SlideShare a Scribd company logo
1 of 22
CYBER SECURITY
Submitted by
S . VioletJebaMalini ,
M . Pavithra
SYNOPSIS
 Introduction
 What is Cyber Security?
 Need for Cyber Security
 Major Security Problems
 Cyber Security India’s Rank
 Example Cyber Attacks
 Advantages of Cyber Security
 Disadvantages of Cyber Security
 Safety Tips
 Conclusion
INTRODUCTION
 The term cyber security is used to refer to the
security offered through on-line services to
protect our online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
CYBER SECURITY
 Cyber security refers to the technologies and
processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks
delivered via the Internet by cyber criminals.
 Cyber security is important for network, data
and application security.
NEED FOR CYBER SECURITY• To secure our financial information
• To protect ourselves from online fraud and
identity theft.
• To safeguards our system from viruses.
MAJOR SECURITY PROBLEMS
Virus
Hacker
Malware
Trojan horses
Password cracking
VIRUSES AND WORMS
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes.
Solution
 Install a security suite that protects the
HACKERS
 In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
 Types of Hackers
1.White Hat Hacker
2.Grey Hat Hacker
3.Black Hat Hacker
HOW TO PREVENT HACKING
 It may be impossible to prevent computer
hacking , however effective security controls
including strong passwords, and the use of
firewalls can helps.
MALWARE
 The word "malware" comes from the term
"MALicious softWARE."
 Malware is any software that infects and
damages a
computer system without the owner's knowledge
or
permission.
TO STOP MALWARE
 Download an anti-malware program that also
helps prevent infections.
 Activate Network Threat Protection, Firewall,
Antivirus
TROJAN HORSES
 Trojan horses are email viruses that can
duplicate themselves, steal information, or
harm the computer system.
 These viruses are the most serious threats to
computers.
 How to Avoid Trojans
Security suites ,will prevent us from
downloading Trojan Horses.
PASSWORD CRACKING
 Password attacks are attacks by hackers that are
able to
determine passwords or find passwords to different
protected electronic areas and social network sites.
 Securing Password
1.Use always Strong password.
2.Never use same password for two different
sites.
CYBER SECURITY
COUNTRIES RANKSThe top 10 most committed countries to cyber security are
 Singapore,
 United States,
 Malaysia,
 Oman,
 Estonia,
 Mauritius,
 Australia,
 Georgia,
 France and
 Canada.
 Russia is ranked 11th.
INDIA’S RANK
 India is ranked 23rd on the index with a score of 0.683 and has
been listed in the "maturing" category, which refers to 77 countries
that have developed complex commitments to cyber security and
engage in cyber security programmes and initiatives.
The index has been topped by Singapore with a 0.925 score.
CYBER ATTACKS IN 2017
 Petya
The second massive cyber attack, a variant of the ransomware
hit organizations worldwide, especially Ukraine. It is found to
exploit MS Office and SMBv1 vulnerabilities and has worm
capabilities, which allows it to spread quickly across infected
networks.
 Skype
Another cyber attacks was launched by unleashing a virus on
the instant messaging app 'Skype', exploiting it's zero day
vulnerability. This Skype virus allows attackers to remotely
crash the application with an unexpected exception error, to
overwrite the active process registers, and to execute malicious
code.
 Fireball
Fireball is a Chinese malware that affected nearly 250 million
computers worldwide with India among the worst-hit
countries. This Cyber attack was designed to hijack browsers
and turn them into zombies. It is capable of executing any
code on infected machines, resulting in a wide range of
actions from stealing credentials to dropping additional
software nasties.
 Delta Charlie
Delta Charlie, a botnet malware used by Hidden Cobra, has
affected thousands of computers worldwide. This cyber attack
launches Distributed Denial-of-service attacks on vulnerable
computers that are missing required patches.
 Wannacry
May 12th, 2017 witnessed the biggest ever cyber
attack in the Internet history. A ransomware named
WannaCry stormed through the network. It targeted
computers running Windows OS that are not up-to-
date and brought computer systems from Russia to
China and the US to their knees.
ADVANTAGES OF CYBER SECURITY
 Improved security of Cyber Space.
 Increase in Cyber defense.
 Increase in Cyber speed.
 Protecting company data and information.
 Protects systems and computers against viruses ,
malware , worms and spyware etc.
 Protects networks and resources.
 Fight against computer hackers and identity theft.
DISADVANTAGES OF CYBER SECURITY
 It will be Costly for average users.
 Firewalls can be difficult to configure correctly.
 Need to keep updating the new software in order
to keep security up to date.
 Makes systems slower than before
SAFETY TIPS
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal
information unlessrequired
CONCLUSION
 The cyber crime or cyber issues have been all
time in around as well as information systems are
around us.
 To prevent the cyber issue or to hack in the world,
all countries are wanted to make some important
and harsh laws by which the cyber crimes are
prevented.
 Also, want to stop all the illegal websites that are
unauthorized by the governments of the
countries.
 It is also important to every government for

