SlideShare a Scribd company logo
Independent Study On
CYBER SECURITY
Under guidance of: By: Anand Katera
Dr.SB Kulkarni 8th Sem-SDMCET
Contents
UNIT1: Cyber Security Fundamentals
1.1 Introduction to cyber security
1.2 Basic Cryptography
1.3 Symmetric Encryption
1.4 Public Key Encryption
1.5 The Domain Name System (DNS)
1.6 Firewalls
1.7 Virtualization
1.8 Radio-Frequency Identification
What is cyber security?
 Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered
via the Internet by cyber criminals.
ADVANTAGES OF CYBER SECURITY
 The cyber security will defend us from critical
attacks.
 It helps us to browse the various websites securely.
 Internet Security process all the incoming and
outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC needs to
update regularly.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Basic Cryptography
Definition: Cryptography is a method of storing
and transmitting data in a particular form so that
only those for whom it is intended can read and
process it.
Symmetric Encryption
 Symmetric Encryption is an Encryption algorithm
where the same key is used for both Encryption and
Decryption. The key must be kept secret, and is
shared by the message sender and recipient.
Public Key Encryption
 A Public Key Encryption system that uses two keys --
a public key known to everyone and a private or
secret key known only to the recipient of the
message.
Example:
 When Bob’s wants to send a secure message to Alice,
he uses Alice's public key to encrypt the message.
Alice then uses his private key to decrypt it.
Public Key Encryption
Domain Name System (DNS)
 The DNS translates Internet domain and host
names to IP addresses. DNS automatically converts
the names we type in our Web browser address bar
to the IP addresses of Web servers hosting those
sites.
 DNS implements a distributed database to store this
name and address information for all public hosts on
the Internet.
Firewall
 A firewall is a set of related programs, located at a
network gateway server, that protects the resources
of a private network from users from other networks.
 imposes restrictions on network services
 only authorized traffic is allowed
 auditing and controlling access
 can implement alarms for abnormal behavior
Virtualization
 Virtualization is nothing but creating a virtual
environment for any program to run on an existing
platform as a guest, without interfering or
interrupting with the host platform’s services or
programs. The virtual environment running might be
an Operating System, Storage devices,etc.
Example:
 Application virtualization is software technology
that encapsulates application software from the
underlying operating system on which it is executed.
What is RFID?
 Radio-frequency identification (RFID) is the wireless
use of electromagnetic fields to transfer data, for
the purposes of automatically identifying and
tracking tags attached to objects. The tags contain
electronically stored information.
 A technology that employs a microchip with an
antenna that broadcasts its unique identifier and
location to receivers.
RFID Tags
Contains two main parts:
 Silicon chips
 Antennas
Components enable tags to receive and respond to radio
frequencies queries from RFID transceivers.
Three types by power:
 Passive
 Semi-Passive
 Active
Passive
 Have no internal power supply
 Very Small, Limited Range, Unlimited Life
Semi Passive(Battery-assisted passive)
 Similar to passive tags, with the addition of a small battery
 Battery powers the integrated circuit
 Bigger, Longer Range, Limited Life
Active
 Have their own internal power source
 Many operate at fixed intervals
 Also called beacons (broadcast own signal)
 Much larger memories, Longer range
THANK YOU

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
Pavan Kuls
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
 
Internet Security
Internet SecurityInternet Security
Internet Security
Chris Rodgers
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 

What's hot (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 

Viewers also liked

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
Cyber security
Cyber securityCyber security
Cyber security
Jennie Sherkness
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
anjuselina
 
Cyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraCyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN Mantra
IGN MANTRA
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (20)

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraCyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN Mantra
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Presentation on Cyber Security

Network security
Network securityNetwork security
Network security
Sidiq Dwi Laksana
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
Влад Панасенко
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Day4
Day4Day4
Day4
Jai4uk
 
Iot Security
Iot SecurityIot Security
Iot Security
MAITREYA MISRA
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
adolphoyonker
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptx
rishi707971
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
HaipengCai1
 
Internet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi universityInternet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi university
PulakMandal14
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 

Similar to Presentation on Cyber Security (20)

Network security
Network securityNetwork security
Network security
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Day4
Day4Day4
Day4
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Network security
Network security Network security
Network security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptx
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
Internet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi universityInternet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi university
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Data security
Data securityData security
Data security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 

Presentation on Cyber Security

  • 1. Independent Study On CYBER SECURITY Under guidance of: By: Anand Katera Dr.SB Kulkarni 8th Sem-SDMCET
  • 2. Contents UNIT1: Cyber Security Fundamentals 1.1 Introduction to cyber security 1.2 Basic Cryptography 1.3 Symmetric Encryption 1.4 Public Key Encryption 1.5 The Domain Name System (DNS) 1.6 Firewalls 1.7 Virtualization 1.8 Radio-Frequency Identification
  • 3. What is cyber security?  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  • 4. ADVANTAGES OF CYBER SECURITY  The cyber security will defend us from critical attacks.  It helps us to browse the various websites securely.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs to update regularly.
  • 5. Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 6. Basic Cryptography Definition: Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
  • 7. Symmetric Encryption  Symmetric Encryption is an Encryption algorithm where the same key is used for both Encryption and Decryption. The key must be kept secret, and is shared by the message sender and recipient.
  • 8. Public Key Encryption  A Public Key Encryption system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. Example:  When Bob’s wants to send a secure message to Alice, he uses Alice's public key to encrypt the message. Alice then uses his private key to decrypt it.
  • 10. Domain Name System (DNS)  The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.  DNS implements a distributed database to store this name and address information for all public hosts on the Internet.
  • 11. Firewall  A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks.  imposes restrictions on network services  only authorized traffic is allowed  auditing and controlling access  can implement alarms for abnormal behavior
  • 12. Virtualization  Virtualization is nothing but creating a virtual environment for any program to run on an existing platform as a guest, without interfering or interrupting with the host platform’s services or programs. The virtual environment running might be an Operating System, Storage devices,etc.
  • 13. Example:  Application virtualization is software technology that encapsulates application software from the underlying operating system on which it is executed.
  • 14. What is RFID?  Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information.  A technology that employs a microchip with an antenna that broadcasts its unique identifier and location to receivers.
  • 15. RFID Tags Contains two main parts:  Silicon chips  Antennas Components enable tags to receive and respond to radio frequencies queries from RFID transceivers. Three types by power:  Passive  Semi-Passive  Active
  • 16. Passive  Have no internal power supply  Very Small, Limited Range, Unlimited Life Semi Passive(Battery-assisted passive)  Similar to passive tags, with the addition of a small battery  Battery powers the integrated circuit  Bigger, Longer Range, Limited Life Active  Have their own internal power source  Many operate at fixed intervals  Also called beacons (broadcast own signal)  Much larger memories, Longer range