SlideShare una empresa de Scribd logo
1 de 32
CYBER SECURITY
AND
DATA PROTECTION
By
Dr. Hemant Kumar Singh
Associate Professor & Head,
Deptt. of Computer Science & Engineering
INDEX
INTRODUCTION
IMPORTANCE/NEED OF CYBER SECURITY
SECURITY THREATS TO DATA
THREATS AND SOLUTIONS
CYBER LAW
IT ACT 2000/2008
CONCLUSION
Digital Era
Today we are living in digital era
Internet is used today-
 Booking hotels
 Ordering foods
 Booking cabs
Big data is generating today that is stored on cloud on huge data
servers or data centers
Array of devices used to access data stored on cloud.
For Hackers it is golden edge
A lot of access point, IP addresses.
Introduction
 Cyber security is the practice of protecting information and data from
outside sources on the Internet. Cyber security professionals provide
protection for networks, servers, intranets and computer systems.
 It also ensures that only authorized people have access to that
information.
 Cyber is related to the technology which contains systems, network
and programs or data. Whereas security related to the protection
which includes systems security, network security and application
and information security.
Why is cyber security important?
 Cyber security is necessary since it helps in securing data from threats
such as data theft or misuse, also safeguards your system from viruses.
 We all live in a world which is networked together, from internet
banking to government infrastructure, where data is stored on
computers and other devices. A portion of that data can be sensitive
information, whether that be intellectual property, financial data,
personal information, or other types of data for which unauthorized
access or exposure could have negative consequences.
 Cyber-attack is now an international concern and has given many
concerns that hacks and other security attacks could endanger the
global economy. Organizations transmit sensitive data across
networks and to other devices in the course of doing businesses,
and cyber security describes to protect that information and the
systems used to process or store it.
History
 1969- A professor in UCLA sent a message to standard research
institute.
 1970-Robert Thomson created first virus namely CREEPER
I am CREEPER Catch me if you can
Antivirus for creeper was PREEPER
 1986-Rassian used cyber power as weapons
 1988-American scientestist created program to check size of
internet
 After that we people started working on cyber security.
Security Goals(CIA)
 Confidentiality: No unauthorized access
 Integrity: What you sent,
received without alter
 Availability: 24X7 Access availability to authorized user
use encryption
HELLO HELLO
Cyber Threats
INTRUDER
Malware
Phishing
Password
Attacks
Man in
Middle
attack
DDOS
Trapdoors
Logic
bombs
Spoof
Macro
Virus
Malware
 The word "malware" comes from the term "MALicious softWARE“.
 Code with malicious intends steals data and destroys data from
computer eg. Trojan, Virus, Bombs
 To Stop Malware:
 Download an anti-malware program that also helps prevent
infections.
 Activate Network Threat Protection, Firewall, Antivirus.
Virus & Worms
 A piece of software that are designed to spread one computer to another
. Almost all viruses are executable files. A virus can spread using
 Network
 Disk
 File sharing
 Email attachments
 VLC download
Mail
Virus
Attachment
 Worms are piece of malware program that replicates and spreads
one computer to another. It spreads to itself to connected computers.
 Solution: Install a security suite that protects the computer against
threats such as viruses and worms.
Mail
WORM
(I LOVE YOU)2K
Trojan Horse
 Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
 It tricks user to running it behind the trusted program
 These viruses are the most serious threats to computers.
How to Avoid Trojans?
 Security suites, such as Avast Internet Security,
will prevent you from downloading trojan Horses.
Phishing
 Phishing attacks are sent in e mail and said by user to click on it
 Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
Password Attack
DDOS
Logic Bombs
Logic bombs attacks on system on specific condition
Eg. Saturday @10 o’clock
Trapdoors
Secret entry point in to a program that allows to gain access
system without using security access procedure.
Android – google can enter
Spoofing
Spoofing is often the way a bad actor gains access in order to execute a
larger cyber attack . E mail spoofing,Caller id spoof,Website spoof
DNS Spoofing
Man in Middle attack
Macro virus
Not created in any programming languages
Cyber Law
 Cyber Law is the law governing cyber space.
 Cyber space includes computers, networks, software's, data storage devices (such
as hard disks, USB disks etc), the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Law Deals with
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
IT ACT 2000
 The Information Technology Act, 2000 (IT Act), came into force on 17
October 2000.
 The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records with the
Government.
 Information Technology Act 2000 consisted of 94 sections segregated
into 13 chapters.
 To provide legal recognition for transactions
 To facilitate electronic filing of documents with the Government
agencies.
IT ACT 2000
Important Cyber Law Provisions in India
Offence Section under IT Act
 Tampering with Computer source documents
(with out the permission of in charge) Sec.43
 Hacking with Computer systems, Data alteration Sec.66
 Publishing obscene information Sec.67
 Un-authorized access to protected system Sec.70
 Breach of Confidentiality and Privacy Sec.72
 Publishing false digital signature certificates Sec.73
 Sending threatening & Defamatory messages by email
Sec 503 & 499 IPC
 Forgery of electronic records Sec 463 IPC
 Bogus websites, cyber frauds Sec 420 IPC
 Email spoofing & Abuse Sec 463 & 500 IPC
 Web-Jacking Sec 383 IPC
 Online sale of Drugs NDPS Act
 Online sale of Arms Arms Act
If any person uses a computer or system network without
permission of the owner or any other person who is in charge &
Access, download, Copy any data from such computer
 Introduces Computer Virus into any computer.
 Damages any computer network or computer.
Changes Account Settings.
Punishment
He shall be liable to pay damages by the way of compensation not
exceeding 1 Crore to affected person
Eg.-Section 43
Amendment IT ACT 2008
The IT Act 2008 has been notified on October 27, 2009
ITA-2008, is a new version of IT Act 2000
Provides additional focus on Information Security.
Added several new sections on offences including Cyber Terrorism and
Data Protection.
 124 sections and 14 chapters
Data Protection
 Personal data is any information relating to you, whether it relates
to your private, professional, or public life.
 Data protection means you should be able to decide whether or not
you want to share some information, who has access to it, for how
long, for what reason.
 The Data Protection Act 2018 controls how your personal
information is used by organizations, businesses or the government.
 Under the Data Protection Act 2018, you have the right to find out
what information the government and other organisations store
about you.
Conclusion
 In this presentation covers cyber security and information security as
well. Further we came to learn what is the need and history of it.
 Next, we learn about threats which are harmful for the data and system
and also came to know about their solutions.
 Finally cyber law and related acts and its sections and brief
introduction about the data protection.
Thinkbeforeyouclick.
THANK YOU

