SlideShare una empresa de Scribd logo
1 de 15
I HAVE A QUESTION
ARE YOU REALLY SAFE WHEN YOU USE
YES
HOW
NO
WHYNOT SURE
FOLLOW NEXT SLIDES
CYBER SECURITY
Name and ID:
Introduction
As increasing amount of people getting
connected to Internet, The security of
personal information, data and applications
are being a difficult problem.
The term cyber security is used to refer to
the security offered through on-line
services to protect your online information
What is Cyber Crime ?
The Computer as a Target
The Computer as Weapon
Types of Cyber Crime
 Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
Hacking
 Hacking in simple term means an
illegal intrusion into a computer
system and/or network.
Danial of Service Attack
 Act by the criminal, who floods the bandwidth of
the victim’s network.
 Is his e-mail box with spam mail depriving him of
the services.
Virus Dissemination
 Malicious software that attaches itself
to other software. (virus, worms,
Trojan, Horse, web jacking, e-mailing
bombing etc.)
Computer Vandalism
 Damaging or destroying data rather than stealing.
 Transmitting virus.
Cyber Terrorism
 Use of Internet based attacks in
terrorist activities.
 Technologies savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Software Piracy
 Theft of software through the illegal copying of
genuine programs.
 Distribution of products intended to pass for the
original.
Types of Cyber Attacks
by Percentage
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of Service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of Internet privileges: 79%
 Viruses: 85%
Safety Tips For Cyber Crime
 Use Antivirus Software.
 Insert firewalls.
 Uninstall unnecessary software.
 Maintain backup.
 Check security setting.
 Never give your full name or address to strangers.
 Learn more about Internet privacy.
Advantage of Cyber Security
 Defend us from critical attacks.
 Browse the safe website.
 Internet security process all the incoming
outgoing data on our computer.
Conclusion
Technology is destructive only in
the hands of people who do not
realize that they are one and the
same process as the universe.
Cyber security
Cyber security

Más contenido relacionado

La actualidad más candente

CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai
 

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
cyber security
cyber securitycyber security
cyber security
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Web Security
Web SecurityWeb Security
Web Security
 
Internet security
Internet securityInternet security
Internet security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber security Cyber security
Cyber security
 
New threats to cyber-security
New threats to cyber-securityNew threats to cyber-security
New threats to cyber-security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Adware
AdwareAdware
Adware
 

Similar a Cyber security

Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01
Nelito Systems Ltd
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similar a Cyber security (20)

Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Dangers of Cyber Crime
Dangers of Cyber CrimeDangers of Cyber Crime
Dangers of Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 

Más de RIPPER95 (6)

Website security
Website securityWebsite security
Website security
 
Spain
Spain Spain
Spain
 
Italy politics and social lives
Italy politics and social livesItaly politics and social lives
Italy politics and social lives
 
Fire project
Fire projectFire project
Fire project
 
Android and IOS
Android and IOSAndroid and IOS
Android and IOS
 
Drug policy in mexico
Drug policy in mexicoDrug policy in mexico
Drug policy in mexico
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Cyber security

  • 1. I HAVE A QUESTION
  • 2. ARE YOU REALLY SAFE WHEN YOU USE
  • 5. Introduction As increasing amount of people getting connected to Internet, The security of personal information, data and applications are being a difficult problem. The term cyber security is used to refer to the security offered through on-line services to protect your online information
  • 6. What is Cyber Crime ? The Computer as a Target The Computer as Weapon Types of Cyber Crime  Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy
  • 7. Hacking  Hacking in simple term means an illegal intrusion into a computer system and/or network. Danial of Service Attack  Act by the criminal, who floods the bandwidth of the victim’s network.  Is his e-mail box with spam mail depriving him of the services.
  • 8. Virus Dissemination  Malicious software that attaches itself to other software. (virus, worms, Trojan, Horse, web jacking, e-mailing bombing etc.) Computer Vandalism  Damaging or destroying data rather than stealing.  Transmitting virus.
  • 9. Cyber Terrorism  Use of Internet based attacks in terrorist activities.  Technologies savvy terrorists are using 512-bit encryption, which is impossible to decrypt. Software Piracy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 10. Types of Cyber Attacks by Percentage  Financial fraud: 11%  Sabotage of data/networks: 17%  Theft of proprietary information: 20%  System penetration from the outside: 25%  Denial of Service: 27%  Unauthorized access by insiders: 71%  Employee abuse of Internet privileges: 79%  Viruses: 85%
  • 11. Safety Tips For Cyber Crime  Use Antivirus Software.  Insert firewalls.  Uninstall unnecessary software.  Maintain backup.  Check security setting.  Never give your full name or address to strangers.  Learn more about Internet privacy.
  • 12. Advantage of Cyber Security  Defend us from critical attacks.  Browse the safe website.  Internet security process all the incoming outgoing data on our computer.
  • 13. Conclusion Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.