SlideShare a Scribd company logo
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Presented By:
Presented By:
Pintu
Pintu Basak
Basak
JTO/NSCBTTC/
JTO/NSCBTTC/Kalyani
Kalyani
Contents
Contents
• What is Cyber Security?
• Why Cyber Security?
• Indication of Infections
• Major Security Problems
• Cyber Security Facts and Stats
• What is Cyber Crime?
Advantages of Cyber Security
What is Cyber Crime?
• Advantages of Cyber Security
• SafetyTips
• Mobile Phone Security
• Banking Security
• Cyber Security Question
• Tools used in Cyber Security
• Conclusion
• Reference
What is Cyber Security?
What is Cyber Security?
• Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
attacks, vulnerabilities, damages and unauthorized access.
• Cyber security standards are security standards which
enable organizations or individuals to practice safe security
enable organizations or individuals to practice safe security
techniquesto minimize the number of successful cyber
security attacks.
• Cyber security is very important for network, data and
applications.
Why Cyber Security?
Why Cyber Security?
• Confidentiality, Integrity and
Availability have served as
the standard for computer
Security since the time of
Security since the time of
first mainframes.
Confidentiality
Confidentiality
Protecting
information from
Example:
Criminal steals
customers’ usernames,
passwords, or credit
card information
information from
unauthorized
access and
disclosure
Integrity
Integrity
Protecting
information from
Example:
Someone alters payroll
information or a
proposed product
design.
information from
unauthorized
modification
design.
Availability
Availability
Preventing
Example:
Your customers
are unable to
access your
online services
Preventing
disruption in how
information is
accessed
Indication of Infections
Indication of Infections
• Poor System Performance
• Delayed network speed
• Crashing of Applications
• Abnormal System Behavior
• Unknown Services are running
• System Not Shutting Down
• Hard Disk is Busy
• Random error codes popping up
• Pop ups ads, warnings, and other
unwanted material
• Browser pages redirecting to a
• Unknown Services are running
• Change in file extension or
contents
• Automatic shutdown of System
• Browser pages redirecting to a
website you’ve never interacted
with
• Password locked out of
important files or the system
itself
System vulnerabilities to attack
System vulnerabilities to attack
• Use of Default User Accounts and Password
• Remote Access Not Disabled /Allowing Remote Access
• No proper Access Controls on Files
• Non Availability of Updated Antivirus and Firewall
• Non Availability of Updated Antivirus and Firewall
• Un-necessary Services running
Major Security Problems
Major Security Problems
• Virus and worms
• Malware
• Spyware
• Adware
• Denial of Service
• Spam Email
• Ransomware
• Key Logger
• Adware
• Hacking
• Phishing
• Trojan horses
• Key Logger
• ATM Skimming and Point of Sale
• Password Cracking
crimes
Viruses and Worms
Viruses and Worms
• AVirus is a “program that is
loaded onto your computer
without your knowledge and
runs against your wishes.
runs against your wishes.
• Viruses Attach themselves to
a file.
• Worms don’t need to attach
themselves.
Solution
Solution
• Install a security suite that protects the computer against
threats such as viruses and worms.
Malware
Malware
• The word "malware" comes from the term "MALicious
softWARE. “ Malware is any software that infects and
damages a computer system without the owner's knowledge
or permission.
How to stop Malware
How to stop Malware
• Download an anti-malware
program that also helps prevent
infections.
• Activate Network Threat
• Activate Network Threat
Protection, Firewall,Antivirus.
Spyware
Spyware
• Spyware is a type of
malware that hackers use to
spy on you in order to gain
access to your personal
information, banking
information, banking
details, or online activity.
• We should protect
ourselves by installing an
anti-spyware tool.
Adware
Adware
• Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that
could potentially be
could potentially be
dangerous for your device.
• The best way to remove
adware is to use an adware
removal tool.
Hacking
Hacking
• Hacking in simple terms
means an illegal intrusion into
a computer system and/or
network.
• Hacker is a person who
• Hacker is a person who
breaks into computers, usually
by gaining access to
administrative controls.
Types of Hackers
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
White Hat Hacker
White Hat Hacker
• Individual professing hacker
skills and using them for
defensive purposes and also
known as Security analyst
Black Hat Hacker
Black Hat Hacker
• Individuals with extraordinary
computing skills, restoring to
malicious or destructive
activist.
Gray Hat Hacker
Gray Hat Hacker
• Individuals who work both
offensively and defensively
at various times
How to prevent hacking
How to prevent hacking
• It may be impossible to
prevent computer hacking,
however effective security
controls including strong
