SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Seminar
on
By
BHARAT BHUSHAN
Asst. Professor, Department of Computer Sc.
RLSY College, Ranchi
Ram Lakhan Singh Yadav College, Ranchi
www.rlsycollege.ac.in
CYBER SECURITY
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Presentation Contents
Cyber Security , Goal & It’s Importance
Threats
 Hacking
 Malware
 Phishing
Stay Secure
 Internet Shopping
 Internet Banking
Personal Privacy
 Public Wi-Fi
 Stay safe on public Wi-Fi
Tips to keep your computer safe
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Cyber Security
Cyber security is the practice of defending
Computers, Servers, Mobile Devices,
Electronic Systems, Networks, and Data
from malicious attacks.
Cyber Security’s goal
Protect our information and information
systems
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
The Importance of Cyber Security
Cyber security is important because smart
phones, computers and the internet are now
such a fundamental part of modern life, that it's
difficult to imagine how we'd function without
them.
From online banking and shopping, to email
and social media, it's more important than ever
to take steps that can prevent cyber criminals
getting hold of our accounts, data, and devices.
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Threats
Threat is a malicious act performed by
hackers to intentionally steal data or other
assets, misuse them, or simply cause
disruption in digital life in general.
Hacking
Hacking is the act of identifying and then
exploiting weaknesses in a computer system
or network, usually to gain unauthorized
access to personal or organizational data.
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Malware
Malware is intrusive software that is designed to damage
and destroy computers and computer systems.
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Phishing
Phishing is the activity of creating a fraud
web page looking exactly the same as
another website and collecting user’s private
information such as username, email,
password, credit card information through
that fraud web page as the user, in most
cases, will think this fraud web page is their
desired web page.
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Stay Secure
Many websites will display a lock symbol in the
address bar. This is most commonly seen on the
payment page of an online store. This means the
website is using an HTTPS connection, which
makes it safe to enter your information.
Look for HTTPS
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Stay Secure
Online shopping is a convenient way to buy
almost anything from the comfort of your
home. And while there are some risks with
shopping online, there are also many ways to
protect yourself and your financial
information.
Internet Shopping
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Stay Secure
 Avoid using internet banking on shared
computers and public places like cafés and
libraries.
 Always remember to log-off on internet banking
and close your browser when you have finished
your online banking.
 Disable the 'AutoComplete' function within your
browser..
Internet Banking
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Personal Privacy
Personal privacy is the protection of personal data
from those who should not have access to it and the
ability of individuals to determine who can access
their personal information.
Public Wi-Fi
One of the biggest threats with free Wi-Fi is the
ability for hackers to position themselves between
you and the connection point. So, instead of talking
directly with the hotspot, you end up sending your
information to the hacker.
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
How to stay safe on public Wi-Fi
Here’s what you need to do if you want to
minimize public Wi-Fi security risks:
 Use a VPN (Virtual Private Network)
 Turn off Bluetooth and file-sharing
 Don’t open or send sensitive data
 Use an antivirus
 Enable firewall
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyber Security
Tips to keep your computer safe
 System updates
 Remove junk software
 Back up
 Browse safely
 Firewall
 Unplug
Bharat Bhushan, Assistant Professor, RLSY College, Ranchi
Cyberbullying

Weitere ähnliche Inhalte

Ähnlich wie Cyber Security

Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
How to keep safe against hackers.pptx
How to keep safe against hackers.pptxHow to keep safe against hackers.pptx
How to keep safe against hackers.pptxinsightssuccess2
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfJihithaJP
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19ArielMcCurdy
 

Ähnlich wie Cyber Security (20)

Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
How to keep safe against hackers.pptx
How to keep safe against hackers.pptxHow to keep safe against hackers.pptx
How to keep safe against hackers.pptx
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Digital security
Digital securityDigital security
Digital security
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
 

Mehr von Bharat Bhushan

NIMCET 2023 : Questions
NIMCET 2023  : QuestionsNIMCET 2023  : Questions
NIMCET 2023 : QuestionsBharat Bhushan
 
Heuristics Search Techniques in AI
Heuristics Search Techniques in AI Heuristics Search Techniques in AI
Heuristics Search Techniques in AI Bharat Bhushan
 
Heuristics Search Techniques
Heuristics Search TechniquesHeuristics Search Techniques
Heuristics Search TechniquesBharat Bhushan
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceBharat Bhushan
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceBharat Bhushan
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI Bharat Bhushan
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI Bharat Bhushan
 
Algorithm Design Technique
Algorithm Design Technique Algorithm Design Technique
Algorithm Design Technique Bharat Bhushan
 
