INTRODUCTION
 The term cyber security is to refer to the security
offered through online services to protect your online
information.
 With an increasing amount of people getting
connected to internet, the security threats that cause
massive harm are increasing also.
TO UNDERSTAND
What is the meaning
of the word “CYBER”?
What is the need of
cyber security?
What are the security
problems in cyber
fields?
Howto implement &
maintainsecurityof a cyber
field around us?
Meaning of the word CYBER:-
 It is a combining from relating to
information technology, the internet &
virtual reality.
Needs of CYBER SECURITY
 Cyber security is necessary since it helps
in security data from threats such as data
theft or misuse also safegaurds your system
from viruses.
Major Security Problems
VIRUS
HACKER
MALWARE
TROJAN HORSES
PASSWORD-CRAKING
VIRUS & WORMS
 A virus is a “program that is loaded onto
your computer without your knowledge and
runs against your wishes”.
Solution:-
 Install a security suite that protects the
computer against threats such as viruses and
worms.
HACKERS
 In common words Hacker is a person who breaks
into computer , usually by gaining access to
administrative controls.
Types of HACKERS:-
 White Hat Hackers
Black Hat Hackers
 Grey Hat Hackers
How to prevent Hacking????
 It may be impossible to prevent computer
hacking, however effective security controls including
strong passwords and the use of firewalls can help.
MALWARE
 The word “Malware” comes from the term “Mallicious
Software”.
 Malware is any software that infects and damage a
computer system without the owner’s knowledge or
permission.
To stop Malware:-
 Download an anti-
malware programs that
also helps to prevent
infections.
 Activate network
threat protection,firewall
& antivirus.
TROJAN HORSES
 Trojan Horses are E-
mail viruses that can
duplicate themselves ,
steal information or harm
the computer system.
 These viruses are the
most serious threats to
computer.
How to avoid Trojans??
 Security suits such
as Avast , Internet
security will prevent
you from downloading
trojan horses.
PASSWORD CRACKING
 Password attacks are attacks by hackers that are
able to determine passwords or find passwords to
diffrents protected electronic areas and social network
sites.
Securing Passwords:-
 Use always strong password.
 Never use same passwords for two different
sites.
REFERENCES:-
http://www.avtest.org/
http://www.billmullins.blogspot.com/
http://www.digit/forum.com
http://www.antivirusnews.com/
CYBER SECURITY

CYBER SECURITY

  • 2.
    INTRODUCTION  The termcyber security is to refer to the security offered through online services to protect your online information.  With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also.
  • 3.
    TO UNDERSTAND What isthe meaning of the word “CYBER”? What is the need of cyber security? What are the security problems in cyber fields? Howto implement & maintainsecurityof a cyber field around us?
  • 4.
    Meaning of theword CYBER:-  It is a combining from relating to information technology, the internet & virtual reality.
  • 5.
    Needs of CYBERSECURITY  Cyber security is necessary since it helps in security data from threats such as data theft or misuse also safegaurds your system from viruses.
  • 6.
  • 7.
    VIRUS & WORMS A virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes”.
  • 8.
    Solution:-  Install asecurity suite that protects the computer against threats such as viruses and worms.
  • 10.
    HACKERS  In commonwords Hacker is a person who breaks into computer , usually by gaining access to administrative controls.
  • 11.
    Types of HACKERS:- White Hat Hackers Black Hat Hackers  Grey Hat Hackers
  • 12.
    How to preventHacking????  It may be impossible to prevent computer hacking, however effective security controls including strong passwords and the use of firewalls can help.
  • 13.
    MALWARE  The word“Malware” comes from the term “Mallicious Software”.  Malware is any software that infects and damage a computer system without the owner’s knowledge or permission.
  • 14.
    To stop Malware:- Download an anti- malware programs that also helps to prevent infections.  Activate network threat protection,firewall & antivirus.
  • 15.
    TROJAN HORSES  TrojanHorses are E- mail viruses that can duplicate themselves , steal information or harm the computer system.  These viruses are the most serious threats to computer.
  • 16.
    How to avoidTrojans??  Security suits such as Avast , Internet security will prevent you from downloading trojan horses.
  • 17.
    PASSWORD CRACKING  Passwordattacks are attacks by hackers that are able to determine passwords or find passwords to diffrents protected electronic areas and social network sites.
  • 18.
    Securing Passwords:-  Usealways strong password.  Never use same passwords for two different sites.
  • 21.