SlideShare a Scribd company logo
Cyber
Security
Action against cyber crime
What is cyber security?
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to
minimize the number of successful cyber security attacks.
 Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered via
the Internet by cyber criminals.
 Though, cyber security is important for network, data and
application security.
What is…?
 Communication security-protecting organization
communication media , technology , and content.
 Network security-is the protection of networking
components, connection and content.
 Information security-protection of information and its
critical elements , including the systems and hardware
that use , store or transmit that information.
What is cyber crime?
 The former descriptions were "computer crime",
"computer-related crime" or "crime by computer".
With the pervasion of digital technology, some
new terms like "high-technology" or "information-
age" crime were added to the definition. Also,
Internet brought other new terms, like
"cybercrime" and "net" crime.
History
 The first recorded cyber crime was recorded in the
year 1820.
 The first spam email took place in 1978 when it
was sent over the Arpanet.
 The first Virus was installed on an Apple
Computer in 1982.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Why should we care?
 It is a criminal activity committed on the internet.
 Cyber crime-Where computer is either a tool or
target or both.
How can we protect?
 Read Privacy policy carefully when you submit the
data through internet.
 Encryption: lots of website uses SSL (secure
socket layer)to encrypt a data.
 Disable remote connectivity.
Advantage of cyber security
 It will defend from hacks and virus.
 The application of cyber security used in our PC
needs update every week.
 The security developers will update their database
every week once. Hence the new virus also
deleted.
Safety tips … Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information unless
required
Conclusion
 The only system which is truly secure is one
which is switched off and unplugged.
 So , only way to be safe is Pay attention
and Act smart.
THANK YOU
 Reference
 Jhandad Berchond

More Related Content

What's hot

Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
Kroll
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
Dr. Prashant Vats
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 

What's hot (20)

Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
cyber security
cyber security cyber security
cyber security
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Network security
Network securityNetwork security
Network security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Viewers also liked

Launching New Ventures in Virtual Worlds Oct07
Launching New Ventures in Virtual Worlds  Oct07Launching New Ventures in Virtual Worlds  Oct07
Launching New Ventures in Virtual Worlds Oct07
Jonathon Richter
 
Reaction Paper
Reaction PaperReaction Paper
Reaction Paper
Jeri Cáceres
 
Evaluation Of A De Technology
Evaluation Of A De TechnologyEvaluation Of A De Technology
Evaluation Of A De Technology
alebdaa
 
Trajo De Sociales
Trajo De SocialesTrajo De Sociales
Trajo De Sociales
pipe
 
Filhos SãO Como Navios
Filhos SãO Como NaviosFilhos SãO Como Navios
Filhos SãO Como Navios
JNR
 
2014.2 heros,warriors complete
2014.2 heros,warriors complete2014.2 heros,warriors complete
2014.2 heros,warriors complete
Wisconsin Education Association Council
 
Programmi Scuba Wellness
Programmi Scuba WellnessProgrammi Scuba Wellness
Programmi Scuba Wellness
scubawellness
 
10 04 19 At Large Regional Meeting
10 04 19 At Large Regional Meeting10 04 19 At Large Regional Meeting
10 04 19 At Large Regional Meeting
Virginia Economic Bridge
 
156 blagues
156 blagues156 blagues
156 blagueslyago
 
Manuel msproject
Manuel msprojectManuel msproject
Manuel msprojectAbde Abde
 
Panel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the cameraPanel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the camera
John Blue
 
Competitors analysis and geographical mapping
Competitors analysis and geographical mappingCompetitors analysis and geographical mapping
Competitors analysis and geographical mapping
Abhishek Singh
 
Aircraft structural screws
Aircraft structural screwsAircraft structural screws
Aircraft structural screws
johnschwaner
 
A computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal educationA computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal education
Petric Marina
 
Instel Cultura Ciudadana
Instel Cultura CiudadanaInstel Cultura Ciudadana
Instel Cultura Ciudadana
guest799b95
 
