Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
Cyber security
Cyber security
Cargando en…3
×

Eche un vistazo a continuación

1 de 30 Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

Anuncio

Más reciente (20)

Cybersecurity

  1. 1. Presented by : Prof. F .R. Gosai Subject code: 3150741
  2. 2. Course Unit 1: Systems Vulnerability Scanning Unit 2: Network Defence tools Unit 3: Web Application Tools Unit 4: Introduction to Cyber Crime and law Unit 5: Introduction to Cyber Crime Investigation
  3. 3. The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Introduction
  4. 4. What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  5. 5. It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  6. 6. Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  7. 7. Major security problems Virus Hacker Malware Trojan horses Password cracking
  8. 8. Viruses and Worms AVirus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  9. 9. Solution Install a security suite that protects the computer against threats such as viruses and worms.
  10. 10. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  11. 11. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  12. 12. How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  13. 13. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  14. 14. To Stop Malware Download an anti-malware program thatalso helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus.
  15. 15. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  16. 16. How to Avoid Trojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  17. 17. Password Cracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  18. 18. Securing Password Use always Strong password. Never use same password for two different sites.
  19. 19. CyberSecurity Is Everyone’s Responsibility
  20. 20. Cyber crime growth by year
  21. 21. Cyber Security Strategy – India • Security Policy, Legal Framework – ITAct, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  22. 22. Biggest Cyber Attack in 2020 Magellan Health
  23. 23. Marriott
  24. 24. Software AG Ransomware Attack
  25. 25. Twitter
  26. 26. Zoom
  27. 27. Types of Attack.  Malware  Phishing  Salami Attack  SQL Injection Attack  Cross-Site Scripting (XSS)  Denial of Service (DoS)  Session Hijacking and Man-in-the-Middle Attacks  Credential Reuse  Nigerian Scam  Dumpster diving  War driving  Ransomware

×