SlideShare una empresa de Scribd logo
1 de 19
CYBER SECURITY
ThisPhotobyUnknownAuthorislicensedunderCCBY-SA-NC
 INTRODUCTION
 TYPES OF CYBER SECURITY THREATE
 CYBER SECURITY VENDORS
 ADVANTAGE IN CYBER SECURITY
 DISADVANTAGE IN CYBER SECURITY
 BENEFITS IN CYBER SECURITY
 CAREER IN CYBER SECURITY
 CONCLUSION This Photo by Unknown Author is licensed under CC BY
INTRODUCTION
• CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS
INCLUDING ,HARDWARE,SOFTWARE,
• AND DATA FROM CYBERATTACKS.
• MEANING OF CYBER
• IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE
INTERNET AND VIRTUAL REALITY
• NEED OF CYBER SECURITY
• CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM
THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR
SYSTEM FROM VIRUS.
•
•
•
•
TYPES OF CYBER SECURITY THREATE
The process of keeping up with new
technologies security trends and
threat intelligence is a challenging
task . However, it is necessary in
order to protect information and
other assets from cyber threats,
which take many forms they are ….
• ransomware
• Malware
• Social engineering
• phishing
RANSOMWARE:
Ransome ware is a type of
malware that involve an
attacked locking the victims
computer system files
typically through encryption-
and demanding a payment
to decrypt and unlock them.
This Photo by Unknown Author is licensed under CC BY
MALWARE:
Malware is any file
or program used to
harm a computer
user, such as
worms, computer
viruses, trojan
horses and spyware.
This Photo by Unknown Author is licensed under CC BY
SOCIAL ENGINEERING:
Social engineering is an
attack that relies on human
interactions to trick users
into breaking security
producers in order to gain
sensitive information that is
typically protected.
This Photo by Unknown Author is licensed under CC BY-SA
PHISHING:
Phishing is a form where
fraudulent emails are sent
that resemble emails
from reputable of these
emails is to steel sensitive
data such as credit card or
login information.
This Photo by Unknown Author is licensed under CC BY-SA-NC
CYBER SECURITY VENDORS
Vendors in cyber security
fields will typically use
endpoint ,network,and
advanced
threat,protection security
as well as data loss
prevention .
three commonaly
cybersecurity
vendors are..
cisco Mcafee Trend micro.
This Photo by Unknown
Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY-SA
ADVANTAGE OF CYBER SECURITY
 it will defend from hacks and virus.
 the application of cyber security used in ourpc
needs update everyweek
The security develpers will update their database
every week once. Henc the new virus also deleted
DIS ADVANTAGE OF CYBER SECURITY
 make the system slower than before
Need to keep uploading the new software
In order to keep security up to date
Could be costly for average user
BENEFITS IN CYBER SECURITY
Protection for data and network
Prevention of unauthorized users
Improve recovery time after a breech
Protection to end users
CAREER IN CYBER SECURITY
• AS the cyber threat land scape continues to grow and
emerging threats such as the internet of things require
hardware and software skills. it is estimated that there are
1 million unfilled cyber security job world wide. IT
professionals and other computer specialist are needed in
security job.
CISO (CHIEF INFORMATION SECURITY OFFICER)
SECURITY ENGINEER
ARCHITECT
ANALYST
This Photo by Unknown Author is licensed under CC BY-SA
CONCLUSION
• The only system which is truly secure is one
which is switched off and unplugged.
• So, only way to be safe is pay attention and act
smart
This Photo by Unknown Author is
licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is
licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by Unknown
Author is licensed under CC
BY-SA-NC
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by
Unknown Author
is licensed under
CC BY
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY
This Photo by
Unknown Author is
licensed under CC
BY-ND
BY- ABITHA JAYAVEL
ECE-1ST YEAR
R M K ENGINEERING COLLEGE
KAVARAIPETTAI.

Más contenido relacionado

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similar a cyber security

Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfCareerera
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxKAVYAC21
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cyber security
Cyber securityCyber security
Cyber securityAmanLodhi3
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10Sudeshna Biswas
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxMuhammad Khalid
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxAvanishsahu
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptxMamthaMam1
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 

Similar a cyber security (20)

Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 

Último

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Último (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

cyber security

  • 2.  INTRODUCTION  TYPES OF CYBER SECURITY THREATE  CYBER SECURITY VENDORS  ADVANTAGE IN CYBER SECURITY  DISADVANTAGE IN CYBER SECURITY  BENEFITS IN CYBER SECURITY  CAREER IN CYBER SECURITY  CONCLUSION This Photo by Unknown Author is licensed under CC BY
  • 3. INTRODUCTION • CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, • AND DATA FROM CYBERATTACKS. • MEANING OF CYBER • IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE INTERNET AND VIRTUAL REALITY • NEED OF CYBER SECURITY • CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR SYSTEM FROM VIRUS. • • • •
  • 4. TYPES OF CYBER SECURITY THREATE The process of keeping up with new technologies security trends and threat intelligence is a challenging task . However, it is necessary in order to protect information and other assets from cyber threats, which take many forms they are …. • ransomware • Malware • Social engineering • phishing
  • 5. RANSOMWARE: Ransome ware is a type of malware that involve an attacked locking the victims computer system files typically through encryption- and demanding a payment to decrypt and unlock them. This Photo by Unknown Author is licensed under CC BY
  • 6. MALWARE: Malware is any file or program used to harm a computer user, such as worms, computer viruses, trojan horses and spyware. This Photo by Unknown Author is licensed under CC BY
  • 7. SOCIAL ENGINEERING: Social engineering is an attack that relies on human interactions to trick users into breaking security producers in order to gain sensitive information that is typically protected. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. PHISHING: Phishing is a form where fraudulent emails are sent that resemble emails from reputable of these emails is to steel sensitive data such as credit card or login information. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 9. CYBER SECURITY VENDORS Vendors in cyber security fields will typically use endpoint ,network,and advanced threat,protection security as well as data loss prevention . three commonaly cybersecurity vendors are.. cisco Mcafee Trend micro. This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA
  • 10. ADVANTAGE OF CYBER SECURITY  it will defend from hacks and virus.  the application of cyber security used in ourpc needs update everyweek The security develpers will update their database every week once. Henc the new virus also deleted
  • 11. DIS ADVANTAGE OF CYBER SECURITY  make the system slower than before Need to keep uploading the new software In order to keep security up to date Could be costly for average user
  • 12. BENEFITS IN CYBER SECURITY Protection for data and network Prevention of unauthorized users Improve recovery time after a breech Protection to end users
  • 13.
  • 14. CAREER IN CYBER SECURITY • AS the cyber threat land scape continues to grow and emerging threats such as the internet of things require hardware and software skills. it is estimated that there are 1 million unfilled cyber security job world wide. IT professionals and other computer specialist are needed in security job.
  • 15. CISO (CHIEF INFORMATION SECURITY OFFICER) SECURITY ENGINEER ARCHITECT ANALYST This Photo by Unknown Author is licensed under CC BY-SA
  • 16. CONCLUSION • The only system which is truly secure is one which is switched off and unplugged. • So, only way to be safe is pay attention and act smart
  • 17. This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA-NC This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-ND
  • 18.
  • 19. BY- ABITHA JAYAVEL ECE-1ST YEAR R M K ENGINEERING COLLEGE KAVARAIPETTAI.