passwords, and the use of
passwords, and the use of
firewalls can helps.
Phishing
Phishing
• Phishing is a fraudulent attempt, usually made through email,
to steal your personal and sensitive information such as
username, password and credit card details.
• A common online phishing scam starts with an email message
that appears to come from a trusted source(legitimate site)
that appears to come from a trusted source(legitimate site)
but actually directs recipients to provide information to a
fraudulent web site.
Phishing
Phishing
Trojan Horses
Trojan Horses
• Trojan is a type of malware that pretends
to be something useful, helpful, or fun
while actually causing harm or stealing
data.
• Trojans are often silently downloading
• Trojans are often silently downloading
other malware (e.g. spyware, adware,
ransomware) on an infected device as
well.
How to avoid Trojan Horses
How to avoid Trojan Horses
• Security suites, such as Avast,
McAfee Internet Security, will
prevent you from downloading
Trojan Horses.
Denial of Service
Denial of Service
• This is an act by the criminals who floods the Bandwidth of
the victims network.
• In the DoS attack, a hacker uses internet connection to flood
a target with fake request-usually in an attempt to exhaust
server resources or until the target cannot respond or simply
server resources or until the target cannot respond or simply
crashes.
• On the other hand, DDoS attacks are launched from multiple
connected devices that are distributed across the internet.
Denial of Service
Denial of Service
• DoS :When a single host
attacks.
• DDoS :When multiple
hosts attack simultaneously
and continuously
and continuously
Spam Email
Spam Email
• Spamming is the use of electronic messaging systems to
send unsolicited messages (spam), especially advertising, as
well as sending messages repeatedly from the same site.
• Spam is a serious security
concern as it can be used
concern as it can be used
to deliverTrojan horses,
viruses, worms, spyware,
and targeted phishing attacks.
Ransomware
Ransomware
• Hackers use this technique to lock you out of your devices and
demand a ransom money in return for access.
• The most dangerous ransomware attacks are caused by
Wannacry, Petya,Cerber and Locky ransomware.
Keylogger
Keylogger
• Keylogger also known as a keystroke logger or system monitor.
It can be a program or a hardware installed in the system,
which log each key strokes and map it to a text file and send it
to the creator.
ATM Skimming and Point of Sale Crimes
ATM Skimming and Point of Sale Crimes
• It is a technique of compromising the ATM machine by
installing a skimming device, at top of the machine keypad to
appear as a genuine keypad or a device made to be affixed to
the card reader to look like a part of the machine.
• Successful implementation of skimmers cause in ATM
• Successful implementation of skimmers cause in ATM
machine to collect card numbers and personal identification
number that are later replicated to carry out fraudulent
transaction.
Password Cracking
Password Cracking
• Password attacks are attacks
by hackers that are able to
determine passwords or find
passwords to different
protected electronic areas and
protected electronic areas and
social network sites.
Securing Password
Securing Password
• Use always Strong password.
• Never use same password for
two different sites.
Cyber Security Facts and Stats
Cyber Security Facts and Stats
• There is a hacker attack every 39 seconds
• 95% of breached records came from only three industries in
2016
• 43% of cyber attacks target small business
• The average cost of a data breach in 2020 will exceed $150
• The average cost of a data breach in 2020 will exceed $150
million
• Over 75% of healthcare industry has been infected with
malware over last year
Cyber Security Facts and Stats
Cyber Security Facts and Stats
• Large-scale DDoS attacks increase in size by 500%
• Approximately $6 trillion is expected to be spent globally on
cyber security by 2021
• More than 77% of organizations do not have a Cyber Security
• More than 77% of organizations do not have a Cyber Security
Incident Response plan
• Share prices fall 7.27% on average after a breach
What is Cyber Crime?
What is Cyber Crime?
• Any criminal act done with the help of computer or any
electronic devices through internet is Cyber Crime.
• Unlawful act wherein the computer is either a tool or target
or both.
Cyber Crimes includes
Cyber Crimes includes
• Illegal access
• Illegal Interception
• System Interference
• Data Interference
• Data Interference
• Misuse of devices
• Fraud
History of Cyber Crime
History of Cyber Crime
• The first cyber crime was recorded in the year1820.
• The first spam email took place in 1978 when it was sent over
the ARPANet.
• On January 18, 1994, the first large scale spam hit the USENET.
• On January 18, 1994, the first large scale spam hit the USENET.
“Global Alert for All: Jesus is Coming Soon” was cross-
posted to every available newsgroup by a student.
• The firstVirus, Elk Cloner was installed on an Apple Computer
