SlideShare a Scribd company logo
1 of 17
CYBER SECURITY :
MADE BY>SAWANT BESRA
WELCOME TO MY PRESENTATION.
CONTENTS :
● Itroduction
● Challenges of Cyber Security
● Types of Cyber Security
● IT Act 2000
INTRODUCTION OF CYBER SECURITY:
Cyber Security Or Information Technology Security Are the Techniques
Of protecting computer,networks,programs and data From
unauthorized access or attacks That are aimed for Exploration.
CHALLENGES OF CYBER SECURITY :
●NETWORK
SECURITY
● It is consists Practices adopted To
prevent and Monitor unauthorized
access and Denial of a computer
network•
●APPLICATION
SECURITY
● Most of application Security are
caused due to poor coding
Practices Which lead to poor
applications code.
●DATA
SECURITY
●Data Security Means protecting
digital data,such are those in
database,from unauthorized access.
CRITICAL | CLOUD
INFRASTRUCTURE: | SECURITY:
It is the body Of systems, network
and assets That are so essential
That their continued operation is
required to ensure the security of
a given nation, it’s economy,and
the public’s health and/or safety.
It is a set of policies ,controls and
procedure combined with
technology that work together to
protect data,infrastructure ,and
cloud- base systems.
●INTERNET OF THINGS | ● OPERATIONAL
(IOT) SECURITY | SECURITY
Iot Security is the technology area
concerned with safeguarding
connected devices and network in
the Internet of things (IOT)
allowing devices To connect to the
internet Opens up them to a no. of
serious vulnerability if they are not
properly protected.
Includes the processes and
decisions for handling and
protecting data assets.
DEVELOPING A CYBER SECURITY
STRATEGI:
Every strategy should be custom designed. A cybersecurity that works
for one company will not necessarily be effective for another . It’s
different for every entity based on their specific needs and
vulnerabilities.
TYPES OF CYBER SECURITY THREATS:
●PHISHING
It is practices to send spyware
with in link and for any other way
of steal sensitive data like credit
card and login information.
●RANSOMWARE
It is a type of malicious software .
It is designed to extort money by
blocking access to files or the
computer system until the
ransome is paid.
●Malware>Malware is short for malicious software computer programs
designed to infiltrate and damage computers without the users consent.
●Virus >A self reflecting program that attaches itself from clean file and
spreads throughout as it disguisesed as legitimate software . Inflecting file with
malicious cord.
●Trojans>A type of malware that tricks users into uploading Trojans onto their
computer where they cause damage or collect data .
●Spyware>A program that secretly records what a user does
so,Cybercriminals can make use of this information. For example, Spyware
could capture credit card details.
●Adware:Advitising software which can be used to spread malware.
●Botnets:Network of Malware infected computers which cybercriminals
use to perform task online Without the users permission.
SQL INJECTION●
An SQl (Structural language query) injection is a type of Cyber attack
used take control of and steal from the database.
MAN IN THE MIDDLE ATTACK
• A man in the middle attack is a type of cyber threat where a
cybercriminal intercepts between two individuals in order to steal data.
DENIAL OF SERVICE ATTACK:
A denial of service attack where cybercriminals prevent a computer
system from fulfiling legitimate by overwhelming the networks and
servers with traffic.
CYEBER SAFETY TIPS:
Update your software and
operating system : this means
your benefit from the latest
security patches
Use Anti-virus software : Security
solutions like Kaspersky total
security will detect and remove
threats. Keeps your software
updated for the best level of
protection.
Use strong passwords : ensure your passwords are not easily
guseeable
Do not open e-mail attachments from unknown senders: these could be
infected with malware .
Do not click on links in emails from unknown sender or unfamiliar
websites : these is a common way that malware is spread.
TOP SECURITY TECHNOLOGY’S
• Firewall:
• A fire wall is a network security that monitors incoming and outgoing
network traffic and permits or blocks data packets based on set of
security rules.
●Antivirus :
Antivirus software is a program or set of programs that are designed to
prevent ,search for , detect and remove software viruses .
THANKS FOR WATCHING

More Related Content

What's hot

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Avantika University
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 

What's hot (20)

cyber security
cyber securitycyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ppt
PptPpt
Ppt
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Presentation on Cyber Security