Production System in AI
Production System in AIProduction System in AI
Production System in AIBharat Bhushan
 
Production System in AI
Production System in AIProduction System in AI
Production System in AIBharat Bhushan
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial IntelligenceBharat Bhushan
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial IntelligenceBharat Bhushan
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial IntteligenceBharat Bhushan
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial IntteligenceBharat Bhushan
 
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir Bharat Bhushan
 
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSDESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSBharat Bhushan
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE Bharat Bhushan
 
ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS Bharat Bhushan
 

Mehr von Bharat Bhushan (20)

NIMCET 2023 : Questions
NIMCET 2023  : QuestionsNIMCET 2023  : Questions
NIMCET 2023 : Questions
 
Heuristics Search Techniques in AI
Heuristics Search Techniques in AI Heuristics Search Techniques in AI
Heuristics Search Techniques in AI
 
Heuristics Search Techniques
Heuristics Search TechniquesHeuristics Search Techniques
Heuristics Search Techniques
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
 
Dynamic Programming
Dynamic ProgrammingDynamic Programming
Dynamic Programming
 
Algorithm Design Technique
Algorithm Design Technique Algorithm Design Technique
Algorithm Design Technique
 
Production System in AI
Production System in AIProduction System in AI
Production System in AI
 
Production System in AI
Production System in AIProduction System in AI
Production System in AI
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial Intelligence
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial Intelligence
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial Intteligence
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial Intteligence
 
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
 
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSDESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE
 
ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 

Kürzlich hochgeladen

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Kürzlich hochgeladen (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Cyber Security

  • 1. Seminar on By BHARAT BHUSHAN Asst. Professor, Department of Computer Sc. RLSY College, Ranchi Ram Lakhan Singh Yadav College, Ranchi www.rlsycollege.ac.in CYBER SECURITY
  • 2. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Presentation Contents Cyber Security , Goal & It’s Importance Threats  Hacking  Malware  Phishing Stay Secure  Internet Shopping  Internet Banking Personal Privacy  Public Wi-Fi  Stay safe on public Wi-Fi Tips to keep your computer safe
  • 3. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Cyber Security Cyber security is the practice of defending Computers, Servers, Mobile Devices, Electronic Systems, Networks, and Data from malicious attacks. Cyber Security’s goal Protect our information and information systems
  • 4. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security The Importance of Cyber Security Cyber security is important because smart phones, computers and the internet are now such a fundamental part of modern life, that it's difficult to imagine how we'd function without them. From online banking and shopping, to email and social media, it's more important than ever to take steps that can prevent cyber criminals getting hold of our accounts, data, and devices.
  • 5. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Threats Threat is a malicious act performed by hackers to intentionally steal data or other assets, misuse them, or simply cause disruption in digital life in general. Hacking Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
  • 6. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Malware Malware is intrusive software that is designed to damage and destroy computers and computer systems.
  • 7. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Phishing Phishing is the activity of creating a fraud web page looking exactly the same as another website and collecting user’s private information such as username, email, password, credit card information through that fraud web page as the user, in most cases, will think this fraud web page is their desired web page.
  • 8. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Stay Secure Many websites will display a lock symbol in the address bar. This is most commonly seen on the payment page of an online store. This means the website is using an HTTPS connection, which makes it safe to enter your information. Look for HTTPS
  • 9. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Stay Secure Online shopping is a convenient way to buy almost anything from the comfort of your home. And while there are some risks with shopping online, there are also many ways to protect yourself and your financial information. Internet Shopping
  • 10. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Stay Secure  Avoid using internet banking on shared computers and public places like cafés and libraries.  Always remember to log-off on internet banking and close your browser when you have finished your online banking.  Disable the 'AutoComplete' function within your browser.. Internet Banking
  • 11. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Personal Privacy Personal privacy is the protection of personal data from those who should not have access to it and the ability of individuals to determine who can access their personal information. Public Wi-Fi One of the biggest threats with free Wi-Fi is the ability for hackers to position themselves between you and the connection point. So, instead of talking directly with the hotspot, you end up sending your information to the hacker.
  • 12. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security How to stay safe on public Wi-Fi Here’s what you need to do if you want to minimize public Wi-Fi security risks:  Use a VPN (Virtual Private Network)  Turn off Bluetooth and file-sharing  Don’t open or send sensitive data  Use an antivirus  Enable firewall
  • 13. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyber Security Tips to keep your computer safe  System updates  Remove junk software  Back up  Browse safely  Firewall  Unplug
  • 14. Bharat Bhushan, Assistant Professor, RLSY College, Ranchi Cyberbullying