4. Digital Era
Today we are living in digital era
Internet is used today-
Booking hotels
Ordering foods
Booking cabs
Big data is generating today that is stored on cloud on huge data
servers or data centers
Array of devices used to access data stored on cloud.
For Hackers it is golden edge
A lot of access point, IP addresses.
5. Introduction
Cyber security is the practice of protecting information and data from
outside sources on the Internet. Cyber security professionals provide
protection for networks, servers, intranets and computer systems.
It also ensures that only authorized people have access to that
information.
6. Cyber is related to the technology which contains systems, network
and programs or data. Whereas security related to the protection
which includes systems security, network security and application
and information security.
7. Why is cyber security important?
Cyber security is necessary since it helps in securing data from threats
such as data theft or misuse, also safeguards your system from viruses.
We all live in a world which is networked together, from internet
banking to government infrastructure, where data is stored on
computers and other devices. A portion of that data can be sensitive
information, whether that be intellectual property, financial data,
personal information, or other types of data for which unauthorized
access or exposure could have negative consequences.
8. Cyber-attack is now an international concern and has given many
concerns that hacks and other security attacks could endanger the
global economy. Organizations transmit sensitive data across
networks and to other devices in the course of doing businesses,
and cyber security describes to protect that information and the
systems used to process or store it.
9. History
1969- A professor in UCLA sent a message to standard research
institute.
1970-Robert Thomson created first virus namely CREEPER
I am CREEPER Catch me if you can
Antivirus for creeper was PREEPER
1986-Rassian used cyber power as weapons
1988-American scientestist created program to check size of
internet
After that we people started working on cyber security.
10. Security Goals(CIA)
Confidentiality: No unauthorized access
Integrity: What you sent,
received without alter
Availability: 24X7 Access availability to authorized user
use encryption
HELLO HELLO
12. Malware
The word "malware" comes from the term "MALicious softWARE“.
Code with malicious intends steals data and destroys data from
computer eg. Trojan, Virus, Bombs
To Stop Malware:
Download an anti-malware program that also helps prevent
infections.
Activate Network Threat Protection, Firewall, Antivirus.
13. Virus & Worms
A piece of software that are designed to spread one computer to another
. Almost all viruses are executable files. A virus can spread using
Network
Disk
File sharing
Email attachments
VLC download
Mail
Virus
Attachment
14. Worms are piece of malware program that replicates and spreads
one computer to another. It spreads to itself to connected computers.
Solution: Install a security suite that protects the computer against
threats such as viruses and worms.
Mail
WORM
(I LOVE YOU)2K
15. Trojan Horse
Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
It tricks user to running it behind the trusted program
These viruses are the most serious threats to computers.
How to Avoid Trojans?
Security suites, such as Avast Internet Security,
will prevent you from downloading trojan Horses.
17. Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
Securing Password:
Use always Strong password.
Never use same password for two different sites.
Password Attack
20. Trapdoors
Secret entry point in to a program that allows to gain access
system without using security access procedure.
Android – google can enter
21. Spoofing
Spoofing is often the way a bad actor gains access in order to execute a
larger cyber attack . E mail spoofing,Caller id spoof,Website spoof
DNS Spoofing
24. Cyber Law
Cyber Law is the law governing cyber space.
Cyber space includes computers, networks, software's, data storage devices (such
as hard disks, USB disks etc), the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Law Deals with
Cyber Crimes
Electronic or Digital Signatures
Intellectual Property
Data Protection and Privacy
25. IT ACT 2000
The Information Technology Act, 2000 (IT Act), came into force on 17
October 2000.
The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records with the
Government.
Information Technology Act 2000 consisted of 94 sections segregated
into 13 chapters.
To provide legal recognition for transactions
To facilitate electronic filing of documents with the Government
agencies.
26. IT ACT 2000
Important Cyber Law Provisions in India
Offence Section under IT Act
Tampering with Computer source documents
(with out the permission of in charge) Sec.43
Hacking with Computer systems, Data alteration Sec.66
Publishing obscene information Sec.67
Un-authorized access to protected system Sec.70
Breach of Confidentiality and Privacy Sec.72
Publishing false digital signature certificates Sec.73
27. Sending threatening & Defamatory messages by email
Sec 503 & 499 IPC
Forgery of electronic records Sec 463 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing & Abuse Sec 463 & 500 IPC
Web-Jacking Sec 383 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
28. If any person uses a computer or system network without
permission of the owner or any other person who is in charge &
Access, download, Copy any data from such computer
Introduces Computer Virus into any computer.
Damages any computer network or computer.
Changes Account Settings.
Punishment
He shall be liable to pay damages by the way of compensation not
exceeding 1 Crore to affected person
Eg.-Section 43
29. Amendment IT ACT 2008
The IT Act 2008 has been notified on October 27, 2009
ITA-2008, is a new version of IT Act 2000
Provides additional focus on Information Security.
Added several new sections on offences including Cyber Terrorism and
Data Protection.
124 sections and 14 chapters
30. Data Protection
Personal data is any information relating to you, whether it relates
to your private, professional, or public life.
Data protection means you should be able to decide whether or not
you want to share some information, who has access to it, for how
long, for what reason.
The Data Protection Act 2018 controls how your personal
information is used by organizations, businesses or the government.
Under the Data Protection Act 2018, you have the right to find out
what information the government and other organisations store
about you.
31. Conclusion
In this presentation covers cyber security and information security as
well. Further we came to learn what is the need and history of it.
Next, we learn about threats which are harmful for the data and system
and also came to know about their solutions.
Finally cyber law and related acts and its sections and brief
introduction about the data protection.