SlideShare ist ein Scribd-Unternehmen logo
1 von 22
PRESENTED BY:
HIMANSHU BHANDARI
ROLL NO: 23
INTRODUCTIO
N TO CYBER
SECURITY
THE INTERNET IS A GLOBAL INFORMATION
NETWORK THAT CONNECTS MILLIONS OF
COMPUTERS.
THE INTERNET HAS NO SINGLE INVENTOR
INSTEAD IT HAS EVOLVED OVER TIME.
• THE INTERNET GOT ITS START IN THE UNITED
STATES MORE THAN 65 YEARS AGO AS A
GOVERNMENT WEAPON IN THE COLD WAR.
• SCIENTISTS AND RESEARCHERS USED IT TO
COMMUNICATE AND SHARE DATA WITH ONE
ANOTHER THROUGH WHAT WAS KNOWN AS
DARPNET(DEFENSE’S ADVANCED RESEARCH
PROJECT AGENCY NETWORK.
Anatomy of a Web Address
Meaning of Cyber Security
Cyber security refers to the body
of technologies, processes, and
practices designed to protect
networks, devices, programs, and
data from attack, damage, or
unauthorized access. Cyber
security may also be referred to
as information technology
security.
MALWARE
• The word malware stands for “Malicious Software”.
• Malware is any software that infects and damages a computer system without the owner’s knowledge or
permission.
Types are:
• Adware
• Spyware
• Virus
• Worms
• Trojan Horse
• Scareware
•
•
•
•
•
•
•
•
Typesof
Hackers
 White Hat Hackers
 Grey Hat Hackers
 Black Hat Hackers
 Blue Hat Hackers
MOBILE PHONE SECURITY
• Sim Card Lock
• Screen Lock/ App Lock
• Location Setting
• Software Updates
• Keepass Droid
• VPN
• Desktop Site
BANKING SECURITY
■ CHANGE PASSWORDAND PIN (in a period of around 3 months)
■ Do not use your same email password
■ Always use HTTPS server while online transactions
■ Do not share OTP to some other parties
■ Use MPIN in UPITransactions
■ E-wallet Security
z
CYBER SECURITY COUNTER BY
INDIA
 NCTC (Counter Terrorism Center)
 NISAP (National Information Security Assurance Programme)
 MHA (Ministry of Home Affairs)
 NCRB (National Crime Records Bureau)
Thank You
Meaning of
Cyber
Security
Need of Cyber
Security
Implementing
Cyber
Security
To Understand
Major Security Problems
• Virus
• Hacker
• Malware
• Trojan Horse
• Password cracking
Viruses and Worms
• A Virus is a program that is loaded onto your computer without your
knowledge and runs against your wishes
Solution
• Install a security suite that projects the computer against threats such
as viruses and worms.
Hackers
• In common a hacker is a person who breaks into computers, usually
by gaining access to administrative controls.
How to prevent Hacking
• It may be impossible to prevent hacking computer hacking, however
effective security controls including strong passwords, and the use of
firewalls can helps.
To Stop Malware
• Download anti malware program that also help prevent infections.
• Activate Network Threat Protection, Firewall, Antivirus.
Trojan Horse
• Trojan Horse are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers.
Password Cracking
• Password attacks are able to determine passwords or find passwords
to different protected electronic areas and social network sites.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 

Ähnlich wie Cyber Security

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptxAreeb60
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 

Ähnlich wie Cyber Security (20)

Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
cyber security
cyber security cyber security
cyber security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Cyber Security

  • 1. PRESENTED BY: HIMANSHU BHANDARI ROLL NO: 23 INTRODUCTIO N TO CYBER SECURITY
  • 2. THE INTERNET IS A GLOBAL INFORMATION NETWORK THAT CONNECTS MILLIONS OF COMPUTERS. THE INTERNET HAS NO SINGLE INVENTOR INSTEAD IT HAS EVOLVED OVER TIME.
  • 3. • THE INTERNET GOT ITS START IN THE UNITED STATES MORE THAN 65 YEARS AGO AS A GOVERNMENT WEAPON IN THE COLD WAR. • SCIENTISTS AND RESEARCHERS USED IT TO COMMUNICATE AND SHARE DATA WITH ONE ANOTHER THROUGH WHAT WAS KNOWN AS DARPNET(DEFENSE’S ADVANCED RESEARCH PROJECT AGENCY NETWORK.
  • 4. Anatomy of a Web Address
  • 5. Meaning of Cyber Security Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 6. MALWARE • The word malware stands for “Malicious Software”. • Malware is any software that infects and damages a computer system without the owner’s knowledge or permission. Types are: • Adware • Spyware • Virus • Worms • Trojan Horse • Scareware
  • 8. Typesof Hackers  White Hat Hackers  Grey Hat Hackers  Black Hat Hackers  Blue Hat Hackers
  • 9.
  • 10. MOBILE PHONE SECURITY • Sim Card Lock • Screen Lock/ App Lock • Location Setting • Software Updates • Keepass Droid • VPN • Desktop Site
  • 11. BANKING SECURITY ■ CHANGE PASSWORDAND PIN (in a period of around 3 months) ■ Do not use your same email password ■ Always use HTTPS server while online transactions ■ Do not share OTP to some other parties ■ Use MPIN in UPITransactions ■ E-wallet Security
  • 12. z CYBER SECURITY COUNTER BY INDIA  NCTC (Counter Terrorism Center)  NISAP (National Information Security Assurance Programme)  MHA (Ministry of Home Affairs)  NCRB (National Crime Records Bureau)
  • 14. Meaning of Cyber Security Need of Cyber Security Implementing Cyber Security To Understand
  • 15. Major Security Problems • Virus • Hacker • Malware • Trojan Horse • Password cracking
  • 16. Viruses and Worms • A Virus is a program that is loaded onto your computer without your knowledge and runs against your wishes
  • 17. Solution • Install a security suite that projects the computer against threats such as viruses and worms.
  • 18. Hackers • In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 19. How to prevent Hacking • It may be impossible to prevent hacking computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 20. To Stop Malware • Download anti malware program that also help prevent infections. • Activate Network Threat Protection, Firewall, Antivirus.
  • 21. Trojan Horse • Trojan Horse are email viruses that can duplicate themselves, steal information, or harm the computer system. • These viruses are the most serious threats to computers.
  • 22. Password Cracking • Password attacks are able to determine passwords or find passwords to different protected electronic areas and social network sites.