презентация1
презентация1презентация1
презентация1sagidullaa01
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. Info-Tech
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfNeilStark1
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 

Similar to Presentation on Cyber Security (20)

cyber security
cyber security cyber security
cyber security
 
презентация1
презентация1презентация1
презентация1
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Presentation on Cyber Security

  • 1. CYBER SECURITY : MADE BY>SAWANT BESRA WELCOME TO MY PRESENTATION.
  • 2. CONTENTS : ● Itroduction ● Challenges of Cyber Security ● Types of Cyber Security ● IT Act 2000
  • 3. INTRODUCTION OF CYBER SECURITY: Cyber Security Or Information Technology Security Are the Techniques Of protecting computer,networks,programs and data From unauthorized access or attacks That are aimed for Exploration.
  • 4. CHALLENGES OF CYBER SECURITY : ●NETWORK SECURITY ● It is consists Practices adopted To prevent and Monitor unauthorized access and Denial of a computer network• ●APPLICATION SECURITY ● Most of application Security are caused due to poor coding Practices Which lead to poor applications code. ●DATA SECURITY ●Data Security Means protecting digital data,such are those in database,from unauthorized access.
  • 5. CRITICAL | CLOUD INFRASTRUCTURE: | SECURITY: It is the body Of systems, network and assets That are so essential That their continued operation is required to ensure the security of a given nation, it’s economy,and the public’s health and/or safety. It is a set of policies ,controls and procedure combined with technology that work together to protect data,infrastructure ,and cloud- base systems.
  • 6. ●INTERNET OF THINGS | ● OPERATIONAL (IOT) SECURITY | SECURITY Iot Security is the technology area concerned with safeguarding connected devices and network in the Internet of things (IOT) allowing devices To connect to the internet Opens up them to a no. of serious vulnerability if they are not properly protected. Includes the processes and decisions for handling and protecting data assets.
  • 7. DEVELOPING A CYBER SECURITY STRATEGI: Every strategy should be custom designed. A cybersecurity that works for one company will not necessarily be effective for another . It’s different for every entity based on their specific needs and vulnerabilities.
  • 8. TYPES OF CYBER SECURITY THREATS: ●PHISHING It is practices to send spyware with in link and for any other way of steal sensitive data like credit card and login information. ●RANSOMWARE It is a type of malicious software . It is designed to extort money by blocking access to files or the computer system until the ransome is paid.
  • 9. ●Malware>Malware is short for malicious software computer programs designed to infiltrate and damage computers without the users consent. ●Virus >A self reflecting program that attaches itself from clean file and spreads throughout as it disguisesed as legitimate software . Inflecting file with malicious cord. ●Trojans>A type of malware that tricks users into uploading Trojans onto their computer where they cause damage or collect data . ●Spyware>A program that secretly records what a user does so,Cybercriminals can make use of this information. For example, Spyware could capture credit card details.
  • 10. ●Adware:Advitising software which can be used to spread malware. ●Botnets:Network of Malware infected computers which cybercriminals use to perform task online Without the users permission.
  • 11. SQL INJECTION● An SQl (Structural language query) injection is a type of Cyber attack used take control of and steal from the database.
  • 12. MAN IN THE MIDDLE ATTACK • A man in the middle attack is a type of cyber threat where a cybercriminal intercepts between two individuals in order to steal data.
  • 13. DENIAL OF SERVICE ATTACK: A denial of service attack where cybercriminals prevent a computer system from fulfiling legitimate by overwhelming the networks and servers with traffic.
  • 14. CYEBER SAFETY TIPS: Update your software and operating system : this means your benefit from the latest security patches Use Anti-virus software : Security solutions like Kaspersky total security will detect and remove threats. Keeps your software updated for the best level of protection.
  • 15. Use strong passwords : ensure your passwords are not easily guseeable Do not open e-mail attachments from unknown senders: these could be infected with malware . Do not click on links in emails from unknown sender or unfamiliar websites : these is a common way that malware is spread.
  • 16. TOP SECURITY TECHNOLOGY’S • Firewall: • A fire wall is a network security that monitors incoming and outgoing network traffic and permits or blocks data packets based on set of security rules. ●Antivirus : Antivirus software is a program or set of programs that are designed to prevent ,search for , detect and remove software viruses .