SlideShare una empresa de Scribd logo
1 de 10
We’re all going to have to change how we think about data
protection.
--- Elizabeth Denham
-By PARAB MISHRA
0133CS191120
2 2
Why are we talking about Cybersecurity ?
In
1999
In
2000
In
2017
In
2019
Computers of a US Department of Defense division are
installed with a ‘backdoor’ on its servers
Yahoo!, Amazon, Buy.com, CNN.com, eBay, E*Trade,
ZDNet websites hit with massive DoS attack
‘WannaCry’ ransomware attack, which encrypts data and
demands ransom in the Bitcoin
Facebook’s (about) 540 million records were published
on Amazon's cloud computing service
3 3
What is going on now-a-days?
Internet is highly, globally connected
Viruses/worms are in abundance on Internet and continuously
scanning for vulnerable hosts
Increasing
dependency on
internet
4 4
Cybersecurity ?
• Cybersecurity is the protection of systems, networks, applications and
programs from cyber attacks.
• These Cyber-attacks tend to access, change or even destroy sensitive
information to the extent of extorting money from users or causally interrupt a
normal business process.
In a very simple manner –
Cybersecurity = security of
5 5
Who Breaches into security ?
• Non-malicious hackers who
attempt to break into a
company’s or organization’s
systems at their request.
• Hackers without any affiliation to a
company that attempts to break into
a company’s network but risks the
law by doing so.
• Malicious hackers who break
into computer systems and
networks without authorization
or permission.
Hacker
• Any
technology
enthusiast
who uses his
technical
knowledge
and expert
skills to
break into
computer
systems.
White Hat
Hacker
Grey Hat
Hacker
Black Hat
Hacker
Hacktivists
Hackers who are
driven by a cause like
social change,
political agendas or
terrorism.
e.g. -
Anonymous
6 6
CyberAttacks
MITM
DoS Attack
Sniffing / Spoofing
Malware
Phishing
Password Attack
7 7
How to ensure your security ?
 PHISHING
 Be careful when going to any website by clicking on the link included in E-mail or SMS.
 Enter Your Sensitive Data (like Login credentials, Bank details, Personal details etc.
) in Secure Websites Only.
 Immediately respond to any unusual activity.
 SNIFFING / SPOOFING
 Always use ‘https’ website URL instead of ‘http’.
 Always see padlock sign in URL bar of browsing while visiting any website.
 Connect to trusted networks (Wi-Fi)
 Encrypt all data traffic that you send on network.
8 8
 MALWARE
 Use good Anti-malware (Antivirus software)
 Do not install application from untrusted publisher.
 Download software from official website.
 Configure a strong firewall.
 Use Ad-blocker while surfing the web.
 Never miss any update of your Operating System
and Antivirus software.
TYPES OF MALWARE
MALicious softWARE
9 9
 PASSWORD ATTACK
 Make alpha-numeric-symbolic password phrase.
 Do not keep same passwords.
 8-character string password can be hacked in less than 2.5 hours.
 It is impossible to crack 25-character string password.
 Man In The Middle & Denial Of Service ATTACK
 This can be prevented by using a strong firewall.
 By using IPS & IDS.
 By increasing your bandwidth size.
10 10
_ _ _ _ _ _ _ _ _ _ _
/  /  /  /  /  /  /  /  /  /  / 
( P | A | R | A | B ) ( M | I | S | H | R | A )
_/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/

Más contenido relacionado

La actualidad más candente

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

La actualidad más candente (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Similar a Cyber security presentation

Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
Yogesh Kumar
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Similar a Cyber security presentation (20)

Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Cyber security presentation

  • 1. We’re all going to have to change how we think about data protection. --- Elizabeth Denham -By PARAB MISHRA 0133CS191120
  • 2. 2 2 Why are we talking about Cybersecurity ? In 1999 In 2000 In 2017 In 2019 Computers of a US Department of Defense division are installed with a ‘backdoor’ on its servers Yahoo!, Amazon, Buy.com, CNN.com, eBay, E*Trade, ZDNet websites hit with massive DoS attack ‘WannaCry’ ransomware attack, which encrypts data and demands ransom in the Bitcoin Facebook’s (about) 540 million records were published on Amazon's cloud computing service
  • 3. 3 3 What is going on now-a-days? Internet is highly, globally connected Viruses/worms are in abundance on Internet and continuously scanning for vulnerable hosts Increasing dependency on internet
  • 4. 4 4 Cybersecurity ? • Cybersecurity is the protection of systems, networks, applications and programs from cyber attacks. • These Cyber-attacks tend to access, change or even destroy sensitive information to the extent of extorting money from users or causally interrupt a normal business process. In a very simple manner – Cybersecurity = security of
  • 5. 5 5 Who Breaches into security ? • Non-malicious hackers who attempt to break into a company’s or organization’s systems at their request. • Hackers without any affiliation to a company that attempts to break into a company’s network but risks the law by doing so. • Malicious hackers who break into computer systems and networks without authorization or permission. Hacker • Any technology enthusiast who uses his technical knowledge and expert skills to break into computer systems. White Hat Hacker Grey Hat Hacker Black Hat Hacker Hacktivists Hackers who are driven by a cause like social change, political agendas or terrorism. e.g. - Anonymous
  • 6. 6 6 CyberAttacks MITM DoS Attack Sniffing / Spoofing Malware Phishing Password Attack
  • 7. 7 7 How to ensure your security ?  PHISHING  Be careful when going to any website by clicking on the link included in E-mail or SMS.  Enter Your Sensitive Data (like Login credentials, Bank details, Personal details etc. ) in Secure Websites Only.  Immediately respond to any unusual activity.  SNIFFING / SPOOFING  Always use ‘https’ website URL instead of ‘http’.  Always see padlock sign in URL bar of browsing while visiting any website.  Connect to trusted networks (Wi-Fi)  Encrypt all data traffic that you send on network.
  • 8. 8 8  MALWARE  Use good Anti-malware (Antivirus software)  Do not install application from untrusted publisher.  Download software from official website.  Configure a strong firewall.  Use Ad-blocker while surfing the web.  Never miss any update of your Operating System and Antivirus software. TYPES OF MALWARE MALicious softWARE
  • 9. 9 9  PASSWORD ATTACK  Make alpha-numeric-symbolic password phrase.  Do not keep same passwords.  8-character string password can be hacked in less than 2.5 hours.  It is impossible to crack 25-character string password.  Man In The Middle & Denial Of Service ATTACK  This can be prevented by using a strong firewall.  By using IPS & IDS.  By increasing your bandwidth size.
  • 10. 10 10 _ _ _ _ _ _ _ _ _ _ _ / / / / / / / / / / / ( P | A | R | A | B ) ( M | I | S | H | R | A ) _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/