This document provides an overview of information and cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from attacks, vulnerabilities, damages, and unauthorized access. It discusses why cyber security is important by explaining the principles of confidentiality, integrity, and availability. It also covers common cyber security threats like viruses, malware, hacking, phishing, and denial of service attacks. The document provides tips on cyber security best practices for passwords, mobile devices, banking, and more. It introduces tools used in cyber security like Network Pro and F-RAT and concludes by emphasizing the importance of vigilance in maintaining security.
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
This Edureka PPT on "Application Security" will help you understand what application security is and measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities.
Following are the topics covered in this PPT:
Introduction to Cybersecurity
What is Application Security?
What is an SQL Injection attack
Demo on SQL Injection
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.
Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them.
It is information that is relevant to the organization, has business value, and is actionable.
If you having all data and feeds then data alone isn’t intelligence.
#Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
This Edureka PPT on "Application Security" will help you understand what application security is and measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities.
Following are the topics covered in this PPT:
Introduction to Cybersecurity
What is Application Security?
What is an SQL Injection attack
Demo on SQL Injection
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.
Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them.
It is information that is relevant to the organization, has business value, and is actionable.
If you having all data and feeds then data alone isn’t intelligence.
#Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak
A brief introduction to Computer Security and its threats, Security Mechanism(Cryptography, Digital Signature, Firewall, IDS etc) and Security Services.
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "What is Ethical Hacking" (Blog: https://bit.ly/2rmFo9p) will give you an introduction to Ethical Hacking. This is a beginners tutorial covering all the fundamentals of Ethical Hacking. Below are the topics covered in this PPT:
What is Ethical Hacking
Types of Hackers
Types of Hacking
Phases of Ethical Hacking
Reconnaissance
FootPrinting
FingerPrinting
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
malware, types of malware, virus, trojans, worm, rootkit, ransomware, malware protection, malware protection laws India, how malware works, history of malware
In present world, where computers/laptops and smart phone made it possible to extract other's secrets, a need has been imminent to handle such problems by Cyber Security Regime, which not only be launched by individuls(IT Expert) of organizations but the governments of the country should also play a vital role.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
** Edureka Cybersecurity Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this tutorial include:
1. What is Computer security?
2. Goals of Computer security
3. What to secure?- Types of computer security
4. Potential losses due to cyber attacks
5. How to secure?
ETHICAL HACKING AND SOCIAL ENGINEERING
Topics Covered: Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling, Enterprise Information Security Architecture, Vulnerability, Assessment and Penetration Testing, Types of Social Engineering, Insider Attack, Preventing Insider Threats, Social Engineering Targets and Defence Strategies
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
A brief introduction to Computer Security and its threats, Security Mechanism(Cryptography, Digital Signature, Firewall, IDS etc) and Security Services.
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "What is Ethical Hacking" (Blog: https://bit.ly/2rmFo9p) will give you an introduction to Ethical Hacking. This is a beginners tutorial covering all the fundamentals of Ethical Hacking. Below are the topics covered in this PPT:
What is Ethical Hacking
Types of Hackers
Types of Hacking
Phases of Ethical Hacking
Reconnaissance
FootPrinting
FingerPrinting
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
malware, types of malware, virus, trojans, worm, rootkit, ransomware, malware protection, malware protection laws India, how malware works, history of malware
In present world, where computers/laptops and smart phone made it possible to extract other's secrets, a need has been imminent to handle such problems by Cyber Security Regime, which not only be launched by individuls(IT Expert) of organizations but the governments of the country should also play a vital role.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
** Edureka Cybersecurity Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this tutorial include:
1. What is Computer security?
2. Goals of Computer security
3. What to secure?- Types of computer security
4. Potential losses due to cyber attacks
5. How to secure?
ETHICAL HACKING AND SOCIAL ENGINEERING
Topics Covered: Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling, Enterprise Information Security Architecture, Vulnerability, Assessment and Penetration Testing, Types of Social Engineering, Insider Attack, Preventing Insider Threats, Social Engineering Targets and Defence Strategies
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
Information cyber security
1. Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Presented By:
Presented By:
Pintu
Pintu Basak
Basak
JTO/NSCBTTC/
JTO/NSCBTTC/Kalyani
Kalyani
2. Contents
Contents
• What is Cyber Security?