in 1982 written by Rich Skrenta.
Advantages of Cyber Security
Advantages of Cyber Security
• It will defend from hacks and viruses.
• It helps us to browse the safe website.
• Internet Security processes all the incoming and outgoing data
on our computer.
The cyber security will defend us from critical attacks.
• The cyber security will defend us from critical attacks.
• Protection for data and network
• Prevention of unauthorized users
• Protection to end users
Safety Tips
Safety Tips
• Read Privacy policy carefully when you submit the data through
internet.
• Encryption: lots of website uses SSL (secure socket layer)to
encrypt a data.
• Disable remote connectivity.
• Disable remote connectivity.
• The application of cyber security used in our PC needs update
every week.
• The security developers update their database every week . Hence
the new virus also deleted.
Safety Tips
Safety Tips
• Monitor for any changes in Configuration of ‘High risk’ devices
• Monitor Failed Login Attempts, Unusual Traffic, Changes to the
Firewall,Access Grants to Firewall
• Keep OS Updated
• Install Security Patches for OS
• Install Security Patches for OS
• Harden OS by turning off unnecessary Services and features
• Do not Install Programs of unknown origin
• Take precautions while using emails
Mobile Phone security
Mobile Phone security
• Use a strong password, Pattern lock
• Face and Finger print detection is
better
• Screen Lock/ App Lock
• Never store username/password in
• Never store username/password in
mobile
• Software Updates
• VPN
Banking Security
Banking Security
• Change Password and PIN (in a period of around 3 months)
• Do not use your same email password
• Always use HTTPS server while online transactions
• Use osk instead of our physical keyboard to login to banking sites.
• Go for the OTP instead of security password.
Do not share OTP to some other parties
Go for the OTP instead of security password.
• Do not share OTP to some other parties
• Never Response to anonymous call asking for your Account No,
Credit Card No,Transaction OTP etc.
• Use MPIN in UPI Transactions
• E-wallet Security
Real Time Cyber Security
Real Time Cyber Security
Question & Solution
Question & Solution
How do I know if an App is safe?
How do I know if an App is safe?
• Download apps from official app stores like App Store or
Google's Play Store only.
• Read the user reviews.
• Check out the developer. Rovio Entertainment makes Angry
• Check out the developer. Rovio Entertainment makes Angry
Birds Space; if you're downloading the game from other
developer, you're probably going to regret it.
• Install a mobile security app.
If an app is safe, is there anything to
If an app is safe, is there anything to
worry about it?
worry about it?
• Most free apps stay free by displaying messages from third-
party ad networks.
• Since the ad code comes from remote servers, it could
• Since the ad code comes from remote servers, it could
contain all kinds of bad things, including "root" apps that can
snatch complete control of your phone.
Is it safe to check my bank account on
Is it safe to check my bank account on
my phone?
my phone?
• "Short answer, 'Yes with an if,’ long answer, 'No with a but.’"
• Basically, we're pretty safe if we play it smart and have some
antispyware and malware protection in place.
Is every internet connection safe?
Is every internet connection safe?
• Cellular carrier's 3G or 4G network should be relatively secure.
• Wi-Fi hotspots can be a hacking honeypot
• Use only SecureWi-Fi (encrypted withWPA2 )
Use only the secure websites for sensitive operations.
• Use only the secure websites for sensitive operations.
• Turn-off the Wi-Fi once work is done.
I am using an unsecuredWi
I am using an unsecuredWi-
-Fi from my
Fi from my
neighbor. Is it possible for them to get
neighbor. Is it possible for them to get
access to my login ID and password?
access to my login ID and password?
• Yes, it is possible to access my IP address, passwords, GPS
tracking, and others information.
tracking, and others information.
• There is every chance that the connection could be used to
hack the device, gain access to the system, or attribute the
unwanted browsing history to me.
Tools used in Cyber Security
Tools used in Cyber Security
• Professional Look at Net
• F-RAT
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
F
F-
-RAT
RAT
F
F-
-RAT
RAT
F
F-
-RAT
RAT
F
F-
-RAT
RAT
Conclusion
Conclusion
• The only system which is truly secure is one which is switched
off and unplugged.
• So , only way to be safe is Pay attention and Act smart.
References
References
• https://en.wikipedia.org
• http://www.howstuffworks.com
• https://www.eccouncil.org
• https://www.slideshare.net
• https://techterms.com
• https://www.safetydetectives.com
• https://www.safetydetectives.com
• https://www.free-power-point-templates.com
• https://www.edureka.co/
• https://www.guru99.com
• https://www.webroot.com
• https://wikipedia.org
Any Question?
Any Question?
ThankYou
ThankYou

