SlideShare a Scribd company logo
Malware protection:
To analyze attack codes malware protection
program is established.
Internet gateway and firewalls:
It watch out all the network entrance. All the
malicious software trying to enter to secure
network are drained to block and detect the
malware activities web filtering, firewall
policies and content checking are used.
Secure configuration: Hardware devices,
operating system are designed with low
security
Patch management: In software program it is
the latest version to prevent infected software
programs.
User access control: Normal user’s privileges
are limited by providing access control policy.
Techniques
used in
Cyber
security
Malicious attacks:
This is used by cyber criminals to delete, modify and alter a secure
data which is known as malwares. E.g. of malwares are:
Spyware:
Overall computer control are taken down in which personal
information are collected without users knowledge.
Viruses:
Files or computer information are corrupted or modified. By a single
software program the virus enter to the system. From one computer
to the other the virus spread by attacking the files in the computer.
Password attacks:
On cracking user’s password the attacks are focused. By following
alphanumeric procedure the user must protect the password.
APPLICATIONS OF CYBER SECURITY PROJECT
CYBER SECURITY
Types of cyber Attack
• Cyber war: Cyber wars are carried out by nation for the
purpose of disturbing and hacking data’s of
neighbouring countries. Advanced persistent threats are
used for extracting the countries data.
• Cybercrime: Group of members or individuals are
attempt cyber crime with an attitude to extract money.
In place of credit & debit card hacking or the crack
online password cyber crime occurs.
• Cyber threats: For illegal activities criminals, spies and
terrorists use cyber based technology as to manipulate
the data, to deny the distributed services or attack a
systems security.
9 D’s Concepts in Cyber
Security
• Cyber security projects use 9D’s concept to avoid
DDoS attack problems. 9D’s are
• Deter attacks,
• Detect attacks,
• Drive up difficulty,
• Differentiate protections,
• Dig beneath the threat,
• Diffuse protection throughout the payload,
• Distract with decoys,
• Divert attackers to other targets,
• Depth of defence.
Pranavi verma-cyber-security-ppt

More Related Content

What's hot

cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
imtnoida112
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber Security
Cyber SecurityCyber Security
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Home
 

What's hot (20)

cyber security
cyber securitycyber security
cyber security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Pranavi verma-cyber-security-ppt

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Cyber crime
Cyber crimeCyber crime
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
KumarjitDutta7
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
Fari84
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
Chiheb Chebbi
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
ANUSREEASHOK5
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
srikmhh
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
KarthikShivanand
 

Similar to Pranavi verma-cyber-security-ppt (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
cyber security
cyber security cyber security
cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Computer security
Computer securityComputer security
Computer security
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 

More from PranaviVerma

Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economyPranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
PranaviVerma
 
It(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi vermaIt(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi verma
PranaviVerma
 
It(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi vermaIt(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi verma
PranaviVerma
 
Pranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst pptPranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst ppt
PranaviVerma
 
Sst geo climate pranavi verma
Sst geo climate pranavi vermaSst geo climate pranavi verma
Sst geo climate pranavi verma
PranaviVerma
 
Enterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-vermaEnterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-verma
PranaviVerma
 
Ict basic-skills-pranavi-verma
Ict basic-skills-pranavi-vermaIct basic-skills-pranavi-verma
Ict basic-skills-pranavi-verma
PranaviVerma
 
Pranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skillsPranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skills
PranaviVerma
 
Pranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentationPranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentation
PranaviVerma
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
PranaviVerma
 
Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)
PranaviVerma
 
Pranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typingPranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typing
PranaviVerma
 
Pranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheetPranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheet
PranaviVerma
 
Pranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processingPranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processing
PranaviVerma
 
Pranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computer
PranaviVerma
 
Matter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-vermaMatter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-verma
PranaviVerma
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
PranaviVerma
 
Food Security in India class 9 CBSE
Food Security in India class 9 CBSEFood Security in India class 9 CBSE
Food Security in India class 9 CBSE
PranaviVerma
 