• Why Cyber Security?
• Indication of Infections
• Major Security Problems
• Cyber Security Facts and Stats
• What is Cyber Crime?
Advantages of Cyber Security
What is Cyber Crime?
• Advantages of Cyber Security
• SafetyTips
• Mobile Phone Security
• Banking Security
• Cyber Security Question
• Tools used in Cyber Security
• Conclusion
• Reference
3. What is Cyber Security?
What is Cyber Security?
• Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
attacks, vulnerabilities, damages and unauthorized access.
• Cyber security standards are security standards which
enable organizations or individuals to practice safe security
enable organizations or individuals to practice safe security
techniquesto minimize the number of successful cyber
security attacks.
• Cyber security is very important for network, data and
applications.
4. Why Cyber Security?
Why Cyber Security?
• Confidentiality, Integrity and
Availability have served as
the standard for computer
Security since the time of
Security since the time of
first mainframes.
8. Indication of Infections
Indication of Infections
• Poor System Performance
• Delayed network speed
• Crashing of Applications
• Abnormal System Behavior
• Unknown Services are running
• System Not Shutting Down
• Hard Disk is Busy
• Random error codes popping up
• Pop ups ads, warnings, and other
unwanted material
• Browser pages redirecting to a
• Unknown Services are running
• Change in file extension or
contents
• Automatic shutdown of System
• Browser pages redirecting to a
website you’ve never interacted
with
• Password locked out of
important files or the system
itself
9. System vulnerabilities to attack
System vulnerabilities to attack
• Use of Default User Accounts and Password
• Remote Access Not Disabled /Allowing Remote Access
• No proper Access Controls on Files
• Non Availability of Updated Antivirus and Firewall
• Non Availability of Updated Antivirus and Firewall
• Un-necessary Services running
10. Major Security Problems
Major Security Problems
• Virus and worms
• Malware
• Spyware
• Adware
• Denial of Service
• Spam Email
• Ransomware
• Key Logger
• Adware
• Hacking
• Phishing
• Trojan horses
• Key Logger
• ATM Skimming and Point of Sale
• Password Cracking
crimes
11. Viruses and Worms
Viruses and Worms
• AVirus is a “program that is
loaded onto your computer
without your knowledge and
runs against your wishes.
runs against your wishes.
• Viruses Attach themselves to
a file.
• Worms don’t need to attach
themselves.
13. Malware
Malware
• The word "malware" comes from the term "MALicious
softWARE. “ Malware is any software that infects and
damages a computer system without the owner's knowledge
or permission.
14. How to stop Malware
How to stop Malware
• Download an anti-malware
program that also helps prevent
infections.
• Activate Network Threat
• Activate Network Threat
Protection, Firewall,Antivirus.
15. Spyware
Spyware
• Spyware is a type of
malware that hackers use to
spy on you in order to gain
access to your personal
information, banking
information, banking
details, or online activity.
• We should protect
ourselves by installing an
anti-spyware tool.
16. Adware
Adware
• Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that
could potentially be
could potentially be
dangerous for your device.
• The best way to remove
adware is to use an adware
removal tool.
17. Hacking
Hacking
• Hacking in simple terms
means an illegal intrusion into
a computer system and/or
network.
• Hacker is a person who
• Hacker is a person who
breaks into computers, usually
by gaining access to
administrative controls.
18. Types of Hackers
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
19. White Hat Hacker
White Hat Hacker
• Individual professing hacker
skills and using them for
defensive purposes and also
known as Security analyst
20. Black Hat Hacker
Black Hat Hacker
• Individuals with extraordinary
computing skills, restoring to
malicious or destructive
activist.
21. Gray Hat Hacker
Gray Hat Hacker
• Individuals who work both
offensively and defensively
at various times
22. How to prevent hacking
How to prevent hacking
• It may be impossible to
prevent computer hacking,
however effective security
controls including strong
passwords, and the use of
passwords, and the use of
firewalls can helps.
23. Phishing
Phishing
• Phishing is a fraudulent attempt, usually made through email,
to steal your personal and sensitive information such as
username, password and credit card details.