More Related Content

What's hot

Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system
운상 조
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
Dedi Dwianto
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Raheela Patel
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
Nitesh Dubey
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 

What's hot (20)

Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
cyber security
cyber security cyber security
cyber security
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 

Similar to Information & cyber security, Winter training ,bsnl. online

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
AmolKumarPandey2
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
RavinderSingh172970
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
Quick Heal Technologies Ltd.
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
Om Prakash Mishra
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 

Similar to Information & cyber security, Winter training ,bsnl. online (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from SumanPramanik7

ER Model dbms er diagrams
ER Model dbms er diagrams ER Model dbms er diagrams
ER Model dbms er diagrams
SumanPramanik7
 
Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,
SumanPramanik7
 
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
SumanPramanik7
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training
SumanPramanik7
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
SumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
dmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe confdmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe conf
SumanPramanik7
 
Broadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineeringBroadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineering
SumanPramanik7
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
SumanPramanik7
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
SumanPramanik7
 

More from SumanPramanik7 (10)

ER Model dbms er diagrams
ER Model dbms er diagrams ER Model dbms er diagrams
ER Model dbms er diagrams
 
Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,
 
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
dmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe confdmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe conf
 
Broadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineeringBroadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineering
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 

Recently uploaded

Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Information & cyber security, Winter training ,bsnl. online