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Avantika University
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber security

cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
 

Similar to Cyber security (20)

cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Cyber security

  • 1. CYBER SECURITY Submitted by S . VioletJebaMalini , M . Pavithra
  • 2. SYNOPSIS  Introduction  What is Cyber Security?  Need for Cyber Security  Major Security Problems  Cyber Security India’s Rank  Example Cyber Attacks  Advantages of Cyber Security  Disadvantages of Cyber Security  Safety Tips  Conclusion
  • 3. INTRODUCTION  The term cyber security is used to refer to the security offered through on-line services to protect our online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 4. CYBER SECURITY  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Cyber security is important for network, data and application security.
  • 5. NEED FOR CYBER SECURITY• To secure our financial information • To protect ourselves from online fraud and identity theft. • To safeguards our system from viruses.
  • 7. VIRUSES AND WORMS  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. Solution  Install a security suite that protects the
  • 8. HACKERS  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.  Types of Hackers 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker
  • 9. HOW TO PREVENT HACKING  It may be impossible to prevent computer hacking , however effective security controls including strong passwords, and the use of firewalls can helps.
  • 10. MALWARE  The word "malware" comes from the term "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 11. TO STOP MALWARE  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus
  • 12. TROJAN HORSES  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers.  How to Avoid Trojans Security suites ,will prevent us from downloading Trojan Horses.
  • 13. PASSWORD CRACKING  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.  Securing Password 1.Use always Strong password. 2.Never use same password for two different sites.
  • 14. CYBER SECURITY COUNTRIES RANKSThe top 10 most committed countries to cyber security are  Singapore,  United States,  Malaysia,  Oman,  Estonia,  Mauritius,  Australia,  Georgia,  France and  Canada.  Russia is ranked 11th.
  • 15. INDIA’S RANK  India is ranked 23rd on the index with a score of 0.683 and has been listed in the "maturing" category, which refers to 77 countries that have developed complex commitments to cyber security and engage in cyber security programmes and initiatives. The index has been topped by Singapore with a 0.925 score.
  • 16. CYBER ATTACKS IN 2017  Petya The second massive cyber attack, a variant of the ransomware hit organizations worldwide, especially Ukraine. It is found to exploit MS Office and SMBv1 vulnerabilities and has worm capabilities, which allows it to spread quickly across infected networks.  Skype Another cyber attacks was launched by unleashing a virus on the instant messaging app 'Skype', exploiting it's zero day vulnerability. This Skype virus allows attackers to remotely crash the application with an unexpected exception error, to overwrite the active process registers, and to execute malicious code.
  • 17.  Fireball Fireball is a Chinese malware that affected nearly 250 million computers worldwide with India among the worst-hit countries. This Cyber attack was designed to hijack browsers and turn them into zombies. It is capable of executing any code on infected machines, resulting in a wide range of actions from stealing credentials to dropping additional software nasties.  Delta Charlie Delta Charlie, a botnet malware used by Hidden Cobra, has affected thousands of computers worldwide. This cyber attack launches Distributed Denial-of-service attacks on vulnerable computers that are missing required patches.
  • 18.  Wannacry May 12th, 2017 witnessed the biggest ever cyber attack in the Internet history. A ransomware named WannaCry stormed through the network. It targeted computers running Windows OS that are not up-to- date and brought computer systems from Russia to China and the US to their knees.
  • 19. ADVANTAGES OF CYBER SECURITY  Improved security of Cyber Space.  Increase in Cyber defense.  Increase in Cyber speed.  Protecting company data and information.  Protects systems and computers against viruses , malware , worms and spyware etc.  Protects networks and resources.  Fight against computer hackers and identity theft.
  • 20. DISADVANTAGES OF CYBER SECURITY  It will be Costly for average users.  Firewalls can be difficult to configure correctly.  Need to keep updating the new software in order to keep security up to date.  Makes systems slower than before
  • 21. SAFETY TIPS  Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unlessrequired
  • 22. CONCLUSION  The cyber crime or cyber issues have been all time in around as well as information systems are around us.  To prevent the cyber issue or to hack in the world, all countries are wanted to make some important and harsh laws by which the cyber crimes are prevented.  Also, want to stop all the illegal websites that are unauthorized by the governments of the countries.  It is also important to every government for