• A common online phishing scam starts with an email message
that appears to come from a trusted source(legitimate site)
that appears to come from a trusted source(legitimate site)
but actually directs recipients to provide information to a
fraudulent web site.
25. Trojan Horses
Trojan Horses
• Trojan is a type of malware that pretends
to be something useful, helpful, or fun
while actually causing harm or stealing
data.
• Trojans are often silently downloading
• Trojans are often silently downloading
other malware (e.g. spyware, adware,
ransomware) on an infected device as
well.
26. How to avoid Trojan Horses
How to avoid Trojan Horses
• Security suites, such as Avast,
McAfee Internet Security, will
prevent you from downloading
Trojan Horses.
27. Denial of Service
Denial of Service
• This is an act by the criminals who floods the Bandwidth of
the victims network.
• In the DoS attack, a hacker uses internet connection to flood
a target with fake request-usually in an attempt to exhaust
server resources or until the target cannot respond or simply
server resources or until the target cannot respond or simply
crashes.
• On the other hand, DDoS attacks are launched from multiple
connected devices that are distributed across the internet.
28. Denial of Service
Denial of Service
• DoS :When a single host
attacks.
• DDoS :When multiple
hosts attack simultaneously
and continuously
and continuously
29. Spam Email
Spam Email
• Spamming is the use of electronic messaging systems to
send unsolicited messages (spam), especially advertising, as
well as sending messages repeatedly from the same site.
• Spam is a serious security
concern as it can be used
concern as it can be used
to deliverTrojan horses,
viruses, worms, spyware,
and targeted phishing attacks.
30. Ransomware
Ransomware
• Hackers use this technique to lock you out of your devices and
demand a ransom money in return for access.
• The most dangerous ransomware attacks are caused by
Wannacry, Petya,Cerber and Locky ransomware.
31. Keylogger
Keylogger
• Keylogger also known as a keystroke logger or system monitor.
It can be a program or a hardware installed in the system,
which log each key strokes and map it to a text file and send it
to the creator.
32. ATM Skimming and Point of Sale Crimes
ATM Skimming and Point of Sale Crimes
• It is a technique of compromising the ATM machine by
installing a skimming device, at top of the machine keypad to
appear as a genuine keypad or a device made to be affixed to
the card reader to look like a part of the machine.
• Successful implementation of skimmers cause in ATM
• Successful implementation of skimmers cause in ATM
machine to collect card numbers and personal identification
number that are later replicated to carry out fraudulent
transaction.
33.
34. Password Cracking
Password Cracking
• Password attacks are attacks
by hackers that are able to
determine passwords or find
passwords to different
protected electronic areas and
protected electronic areas and
social network sites.
36. Cyber Security Facts and Stats
Cyber Security Facts and Stats
• There is a hacker attack every 39 seconds
• 95% of breached records came from only three industries in
2016
• 43% of cyber attacks target small business
• The average cost of a data breach in 2020 will exceed $150
• The average cost of a data breach in 2020 will exceed $150
million
• Over 75% of healthcare industry has been infected with
malware over last year
37. Cyber Security Facts and Stats
Cyber Security Facts and Stats
• Large-scale DDoS attacks increase in size by 500%
• Approximately $6 trillion is expected to be spent globally on
cyber security by 2021
• More than 77% of organizations do not have a Cyber Security
• More than 77% of organizations do not have a Cyber Security
Incident Response plan
• Share prices fall 7.27% on average after a breach
38. What is Cyber Crime?
What is Cyber Crime?
• Any criminal act done with the help of computer or any
electronic devices through internet is Cyber Crime.
• Unlawful act wherein the computer is either a tool or target
or both.
39. Cyber Crimes includes
Cyber Crimes includes
• Illegal access
• Illegal Interception
• System Interference
• Data Interference
• Data Interference
• Misuse of devices
• Fraud
40. History of Cyber Crime
History of Cyber Crime
• The first cyber crime was recorded in the year1820.
• The first spam email took place in 1978 when it was sent over
the ARPANet.
• On January 18, 1994, the first large scale spam hit the USENET.
• On January 18, 1994, the first large scale spam hit the USENET.
“Global Alert for All: Jesus is Coming Soon” was cross-
posted to every available newsgroup by a student.
