SlideShare una empresa de Scribd logo
1 de 20
CYBER SECURITY
Subtitle
Action against cyber crime.
Title and Content Layout with List
 Click to edit Master text styles
 Second level
 Third level
 Fourth level
 Fifth level
What is cyber crime?
 The former descriptions were
"computer crime", "computer-
related crime" or "crime by
computer". With the pervasion of
digital technology, some new terms
like "high-technology" or
"information-age" crime were
added to the definition. Also,
Internet brought other new terms,
like "cybercrime" and "net" crime.
 Other forms include "digital",
"electronic", "virtual" , "IT", "high-tech"
and technology-enabled" crime .
What is cyber security?
 Security is “Freedom from risk or danger.“
 The ability of a system to protect information and system resources
with respect to confidentiality and integrity.
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the
number of successful cyber security attacks.
 Cyber security refers to the technologies and processes designed to
protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the Internet by cyber
criminals.
 Though, cyber security is important for network, data and
application security.
What is…?
 Communication Security- Protecting organization communication
media , technology , and content.
 Network Security- Network Security is the protection of networking
components, connection and content.
 Information Security- Information Security is protection of
information and its critical elements , including the systems and
hardware that use , store or transmit that information.
History
 The first recorded cyber crime took place in the year 1820.
 In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a fear amongst Jacquard’s
employees that their traditional employment and livelihood were being
threatened. They committed acts of sabotage to discourage Jacquard
from further use of the new technology. This is the first recorded cyber
crime.
 During the 1980s, the hackers and crimes were beginning to emerge.
 CERT was created to overcome network security issues.
 In the 1990s, Internet became public and the security concerns increased
tremendously.
Cyber crimes includes
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Why should we care?
 It is a criminal activity
committed on the internet.
 Cyber crime-Where computer
is either a tool or target or
both.
Main Objectives of Cyber Security
 Secure Access
 Confidentiality
 Authentication
 Integrity
 Non-repudiation
How can we protect?
 Read Privacy policy carefully when you submit the data through
internet.
 Encryption: lots of website uses SSL (secure socket layer)to encrypt a
data.
 Disable remote connectivity.
Working process of Cyber Security
 We need multiple layers of security.
 Cyber Security is accomplished through hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall
Intrusion prevention systems
Virtual Private Networks
Network Security Technology
Cryptographic Systems:
 Secret Key Cryptography (SKC)
 Public Key Cryptography (PKC)
 Hash Function
Hash Function
Plain Text Cipher Text
Firewall
 A typical border control
mechanism.
 Metaphor for network security.
 Designed to prevent
unauthorized access to or
from a private network.
Security Tools
 Antivirus software packages
 Firewalls
 SSL secure connection
 Secure network infrastructure
 DNS hardware and software
 Virtual private network
 Identity services
 Encryption
 Security management
 Monitoring of incoming traffic
Advantage of cyber security
 It will defend from hacks and virus.
 The application of cyber security used in our PC needs update
every week.
 The security developers will update their database every week
once. Hence the new virus also deleted.
Safety tips …
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information unless
required
Conclusion
 The only system which is truly secure is one which is switched off and
unplugged.
 As security tweaks, threats tremendously tweaks.
Thank You
By,
KRISHANU GHOSH

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Destacado (7)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
MHA Housing Power Point
MHA Housing Power PointMHA Housing Power Point
MHA Housing Power Point
 
Passaic County Expansion
Passaic County ExpansionPassaic County Expansion
Passaic County Expansion
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying keynote
Cyberbullying keynoteCyberbullying keynote
Cyberbullying keynote
 
Cyber Bullying PSA
Cyber Bullying PSACyber Bullying PSA
Cyber Bullying PSA
 
Bullying
BullyingBullying
Bullying
 

Similar a Cyber security

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 

Similar a Cyber security (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Mian
MianMian
Mian
 
Mian
MianMian
Mian
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Cyber security

  • 1.
  • 3. Title and Content Layout with List  Click to edit Master text styles  Second level  Third level  Fourth level  Fifth level
  • 4. What is cyber crime?  The former descriptions were "computer crime", "computer- related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.  Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .
  • 5. What is cyber security?  Security is “Freedom from risk or danger.“  The ability of a system to protect information and system resources with respect to confidentiality and integrity.  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 6. What is…?  Communication Security- Protecting organization communication media , technology , and content.  Network Security- Network Security is the protection of networking components, connection and content.  Information Security- Information Security is protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
  • 7. History  The first recorded cyber crime took place in the year 1820.  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.  During the 1980s, the hackers and crimes were beginning to emerge.  CERT was created to overcome network security issues.  In the 1990s, Internet became public and the security concerns increased tremendously.
  • 8. Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 9. Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.
  • 10. Main Objectives of Cyber Security  Secure Access  Confidentiality  Authentication  Integrity  Non-repudiation
  • 11. How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 12. Working process of Cyber Security  We need multiple layers of security.  Cyber Security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  • 13. Network Security Technology Cryptographic Systems:  Secret Key Cryptography (SKC)
  • 14.  Public Key Cryptography (PKC)  Hash Function Hash Function Plain Text Cipher Text
  • 15. Firewall  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  • 16. Security Tools  Antivirus software packages  Firewalls  SSL secure connection  Secure network infrastructure  DNS hardware and software  Virtual private network  Identity services  Encryption  Security management  Monitoring of incoming traffic
  • 17. Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 18. Safety tips …  Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 19. Conclusion  The only system which is truly secure is one which is switched off and unplugged.  As security tweaks, threats tremendously tweaks.