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Ppt
PptPpt
Ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 

Similar a Cyber security & Data Protection

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxNitishChoudhary23
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
 
Cyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxCyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxBhulanDeb
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

Similar a Cyber security & Data Protection (20)

Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptxCyber_security_EI _48,49,50.pptx
Cyber_security_EI _48,49,50.pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Más de Dr. Hemant Kumar Singh (6)

Datascience
DatascienceDatascience
Datascience
 
Engineers day
Engineers dayEngineers day
Engineers day
 
Data science
Data scienceData science
Data science
 
Ubuntu(Linux)
Ubuntu(Linux)Ubuntu(Linux)
Ubuntu(Linux)
 
Efficient approach for website design ppt
Efficient approach for website design pptEfficient approach for website design ppt
Efficient approach for website design ppt
 
SMS CISCO Networking Academy
SMS CISCO Networking AcademySMS CISCO Networking Academy
SMS CISCO Networking Academy
 

Último

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Último (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Cyber security & Data Protection

  • 1. CYBER SECURITY AND DATA PROTECTION By Dr. Hemant Kumar Singh Associate Professor & Head, Deptt. of Computer Science & Engineering
  • 2. INDEX INTRODUCTION IMPORTANCE/NEED OF CYBER SECURITY SECURITY THREATS TO DATA THREATS AND SOLUTIONS CYBER LAW IT ACT 2000/2008 CONCLUSION
  • 3.
  • 4. Digital Era Today we are living in digital era Internet is used today-  Booking hotels  Ordering foods  Booking cabs Big data is generating today that is stored on cloud on huge data servers or data centers Array of devices used to access data stored on cloud. For Hackers it is golden edge A lot of access point, IP addresses.
  • 5. Introduction  Cyber security is the practice of protecting information and data from outside sources on the Internet. Cyber security professionals provide protection for networks, servers, intranets and computer systems.  It also ensures that only authorized people have access to that information.
  • 6.  Cyber is related to the technology which contains systems, network and programs or data. Whereas security related to the protection which includes systems security, network security and application and information security.
  • 7. Why is cyber security important?  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.  We all live in a world which is networked together, from internet banking to government infrastructure, where data is stored on computers and other devices. A portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.
  • 8.  Cyber-attack is now an international concern and has given many concerns that hacks and other security attacks could endanger the global economy. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describes to protect that information and the systems used to process or store it.
  • 9. History  1969- A professor in UCLA sent a message to standard research institute.  1970-Robert Thomson created first virus namely CREEPER I am CREEPER Catch me if you can Antivirus for creeper was PREEPER  1986-Rassian used cyber power as weapons  1988-American scientestist created program to check size of internet  After that we people started working on cyber security.
  • 10. Security Goals(CIA)  Confidentiality: No unauthorized access  Integrity: What you sent, received without alter  Availability: 24X7 Access availability to authorized user use encryption HELLO HELLO
  • 12. Malware  The word "malware" comes from the term "MALicious softWARE“.  Code with malicious intends steals data and destroys data from computer eg. Trojan, Virus, Bombs  To Stop Malware:  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 13. Virus & Worms  A piece of software that are designed to spread one computer to another . Almost all viruses are executable files. A virus can spread using  Network  Disk  File sharing  Email attachments  VLC download Mail Virus Attachment