• The firstVirus, Elk Cloner was installed on an Apple Computer
in 1982 written by Rich Skrenta.
41. Advantages of Cyber Security
Advantages of Cyber Security
• It will defend from hacks and viruses.
• It helps us to browse the safe website.
• Internet Security processes all the incoming and outgoing data
on our computer.
The cyber security will defend us from critical attacks.
• The cyber security will defend us from critical attacks.
• Protection for data and network
• Prevention of unauthorized users
• Protection to end users
42. Safety Tips
Safety Tips
• Read Privacy policy carefully when you submit the data through
internet.
• Encryption: lots of website uses SSL (secure socket layer)to
encrypt a data.
• Disable remote connectivity.
• Disable remote connectivity.
• The application of cyber security used in our PC needs update
every week.
• The security developers update their database every week . Hence
the new virus also deleted.
43. Safety Tips
Safety Tips
• Monitor for any changes in Configuration of ‘High risk’ devices
• Monitor Failed Login Attempts, Unusual Traffic, Changes to the
Firewall,Access Grants to Firewall
• Keep OS Updated
• Install Security Patches for OS
• Install Security Patches for OS
• Harden OS by turning off unnecessary Services and features
• Do not Install Programs of unknown origin
• Take precautions while using emails
44. Mobile Phone security
Mobile Phone security
• Use a strong password, Pattern lock
• Face and Finger print detection is
better
• Screen Lock/ App Lock
• Never store username/password in
• Never store username/password in
mobile
• Software Updates
• VPN
45. Banking Security
Banking Security
• Change Password and PIN (in a period of around 3 months)
• Do not use your same email password
• Always use HTTPS server while online transactions
• Use osk instead of our physical keyboard to login to banking sites.
• Go for the OTP instead of security password.
Do not share OTP to some other parties
Go for the OTP instead of security password.
• Do not share OTP to some other parties
• Never Response to anonymous call asking for your Account No,
Credit Card No,Transaction OTP etc.
• Use MPIN in UPI Transactions
• E-wallet Security
46. Real Time Cyber Security
Real Time Cyber Security
Question & Solution
Question & Solution
47. How do I know if an App is safe?
How do I know if an App is safe?
• Download apps from official app stores like App Store or
Google's Play Store only.
• Read the user reviews.
• Check out the developer. Rovio Entertainment makes Angry
• Check out the developer. Rovio Entertainment makes Angry
Birds Space; if you're downloading the game from other
developer, you're probably going to regret it.
• Install a mobile security app.
48. If an app is safe, is there anything to
If an app is safe, is there anything to
worry about it?
worry about it?
• Most free apps stay free by displaying messages from third-
party ad networks.
• Since the ad code comes from remote servers, it could
• Since the ad code comes from remote servers, it could
contain all kinds of bad things, including "root" apps that can
snatch complete control of your phone.
49. Is it safe to check my bank account on
Is it safe to check my bank account on
my phone?
my phone?
• "Short answer, 'Yes with an if,’ long answer, 'No with a but.’"
• Basically, we're pretty safe if we play it smart and have some
antispyware and malware protection in place.
50. Is every internet connection safe?
Is every internet connection safe?
• Cellular carrier's 3G or 4G network should be relatively secure.
• Wi-Fi hotspots can be a hacking honeypot
• Use only SecureWi-Fi (encrypted withWPA2 )
Use only the secure websites for sensitive operations.
• Use only the secure websites for sensitive operations.
• Turn-off the Wi-Fi once work is done.
51. I am using an unsecuredWi
I am using an unsecuredWi-
-Fi from my
Fi from my
neighbor. Is it possible for them to get
neighbor. Is it possible for them to get
access to my login ID and password?
access to my login ID and password?
• Yes, it is possible to access my IP address, passwords, GPS
tracking, and others information.
tracking, and others information.
• There is every chance that the connection could be used to
hack the device, gain access to the system, or attribute the
unwanted browsing history to me.
52. Tools used in Cyber Security
Tools used in Cyber Security
• Professional Look at Net
• F-RAT
61. Conclusion
Conclusion
• The only system which is truly secure is one which is switched
off and unplugged.
• So , only way to be safe is Pay attention and Act smart.