  • 1. Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Presented By: Presented By: Pintu Pintu Basak Basak JTO/NSCBTTC/ JTO/NSCBTTC/Kalyani Kalyani
  • 2. Contents Contents • What is Cyber Security? • Why Cyber Security? • Indication of Infections • Major Security Problems • Cyber Security Facts and Stats • What is Cyber Crime? Advantages of Cyber Security What is Cyber Crime? • Advantages of Cyber Security • SafetyTips • Mobile Phone Security • Banking Security • Cyber Security Question • Tools used in Cyber Security • Conclusion • Reference
  • 3. What is Cyber Security? What is Cyber Security? • Cyber security refers to the technologies and processes designed to protect computers, networks and data from attacks, vulnerabilities, damages and unauthorized access. • Cyber security standards are security standards which enable organizations or individuals to practice safe security enable organizations or individuals to practice safe security techniquesto minimize the number of successful cyber security attacks. • Cyber security is very important for network, data and applications.
  • 4. Why Cyber Security? Why Cyber Security? • Confidentiality, Integrity and Availability have served as the standard for computer Security since the time of Security since the time of first mainframes.
  • 5. Confidentiality Confidentiality Protecting information from Example: Criminal steals customers’ usernames, passwords, or credit card information information from unauthorized access and disclosure
  • 6. Integrity Integrity Protecting information from Example: Someone alters payroll information or a proposed product design. information from unauthorized modification design.
  • 7. Availability Availability Preventing Example: Your customers are unable to access your online services Preventing disruption in how information is accessed
  • 8. Indication of Infections Indication of Infections • Poor System Performance • Delayed network speed • Crashing of Applications • Abnormal System Behavior • Unknown Services are running • System Not Shutting Down • Hard Disk is Busy • Random error codes popping up • Pop ups ads, warnings, and other unwanted material • Browser pages redirecting to a • Unknown Services are running • Change in file extension or contents • Automatic shutdown of System • Browser pages redirecting to a website you’ve never interacted with • Password locked out of important files or the system itself
  • 9. System vulnerabilities to attack System vulnerabilities to attack • Use of Default User Accounts and Password • Remote Access Not Disabled /Allowing Remote Access • No proper Access Controls on Files • Non Availability of Updated Antivirus and Firewall • Non Availability of Updated Antivirus and Firewall • Un-necessary Services running
  • 10. Major Security Problems Major Security Problems • Virus and worms • Malware • Spyware • Adware • Denial of Service • Spam Email • Ransomware • Key Logger • Adware • Hacking • Phishing • Trojan horses • Key Logger • ATM Skimming and Point of Sale • Password Cracking crimes
  • 11. Viruses and Worms Viruses and Worms • AVirus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. runs against your wishes. • Viruses Attach themselves to a file. • Worms don’t need to attach themselves.
  • 12. Solution Solution • Install a security suite that protects the computer against threats such as viruses and worms.
  • 13. Malware Malware • The word "malware" comes from the term "MALicious softWARE. “ Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 14. How to stop Malware How to stop Malware • Download an anti-malware program that also helps prevent infections. • Activate Network Threat • Activate Network Threat Protection, Firewall,Antivirus.
  • 15. Spyware Spyware • Spyware is a type of malware that hackers use to spy on you in order to gain access to your personal information, banking information, banking details, or online activity. • We should protect ourselves by installing an anti-spyware tool.
  • 16. Adware Adware • Adware is a type of malware that bombards you with endless ads and pop-up windows that could potentially be could potentially be dangerous for your device. • The best way to remove adware is to use an adware removal tool.
  • 17. Hacking Hacking • Hacking in simple terms means an illegal intrusion into a computer system and/or network. • Hacker is a person who • Hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 18. Types of Hackers Types of Hackers • White Hat Hacker • Grey Hat Hacker • Black Hat Hacker
  • 19. White Hat Hacker White Hat Hacker • Individual professing hacker skills and using them for defensive purposes and also known as Security analyst
  • 20. Black Hat Hacker Black Hat Hacker • Individuals with extraordinary computing skills, restoring to malicious or destructive activist.
  • 21. Gray Hat Hacker Gray Hat Hacker • Individuals who work both offensively and defensively at various times
  • 22. How to prevent hacking How to prevent hacking • It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of passwords, and the use of firewalls can helps.
