2. INTROUCTION
•The term internet security is used to refer to
the security offered through on-line services to
protect your online information.
•With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
3. •What is the meaning of the word Internet?
• What is the need of Internet Security?
• What are the security problems in Internet
field?
• How to implement and maintain Security
of a Internet field around us.
4. MEANING OF THE WORD INTERNET
•It is a combining form relating to
information technology, the cyber, and
virtual reality.
5. NEED OF INTERNET SECURITY
•Internet security is necessary since it
helps in securing data from threats such
as data theft or misuse, also safeguards
your system from viruses.
11. HOW TO PREVENT HACKING
•It may be impossible to prevent computer
hacking, however effective security
controls including strong passwords, and
the use of firewalls can helps.
12. MALWARE
• The word "malware" comes from the term
"MALicious softWARE."
•Malware is any software that infects and
damages a computer system without the
owner's knowledge or permission.
13. TO STOP MALWARE
•Download an anti-malware program that
also helps prevent infections.
•Activate Network Threat Protection,
Firewall, Antivirus.
14. TROJAN HORSES
•Trojan horses are email viruses that can
duplicate themselves, steal information, or
harm the computer system.
• These viruses are the most serious
threats to computers.
15. HOW TO AVOID TROJANS
•Security suites, such as Avast Internet
Security, will prevent you from
downloading Trojan Horses.
16. PASSWORD CRACKING
•Password attacks are attacks by hackers
that are able to determine passwords or
find passwords to different protected
electronic areas and social network sites.
18. PHISHING ATTACK
•Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers.
•It occurs when an attacker, pretend to be as a
trusted entity, trick a victim into opening an
email, instant message, or text message. The
recipient is then tricked into clicking a
malicious link, which can lead to the
installation of malware, the freezing of the
system as part of a ransomware attack or the
revealing of sensitive information.
20. PHISHING TECHNIQUES
•Email Phishing: It is a numbers game. An
attacker sending out thousands of
fraudulent messages can net significant
information and sums of money, even if
only a small percentage of recipients fall
for the scam. As seen above, there are
some techniques attackers use to increase
21. •Spear Phishing: It targets a specific
person or enterprise, as opposed to
random application users. It's a more in
depth version of phishing that requires
special knowledge about an organization,
including its power structure.
22. RECENT NEWS
•India ranks 23rd among 165 nations in
cyber security index.
•Mark Zuckerberg admits his own
Facebook info was leaked.
•87 million FB profiles were leaked.