SlideShare una empresa de Scribd logo
1 de 25
CYBER-SECURITY
CONTENT
 Introduction
Understand :
What is the meaning of the word CYBER ?
 What is the need of Cyber Security ?
What are the security problems in Cyber
field ?
 How to implement and maintain Security of
a Cyber field around us ?
INTRODUCTION
The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
 Cyber security or information technology security is
the protection of computer systems from theft or damage
to their hardware, software or electronic data, as well as
from disruption or misdirection of the services they
provide.
With an increasing amount of people getting connected
to Internet, the security threats that cause massive harm
are increasing also.
MEANING-CYBER
It is a combining form relating to information
technology, the Internet, and virtual reality.
Needofcybersecurity
Cyber security is necessary since it helps in securing
data from threats such as data theft or misuse, also
safeguards your system from viruses.
Majorsecurityproblems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses
A Virus is a “program that is loaded onto your
computer without your knowledge and runs against
your wishes.
Solution
Install a security suite that protects the computer
against threats such as viruses .
Hackers
In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
TypesofHackers
White Hat Hacker
 Grey Hat Hacker
 Black Hat Hacker
WhiteHatHacker
A white hat hacker is a computer security specialist
who breaks into protected systems and networks to test
and asses their security.
White hat hackers use their skills to improve security
by exposing vulnerabilities(weaknesses) before
malicious hackers (known as black hat hackers) can
detect and exploit them.
GreyHatHacker
The term "grey hat", alternatively spelled as greyhat or
"gray hat", refers to a computer hacker or computer
security expert who may sometimes violate laws(illegal)
or typical ethical standards, but does not have the
malicious intent typical of a black hat hacker.
BlackHatHacker
Black hat refers to a hacker who breaks into a
computer system or network with malicious intent.
A black hat hacker may exploit security vulnerabilities
for monetary gain; to steal or destroy private data , or to
alter, disrupt or shut down websites and networks.
Howtopreventhacking
It may be impossible to prevent(stop) computer
hacking, however effective security controls including
strong passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term "MALicious
softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
ToStopMalware
Download an anti-malware program that also helps
prevent infections.
Activate Network Threat Protection, Firewall,
Antivirus.
Maintain backup.
Keep you private information private
TrojanHorses
Trojan horses are email viruses that can duplicate
themselves, steal information, or harm the computer
system. These viruses are the most serious threats to
computers
HowtoAvoidTrojans
Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses.
PasswordCracking
Password attacks are attacks by hackers that are
able to determine passwords or find passwords to
different protected electronic areas and social network
sites.
SecuringPassword
Use always Strong password.
 Never use same password for two different sites.
Cyber security
Cyber security
Cyber security

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Ppt
PptPpt
Ppt
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber security
cyber securitycyber security
cyber security
 

Similar a Cyber security

Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
akkharbabu
 

Similar a Cyber security (20)

cybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdfcybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 

Más de Pihu Goel (7)

Software engineering
Software engineeringSoftware engineering
Software engineering
 
Operating system
Operating system Operating system
Operating system
 
Java applets
Java appletsJava applets
Java applets
 
Introduction to ajax
Introduction  to  ajaxIntroduction  to  ajax
Introduction to ajax
 
Er model ppt
Er model pptEr model ppt
Er model ppt
 
Computer network
Computer networkComputer network
Computer network
 
Evolutionary models
Evolutionary modelsEvolutionary models
Evolutionary models
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Último (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Cyber security

  • 2. CONTENT  Introduction Understand : What is the meaning of the word CYBER ?  What is the need of Cyber Security ? What are the security problems in Cyber field ?  How to implement and maintain Security of a Cyber field around us ?
  • 3. INTRODUCTION The term cyber security is used to refer to the security offered through on-line services to protect your online information.  Cyber security or information technology security is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
  • 4. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 5. MEANING-CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. Needofcybersecurity Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 8. Viruses A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. Solution Install a security suite that protects the computer against threats such as viruses .
  • 9.
  • 10. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11. TypesofHackers White Hat Hacker  Grey Hat Hacker  Black Hat Hacker
  • 12. WhiteHatHacker A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities(weaknesses) before malicious hackers (known as black hat hackers) can detect and exploit them.
  • 13. GreyHatHacker The term "grey hat", alternatively spelled as greyhat or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws(illegal) or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  • 14. BlackHatHacker Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security vulnerabilities for monetary gain; to steal or destroy private data , or to alter, disrupt or shut down websites and networks.
  • 15. Howtopreventhacking It may be impossible to prevent(stop) computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 16. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 17. ToStopMalware Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus. Maintain backup. Keep you private information private
  • 18.
  • 19. TrojanHorses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 20. HowtoAvoidTrojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 21. PasswordCracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 22. SecuringPassword Use always Strong password.  Never use same password for two different sites.