3. What is cyber security?
Cyber security refers to the technologies
and processes designed to protect
computers, networks and data from
unauthorized access, vulnerabilities and
attacks delivered via the Internet by
cyber criminals.
4. Why Cyber security Is Important ?
Cyber security, alongside physical commercial
security has thus, slowly and steadily, become
one of the most important topics in the
business industry to be talked about.
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from
viruses.
5. Cyber Security Objectives
Confidentiality:
People who are authorized to do so can gain access to
sensitive data.
Integrity:
Safeguarding the accuracy and completeness of assets
Availability:
Being accessible and usable upon demand by an
authorized entity
6. Critical infrastructure security:
Application security:
Network security:
Cloud security:
Internet of things (IoT) security
5 main types of cyber security
7. What is Cyber attack
A malicious attempt, using digital
technologies, to cause personal or
property loss or damage, and
steal or alter confidential personal
or organizational data
8. Virus and Worms
Hacker
Malware
Trojan horses
Password Cracking
Major security problems
9. Types of CyberAttacks
Hacking
Phishing
Denial of Service
Spam Email
Malware (Trojan, Virus, Worms etc. )
Spyware, Adware
Ransomware
10. In common a Hacker is a person who
breaks into computers, usually by
gaining access to administrative controls
Hacker
11. Types of Hackers
White Hat Hacker
Black Hat Hacker
Grey Hat Hacker
12. White hat hackers choose to use their
powers for good rather than evil. Also
known as “ethical hackers
White hat hackers
13. Black hat hackers ,who violates computer
security for personal gain or maliciousness.
They are also responsible for writing
malware, which is a method used to gain
access to these systems.
Black hat hackers
14. A gray hat hacker is someone who may
violate ethical standards or principles,
but without the malicious intent ascribed
to black hat hackers.
Gray hat hacker
15. How To prevent hacking
It may be impossible to prevent computer
hacking, however effective security controls
including strong passwords, and the use of
firewalls can helps.
16. Phishing
Phishing is a fraudulent attempt, usually
made through email, to steal your personal
information.
17. Denial of Service
This is an act by the criminals who floods
the Bandwidth of the victims network.
In the DoS attack, a hacker uses a single
internet connection to either exploit a
software vulnerability or flood a target with
fake request-usually in an attempt to
exhaust server resources.
On the other hand, DDoS attacks are
launched from multiple connected devices
that are distributed across the internet.
18. Spam Email
Email Spam is the electronic version of junk
mail. It involves sending unwanted messages,
often unsolicited advertising, to a large
number of recipients.
Spam is a serious security concern as it can
be used to deliver Trojan horses, viruses,
worms, spyware, and targeted phishing
attacks.
19. The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and
damages a computer system without the
owner's knowledge or permission.
Malware
20. Virus are malware attached to a carrier such as
an email message or a word processing
document
Worm are malware that can autonomously
spread itself without a carrier, using
information about connected computers
Viruses and worms
Install a security suite that protects the
computer against threats such as viruses
and worms.
How to protect your system
21. Cyber-criminals use Trojans to spy on the
victim user, gain illegal access to the system
to extract sensitive data.
Trojans
Security suites, such as Avast Internet
Security, will prevent you from downloading
Trojan Horses.
Do not click unknown links.
How to Avoid Trojans
22. Spyware
Spyware is a type of malware that hackers use to spy on you in order to gain
access to your personal information, banking details, or online activity.
We should protect ourselves by an anti-spyware tool.
Adware
Adware is a type of malware that bombards you with endless ads and pop-up
windows that could potentially be dangerous for your device.
The best way to remove adware is to use an adware removal tool.
23. Download an anti-malware program that
also helps prevent infections.
Do not download from unknown sources
Activate Network Threat Protection,
Firewall, Antivirus.
How To Stop Malware
24. Ransomware restricts access to your
computer system and demands that a ransom
is paid in order for the restriction to be
removed.
The money which suppose to be paid to
remove ransomware from your system
which is called ransom money.
Current affairs : e.g. WannaCrypt , Petya
Variant
Ransomware
25. Advantages of Cyber Security
It will defend from hacks and virus.
The application of cyber security used in our PC needs
update every week.
The security developers will update their database
every week once. Hence the new virus also deleted.
26. Use Antivirus Software.
Insert Firewalls.
Uninstall unnecessary software.
Maintain backup.
Check security settings.
Use strong passwords , don’t give personal
information unless required
Learn more about the internet privacy.
Safety Tips to Cyber Crime
27. Conclusion
The only system which is truly secure is one
which is switched off and unplugged.
So , only way to be safe is Pay attention and
Act smart.