  • 14.  Worms are piece of malware program that replicates and spreads one computer to another. It spreads to itself to connected computers.  Solution: Install a security suite that protects the computer against threats such as viruses and worms. Mail WORM (I LOVE YOU)2K
  • 15. Trojan Horse  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  It tricks user to running it behind the trusted program  These viruses are the most serious threats to computers. How to Avoid Trojans?  Security suites, such as Avast Internet Security, will prevent you from downloading trojan Horses.
  • 16. Phishing  Phishing attacks are sent in e mail and said by user to click on it
  • 17.  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Securing Password:  Use always Strong password.  Never use same password for two different sites. Password Attack
  • 18. DDOS
  • 19. Logic Bombs Logic bombs attacks on system on specific condition Eg. Saturday @10 o’clock
  • 20. Trapdoors Secret entry point in to a program that allows to gain access system without using security access procedure. Android – google can enter
  • 21. Spoofing Spoofing is often the way a bad actor gains access in order to execute a larger cyber attack . E mail spoofing,Caller id spoof,Website spoof DNS Spoofing
  • 22. Man in Middle attack
  • 23. Macro virus Not created in any programming languages
  • 24. Cyber Law  Cyber Law is the law governing cyber space.  Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Cyber Law Deals with  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy
  • 25. IT ACT 2000  The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.  To provide legal recognition for transactions  To facilitate electronic filing of documents with the Government agencies.
  • 26. IT ACT 2000 Important Cyber Law Provisions in India Offence Section under IT Act  Tampering with Computer source documents (with out the permission of in charge) Sec.43  Hacking with Computer systems, Data alteration Sec.66  Publishing obscene information Sec.67  Un-authorized access to protected system Sec.70  Breach of Confidentiality and Privacy Sec.72  Publishing false digital signature certificates Sec.73
  • 27.  Sending threatening & Defamatory messages by email Sec 503 & 499 IPC  Forgery of electronic records Sec 463 IPC  Bogus websites, cyber frauds Sec 420 IPC  Email spoofing & Abuse Sec 463 & 500 IPC  Web-Jacking Sec 383 IPC  Online sale of Drugs NDPS Act  Online sale of Arms Arms Act
  • 28. If any person uses a computer or system network without permission of the owner or any other person who is in charge & Access, download, Copy any data from such computer  Introduces Computer Virus into any computer.  Damages any computer network or computer. Changes Account Settings. Punishment He shall be liable to pay damages by the way of compensation not exceeding 1 Crore to affected person Eg.-Section 43
  • 29. Amendment IT ACT 2008 The IT Act 2008 has been notified on October 27, 2009 ITA-2008, is a new version of IT Act 2000 Provides additional focus on Information Security. Added several new sections on offences including Cyber Terrorism and Data Protection.  124 sections and 14 chapters
  • 30. Data Protection  Personal data is any information relating to you, whether it relates to your private, professional, or public life.  Data protection means you should be able to decide whether or not you want to share some information, who has access to it, for how long, for what reason.  The Data Protection Act 2018 controls how your personal information is used by organizations, businesses or the government.  Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.
  • 31. Conclusion  In this presentation covers cyber security and information security as well. Further we came to learn what is the need and history of it.  Next, we learn about threats which are harmful for the data and system and also came to know about their solutions.  Finally cyber law and related acts and its sections and brief introduction about the data protection.

Notas del editor

  1. o