Case Study Barrow V[1]
Case  Study  Barrow V[1]Case  Study  Barrow V[1]
Case Study Barrow V[1]
William Kritsonis
 
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوستبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
Abdullrahman Tayshoori
 
Connecticut mesuring and modeling growth
Connecticut   mesuring and modeling growthConnecticut   mesuring and modeling growth
Connecticut mesuring and modeling growth
John Cronin
 
Redlands City Council Feedback
Redlands City Council FeedbackRedlands City Council Feedback
Redlands City Council Feedback
Placefocus
 
Unidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperioUnidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperio
OMARSAMPERIO
 

Viewers also liked (20)

Launching New Ventures in Virtual Worlds Oct07
Launching New Ventures in Virtual Worlds  Oct07Launching New Ventures in Virtual Worlds  Oct07
Launching New Ventures in Virtual Worlds Oct07
 
Reaction Paper
Reaction PaperReaction Paper
Reaction Paper
 
Evaluation Of A De Technology
Evaluation Of A De TechnologyEvaluation Of A De Technology
Evaluation Of A De Technology
 
Trajo De Sociales
Trajo De SocialesTrajo De Sociales
Trajo De Sociales
 
Filhos SãO Como Navios
Filhos SãO Como NaviosFilhos SãO Como Navios
Filhos SãO Como Navios
 
2014.2 heros,warriors complete
2014.2 heros,warriors complete2014.2 heros,warriors complete
2014.2 heros,warriors complete
 
Programmi Scuba Wellness
Programmi Scuba WellnessProgrammi Scuba Wellness
Programmi Scuba Wellness
 
10 04 19 At Large Regional Meeting
10 04 19 At Large Regional Meeting10 04 19 At Large Regional Meeting
10 04 19 At Large Regional Meeting
 
156 blagues
156 blagues156 blagues
156 blagues
 
Manuel msproject
Manuel msprojectManuel msproject
Manuel msproject
 
Panel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the cameraPanel - Doing what’s right vs. looking for the camera
Panel - Doing what’s right vs. looking for the camera
 
Competitors analysis and geographical mapping
Competitors analysis and geographical mappingCompetitors analysis and geographical mapping
Competitors analysis and geographical mapping
 
Aircraft structural screws
Aircraft structural screwsAircraft structural screws
Aircraft structural screws
 
A computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal educationA computer assisted approach to auditory-verbal education
A computer assisted approach to auditory-verbal education
 
Instel Cultura Ciudadana
Instel Cultura CiudadanaInstel Cultura Ciudadana
Instel Cultura Ciudadana
 
Case Study Barrow V[1]
Case  Study  Barrow V[1]Case  Study  Barrow V[1]
Case Study Barrow V[1]
 
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوستبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
تبسيط الاجراءات عبد الرحمن تيشوري اتصالات طرطوس
 
Connecticut mesuring and modeling growth
Connecticut   mesuring and modeling growthConnecticut   mesuring and modeling growth
Connecticut mesuring and modeling growth
 
Redlands City Council Feedback
Redlands City Council FeedbackRedlands City Council Feedback
Redlands City Council Feedback
 
Unidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperioUnidad 2 actividad 2 redes sociales_omar samperio
Unidad 2 actividad 2 redes sociales_omar samperio
 

Similar to Mian

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
AnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
ShantanuDharekar
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
Cyber Security Infotech
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Home
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
keerthivemireddy
 
Cyber security
Cyber securityCyber security
Cyber security
Krishanu Ghosh
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
Cyber security
Cyber securityCyber security
Cyber security
Komal Samdariya
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Cyber security (1).pptx
Cyber security (1).pptxCyber security (1).pptx
Cyber security (1).pptx
KrishnamSharma3
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
KajalSingh970833
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 

Similar to Mian (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cyber security
cyber securitycyber security
cyber security
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security (1).pptx
Cyber security (1).pptxCyber security (1).pptx
Cyber security (1).pptx
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 

