Basic awareness in cybersecurity.After study people become aware in cyber security.The understand what is cyber security .They understand about some common threats. They also become aware that how to protect theirs data and devices from some common cyber attack.
2. Cyber Security is a process that's designed to
protect networks and devices from external threats.
It is important because it protects all categories of
data from theft and damage.
3. Introduction
The internet has made the world smaller in many ways
but it has also opened us up to influences that have
never before been so varied and so challenging. As
fast as security grew, the hacking world grew faster.
4. There are two ways of looking at the issue of cyber
security. One is that the companies that provide cloud
computing do that and only that so these companies
will be extremely well secured with the latest in cutting
edge encryption technology.
5. Its being protected by internet-connected systems,
including hardware, software and data, from cyber
attacks.
What is Cybersecurity
6. In a computing context, security comprises cyber
security and physical security both are used by
enterprises to safe against unauthorized access to data
centre and other computerized systems
7. The security, which is designed to maintain the
confidentiality, integrity and availability of data, is a
subset of cyber security.
8. The range of operations of cyber security involves
protecting information and systems from major cyber
threats. These threats take many forms. A
Why do we need cyber security
9. As a result, keeping pace with cyber security strategy
and operations can be a challenge, particularly in
government and enterprise networks where, in their
most innovative form, cyber threats often take aim at
secret, political and military assets of a nation, or its
people.
10. 01 It is the innovative use of information technology by
terrorist groups to further their political agenda. It took
the form of attacks on networks, computer systems and
telecommunication infrastructures.
Cyber terrorism
Some of the common threats
11. 02 It involves nation-states using information technology to
go through something another nation‟s networks to
cause damage.
Cyber warfare
12. Cyber warfare attacks are primarily executed by
hackers who are well-trained in use of benefit the
quality of details computer networks, and operate under
the favourable and support of nation-states
13. A cyber-warfare attack may forced to put into a situation
into networks to compromise valuable data, degrade
communications, impair such infrastructural services as
transportation and medical services, or interrupt
commerce.
14. 03 It is the practice of using information technology to
obtain secret information without permission from its
owners or holders. It is the most often used to gain
strategic, economic, military advantage, and is
conducted using cracking techniques and malware.
Cyber spionage
15. 01 This includes your apps, web browsers, and operating
systems. Set updates to happen automatically.
Update your software
How to protect our data and devices
16. 02 Back up important files offline, on an external hard drive,
or in the cloud. Make sure you store your paper files
securely, too.
Secure your files
17. 03 Use passwords for all laptops, tablets, and smartphones.
Don’t leave these devices unattended in public places.
Require passwords
18. 04 Encrypt devices and other media that contain sensitive
personal information. This includes laptops, tablets,
smartphones, removable drives, backup tapes, and
cloud storage solutions.
Encrypt devices
19. 05 Require multi-factor authentication to access areas of
your network with sensitive information. This requires
additional steps beyond logging in with a password —
like a temporary code on a smartphone or a key that’s
inserted into a computer.
Use multi-factor authentication
20. 01 Change the default name and password, turn off remote
management, and log out as the administrator once the
router is set up.
Secure your routerp
PROTECT OUR WIRELESS
NETWORK
21. 02 Make sure your router offers WPA2 or WPA3 encryption,
and that it’s turned on. Encryption protects information
sent over your network so it can’t be read by outsiders.
Use at least WPA2 encryption