  • 23. Phishing Phishing • Phishing is a fraudulent attempt, usually made through email, to steal your personal and sensitive information such as username, password and credit card details. • A common online phishing scam starts with an email message that appears to come from a trusted source(legitimate site) that appears to come from a trusted source(legitimate site) but actually directs recipients to provide information to a fraudulent web site.
  • 25. Trojan Horses Trojan Horses • Trojan is a type of malware that pretends to be something useful, helpful, or fun while actually causing harm or stealing data. • Trojans are often silently downloading • Trojans are often silently downloading other malware (e.g. spyware, adware, ransomware) on an infected device as well.
  • 26. How to avoid Trojan Horses How to avoid Trojan Horses • Security suites, such as Avast, McAfee Internet Security, will prevent you from downloading Trojan Horses.
  • 27. Denial of Service Denial of Service • This is an act by the criminals who floods the Bandwidth of the victims network. • In the DoS attack, a hacker uses internet connection to flood a target with fake request-usually in an attempt to exhaust server resources or until the target cannot respond or simply server resources or until the target cannot respond or simply crashes. • On the other hand, DDoS attacks are launched from multiple connected devices that are distributed across the internet.
  • 28. Denial of Service Denial of Service • DoS :When a single host attacks. • DDoS :When multiple hosts attack simultaneously and continuously and continuously
  • 29. Spam Email Spam Email • Spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly from the same site. • Spam is a serious security concern as it can be used concern as it can be used to deliverTrojan horses, viruses, worms, spyware, and targeted phishing attacks.
  • 30. Ransomware Ransomware • Hackers use this technique to lock you out of your devices and demand a ransom money in return for access. • The most dangerous ransomware attacks are caused by Wannacry, Petya,Cerber and Locky ransomware.
  • 31. Keylogger Keylogger • Keylogger also known as a keystroke logger or system monitor. It can be a program or a hardware installed in the system, which log each key strokes and map it to a text file and send it to the creator.
  • 32. ATM Skimming and Point of Sale Crimes ATM Skimming and Point of Sale Crimes • It is a technique of compromising the ATM machine by installing a skimming device, at top of the machine keypad to appear as a genuine keypad or a device made to be affixed to the card reader to look like a part of the machine. • Successful implementation of skimmers cause in ATM • Successful implementation of skimmers cause in ATM machine to collect card numbers and personal identification number that are later replicated to carry out fraudulent transaction.
  • 33.
  • 34. Password Cracking Password Cracking • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and protected electronic areas and social network sites.
  • 35. Securing Password Securing Password • Use always Strong password. • Never use same password for two different sites.
  • 36. Cyber Security Facts and Stats Cyber Security Facts and Stats • There is a hacker attack every 39 seconds • 95% of breached records came from only three industries in 2016 • 43% of cyber attacks target small business • The average cost of a data breach in 2020 will exceed $150 • The average cost of a data breach in 2020 will exceed $150 million • Over 75% of healthcare industry has been infected with malware over last year
  • 37. Cyber Security Facts and Stats Cyber Security Facts and Stats • Large-scale DDoS attacks increase in size by 500% • Approximately $6 trillion is expected to be spent globally on cyber security by 2021 • More than 77% of organizations do not have a Cyber Security • More than 77% of organizations do not have a Cyber Security Incident Response plan • Share prices fall 7.27% on average after a breach
  • 38. What is Cyber Crime? What is Cyber Crime? • Any criminal act done with the help of computer or any electronic devices through internet is Cyber Crime. • Unlawful act wherein the computer is either a tool or target or both.
  • 39. Cyber Crimes includes Cyber Crimes includes • Illegal access • Illegal Interception • System Interference • Data Interference • Data Interference • Misuse of devices • Fraud
  • 40. History of Cyber Crime History of Cyber Crime • The first cyber crime was recorded in the year1820. • The first spam email took place in 1978 when it was sent over the ARPANet. • On January 18, 1994, the first large scale spam hit the USENET. • On January 18, 1994, the first large scale spam hit the USENET. “Global Alert for All: Jesus is Coming Soon” was cross- posted to every available newsgroup by a student. • The firstVirus, Elk Cloner was installed on an Apple Computer in 1982 written by Rich Skrenta.
