks were reported
in the year 2020.
• SIM Swap Fraud: Two men arrested
doing fraudulent activities concerning
money transfers from the bank accounts
of numerous individuals by getting their
SIM card information through illegal
means.
• Cyber Attack on Cosmos Bank: A
1/11/2024 Sample Footer Text 5
How to Protect against Cyber Threats
• Strong Passwords:
• Create unique and complex passwords for all accounts and
update them regularly.
• Enable 2FA when available, adding an extra layer of
security by requiring a second verification method.
• Regular Software Updates
Protecting Personal Information
• Avoid sharing personal information on unsecured websites or with
unknown individuals.
• Secure Wi-Fi Networks:
• Use strong passwords and encryption to secure your home or office
Wi-Fi networks.
• Use Virtual Private Networks (VPNs):
Tips to Protect
Cyber Attack:
• 1. Make a Backup of your Data
• 2. keep track of Who Access your
System
• 3. Wi-Fi Protection
• 4. Personal Accounts for Employees
• 5. Separate Username and Passwords
• 6. Create Manual Cybersecurity
Policies
• 7. Set Online Safety Guidelines
1/11/2024 Sample Footer Text 8
Reference:
• https://www.google.com/search?q=latest+report+in+cyber+security&s
ource=lmns&bih=707&biw=1536&rlz=1C1VDKB_enIN1080IN1080
&hl=en&sa=X&ved=2ahUKEwjJ-
aCO2vOCAxVSoekKHWanBnoQ_AUoAHoECAEQAA
• https://portswigger.net/daily-swig/cyber-attacks
• https://www.bing.com/opaluqu/v1?q=major+cyber+attacks+in+india&
input=2&uquresponseformat=1&uqubfprlg=1&form=ANNTH1&refig
=135f57ac35de4946b08983c7fc7cbf67&pc=NMTS
Thank you
1/11/2024 Sample Footer Text 10

More Related Content

Similar to HARSHIT_JOSHI_(CS)[1].pptx

6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
alinainglis
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 

Similar to HARSHIT_JOSHI_(CS)[1].pptx (20)

Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptxU11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

HARSHIT_JOSHI_(CS)[1].pptx

  • 1. CYBER SECURITY Submitted to: Submitted by: Ms. Richa Pandey Name: HARSHIT JOSHI Student ID:23041341 Course: BCA 1st Sem Graphic Era Hill University
  • 2. Table of Content • Cyber security • History of cyber security • Latest report in CS • How to Protect against Cyber Threats • Tips to Protect Cyber Attack • Reference
  • 3. Cyber security: • Cyber security is the protection of internet- connected systems, including hardware, software and data, from cyber attacks. • With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also. 1/11/2024 https://www.ibm.com/content/dam/connectedassets-adobe-cms/worldwide-content/creative-assets/s- migr/ul/g/38/9c/maas360-pricing-leadspace.component.xl.ts=1699030834702.png/content/adobe- cms/us/en/topics/cybersecurity/jcr:content/root/leadspace 3
  • 4. History of Cyber Security: • 1986 : Russian use cyber power as weapons ( Break security ) • 1988 : American scientist create a program (or say as Virus) ( to know the size of internet ) 1/11/2024 Sample Footer Text 4
  • 5. Latest Report in CS: • A serious threat lurking around, Cyber attacks on India Around 1.6 million attacks were reported in the year 2020. • SIM Swap Fraud: Two men arrested doing fraudulent activities concerning money transfers from the bank accounts of numerous individuals by getting their SIM card information through illegal means. • Cyber Attack on Cosmos Bank: A 1/11/2024 Sample Footer Text 5
  • 6. How to Protect against Cyber Threats • Strong Passwords: • Create unique and complex passwords for all accounts and update them regularly. • Enable 2FA when available, adding an extra layer of security by requiring a second verification method. • Regular Software Updates
  • 7. Protecting Personal Information • Avoid sharing personal information on unsecured websites or with unknown individuals. • Secure Wi-Fi Networks: • Use strong passwords and encryption to secure your home or office Wi-Fi networks. • Use Virtual Private Networks (VPNs):
  • 8. Tips to Protect Cyber Attack: • 1. Make a Backup of your Data • 2. keep track of Who Access your System • 3. Wi-Fi Protection • 4. Personal Accounts for Employees • 5. Separate Username and Passwords • 6. Create Manual Cybersecurity Policies • 7. Set Online Safety Guidelines 1/11/2024 Sample Footer Text 8
  • 10. Thank you 1/11/2024 Sample Footer Text 10