More from Dom Mike

Mm10lifecycle
Mm10lifecycleMm10lifecycle
Mm10lifecycle
Dom Mike
 
Lecture ethics
Lecture ethicsLecture ethics
Lecture ethicsDom Mike
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
Dom Mike
 
Lecture 1 prof practices
Lecture 1 prof practicesLecture 1 prof practices
Lecture 1 prof practices
Dom Mike
 
Lec51 52 pre and post production
Lec51 52 pre and post productionLec51 52 pre and post production
Lec51 52 pre and post production
Dom Mike
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights management
Dom Mike
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencing
Dom Mike
 
Lec28 29 30 animation
Lec28 29 30 animationLec28 29 30 animation
Lec28 29 30 animation
Dom Mike
 
Lec14 15 16 text
Lec14 15 16 textLec14 15 16 text
Lec14 15 16 text
Dom Mike
 
Lec11
Lec11Lec11
Lec11
Dom Mike
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
Dom Mike
 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
Dom Mike
 
Lec5 interactive multimedia tools
Lec5 interactive multimedia toolsLec5 interactive multimedia tools
Lec5 interactive multimedia tools
Dom Mike
 
Lec3 4 mm applications and use
Lec3 4 mm applications and useLec3 4 mm applications and use
Lec3 4 mm applications and use
Dom Mike
 
Lec1 2 introduction
Lec1 2 introductionLec1 2 introduction
Lec1 2 introduction
Dom Mike
 
Introduction
IntroductionIntroduction
Introduction
Dom Mike
 
Ch7
Ch7Ch7
Ch6
Ch6Ch6
Assessing technology landscape
Assessing technology landscapeAssessing technology landscape
Assessing technology landscape
Dom Mike
 
Lecture 2 19-2
Lecture 2 19-2Lecture 2 19-2
Lecture 2 19-2
Dom Mike
 

More from Dom Mike (20)

Mm10lifecycle
Mm10lifecycleMm10lifecycle
Mm10lifecycle
 
Lecture ethics
Lecture ethicsLecture ethics
Lecture ethics
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1 prof practices
Lecture 1 prof practicesLecture 1 prof practices
Lecture 1 prof practices
 
Lec51 52 pre and post production
Lec51 52 pre and post productionLec51 52 pre and post production
Lec51 52 pre and post production
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights management
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencing
 
Lec28 29 30 animation
Lec28 29 30 animationLec28 29 30 animation
Lec28 29 30 animation
 
Lec14 15 16 text
Lec14 15 16 textLec14 15 16 text
Lec14 15 16 text
 
Lec11
Lec11Lec11
Lec11
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
 
Lec5 interactive multimedia tools
Lec5 interactive multimedia toolsLec5 interactive multimedia tools
Lec5 interactive multimedia tools
 
Lec3 4 mm applications and use
Lec3 4 mm applications and useLec3 4 mm applications and use
Lec3 4 mm applications and use
 
Lec1 2 introduction
Lec1 2 introductionLec1 2 introduction
Lec1 2 introduction
 
Introduction
IntroductionIntroduction
Introduction
 
Ch7
Ch7Ch7
Ch7
 
Ch6
Ch6Ch6
Ch6
 
Assessing technology landscape
Assessing technology landscapeAssessing technology landscape
Assessing technology landscape
 
Lecture 2 19-2
Lecture 2 19-2Lecture 2 19-2
Lecture 2 19-2
 

Recently uploaded

Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
foxlyon
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
VanTuDuong1
 
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
Sou Tibon
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 

Recently uploaded (20)

Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
 
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 

Mian

  • 2. What is cyber security?  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 3. What is…?  Communication security-protecting organization communication media , technology , and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
  • 4. What is cyber crime?  The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information- age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.
  • 5. History  The first recorded cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.
  • 6. Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 7. Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.
  • 8. How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 9. Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 10. Safety tips … Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 11. Conclusion  The only system which is truly secure is one which is switched off and unplugged.  So , only way to be safe is Pay attention and Act smart.
  • 12. THANK YOU  Reference  Jhandad Berchond