Ncc notes and important topics
Ncc notes and important topicsNcc notes and important topics
Ncc notes and important topics
PranaviVerma
 
Bond of love
Bond of loveBond of love
Bond of love
PranaviVerma
 

More from PranaviVerma (20)

Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economyPranavi verma-sst-eco-ch 2-sector-of-indian-economy
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
 
It(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi vermaIt(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 2-pranavi verma
 
It(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi vermaIt(402) class ix projects solution 5 pranavi verma
It(402) class ix projects solution 5 pranavi verma
 
Pranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst pptPranavi verma 9a-9125-sst ppt
Pranavi verma 9a-9125-sst ppt
 
Sst geo climate pranavi verma
Sst geo climate pranavi vermaSst geo climate pranavi verma
Sst geo climate pranavi verma
 
Enterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-vermaEnterpreneureurial skills class-9-pranavi-verma
Enterpreneureurial skills class-9-pranavi-verma
 
Ict basic-skills-pranavi-verma
Ict basic-skills-pranavi-vermaIct basic-skills-pranavi-verma
Ict basic-skills-pranavi-verma
 
Pranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skillsPranavi verma-class-9-communication-skills
Pranavi verma-class-9-communication-skills
 
Pranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentationPranavi verma-class-9-digital-presentation
Pranavi verma-class-9-digital-presentation
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
 
Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-green skills(1)
 
Pranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typingPranavi verma-class-9-mastering-typing
Pranavi verma-class-9-mastering-typing
 
Pranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheetPranavi verma-class-9-spreadsheet
Pranavi verma-class-9-spreadsheet
 
Pranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processingPranavi verma-class-9-word-processing
Pranavi verma-class-9-word-processing
 
Pranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computer
 
Matter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-vermaMatter in our surroundigs-pranavi-verma
Matter in our surroundigs-pranavi-verma
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
 
Food Security in India class 9 CBSE
Food Security in India class 9 CBSEFood Security in India class 9 CBSE
Food Security in India class 9 CBSE
 
Ncc notes and important topics
Ncc notes and important topicsNcc notes and important topics
Ncc notes and important topics
 
Bond of love
Bond of loveBond of love
Bond of love
 

Recently uploaded

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Pranavi verma-cyber-security-ppt

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Malware protection: To analyze attack codes malware protection program is established. Internet gateway and firewalls: It watch out all the network entrance. All the malicious software trying to enter to secure network are drained to block and detect the malware activities web filtering, firewall policies and content checking are used. Secure configuration: Hardware devices, operating system are designed with low security Patch management: In software program it is the latest version to prevent infected software programs. User access control: Normal user’s privileges are limited by providing access control policy. Techniques used in Cyber security
  • 8. Malicious attacks: This is used by cyber criminals to delete, modify and alter a secure data which is known as malwares. E.g. of malwares are: Spyware: Overall computer control are taken down in which personal information are collected without users knowledge. Viruses: Files or computer information are corrupted or modified. By a single software program the virus enter to the system. From one computer to the other the virus spread by attacking the files in the computer. Password attacks: On cracking user’s password the attacks are focused. By following alphanumeric procedure the user must protect the password.
  • 9. APPLICATIONS OF CYBER SECURITY PROJECT CYBER SECURITY
  • 10. Types of cyber Attack • Cyber war: Cyber wars are carried out by nation for the purpose of disturbing and hacking data’s of neighbouring countries. Advanced persistent threats are used for extracting the countries data. • Cybercrime: Group of members or individuals are attempt cyber crime with an attitude to extract money. In place of credit & debit card hacking or the crack online password cyber crime occurs. • Cyber threats: For illegal activities criminals, spies and terrorists use cyber based technology as to manipulate the data, to deny the distributed services or attack a systems security.
  • 11. 9 D’s Concepts in Cyber Security • Cyber security projects use 9D’s concept to avoid DDoS attack problems. 9D’s are • Deter attacks, • Detect attacks, • Drive up difficulty, • Differentiate protections, • Dig beneath the threat, • Diffuse protection throughout the payload, • Distract with decoys, • Divert attackers to other targets, • Depth of defence.