  • 41. Advantages of Cyber Security Advantages of Cyber Security • It will defend from hacks and viruses. • It helps us to browse the safe website. • Internet Security processes all the incoming and outgoing data on our computer. The cyber security will defend us from critical attacks. • The cyber security will defend us from critical attacks. • Protection for data and network • Prevention of unauthorized users • Protection to end users
  • 42. Safety Tips Safety Tips • Read Privacy policy carefully when you submit the data through internet. • Encryption: lots of website uses SSL (secure socket layer)to encrypt a data. • Disable remote connectivity. • Disable remote connectivity. • The application of cyber security used in our PC needs update every week. • The security developers update their database every week . Hence the new virus also deleted.
  • 43. Safety Tips Safety Tips • Monitor for any changes in Configuration of ‘High risk’ devices • Monitor Failed Login Attempts, Unusual Traffic, Changes to the Firewall,Access Grants to Firewall • Keep OS Updated • Install Security Patches for OS • Install Security Patches for OS • Harden OS by turning off unnecessary Services and features • Do not Install Programs of unknown origin • Take precautions while using emails
  • 44. Mobile Phone security Mobile Phone security • Use a strong password, Pattern lock • Face and Finger print detection is better • Screen Lock/ App Lock • Never store username/password in • Never store username/password in mobile • Software Updates • VPN
  • 45. Banking Security Banking Security • Change Password and PIN (in a period of around 3 months) • Do not use your same email password • Always use HTTPS server while online transactions • Use osk instead of our physical keyboard to login to banking sites. • Go for the OTP instead of security password. Do not share OTP to some other parties Go for the OTP instead of security password. • Do not share OTP to some other parties • Never Response to anonymous call asking for your Account No, Credit Card No,Transaction OTP etc. • Use MPIN in UPI Transactions • E-wallet Security
  • 46. Real Time Cyber Security Real Time Cyber Security Question & Solution Question & Solution
  • 47. How do I know if an App is safe? How do I know if an App is safe? • Download apps from official app stores like App Store or Google's Play Store only. • Read the user reviews. • Check out the developer. Rovio Entertainment makes Angry • Check out the developer. Rovio Entertainment makes Angry Birds Space; if you're downloading the game from other developer, you're probably going to regret it. • Install a mobile security app.
  • 48. If an app is safe, is there anything to If an app is safe, is there anything to worry about it? worry about it? • Most free apps stay free by displaying messages from third- party ad networks. • Since the ad code comes from remote servers, it could • Since the ad code comes from remote servers, it could contain all kinds of bad things, including "root" apps that can snatch complete control of your phone.
  • 49. Is it safe to check my bank account on Is it safe to check my bank account on my phone? my phone? • "Short answer, 'Yes with an if,’ long answer, 'No with a but.’" • Basically, we're pretty safe if we play it smart and have some antispyware and malware protection in place.
  • 50. Is every internet connection safe? Is every internet connection safe? • Cellular carrier's 3G or 4G network should be relatively secure. • Wi-Fi hotspots can be a hacking honeypot • Use only SecureWi-Fi (encrypted withWPA2 ) Use only the secure websites for sensitive operations. • Use only the secure websites for sensitive operations. • Turn-off the Wi-Fi once work is done.
  • 51. I am using an unsecuredWi I am using an unsecuredWi- -Fi from my Fi from my neighbor. Is it possible for them to get neighbor. Is it possible for them to get access to my login ID and password? access to my login ID and password? • Yes, it is possible to access my IP address, passwords, GPS tracking, and others information. tracking, and others information. • There is every chance that the connection could be used to hack the device, gain access to the system, or attribute the unwanted browsing history to me.
  • 52. Tools used in Cyber Security Tools used in Cyber Security • Professional Look at Net • F-RAT
  • 53. Professional Look at Net Professional Look at Net
  • 54. Professional Look at Net Professional Look at Net
  • 55. Professional Look at Net Professional Look at Net
  • 56. Professional Look at Net Professional Look at Net
  • 61. Conclusion Conclusion • The only system which is truly secure is one which is switched off and unplugged. • So , only way to be safe is Pay attention and Act smart.
  • 62. References References • https://en.wikipedia.org • http://www.howstuffworks.com • https://www.eccouncil.org • https://www.slideshare.net • https://techterms.com • https://www.safetydetectives.com • https://www.safetydetectives.com • https://www.free-power-point-templates.com • https://www.edureka.co/ • https://www.guru99.com • https://www.webroot.com • https://wikipedia.org