SlideShare ist ein Scribd-Unternehmen logo
1 von 13
CYBER SECURITY
BY ASIM ZUBAIR
INTRODUCTION
TYPES OF CYBER SECURITY THREATE
CYBER SECURITY VENDORS
ADVANTAGE IN CYBER SECURITY
DISADVANTAGE IN CYBER SECURITY
BENEFITS IN CYBER SECURITY
CONCLUSION
CONTENTS
INTODUCTION
CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED
SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, AND DATA FROM
CYBERATTACKS.
• MEANING OF CYBER •
IT IS A COMBINING FORM RELATING TO INFORMATION
TECHNOLOGY, THE INTERNET AND VIRTUAL REALITY
• NEED OF CYBER SECURITY •
CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA
FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO
SAFEGUARDS YOUR SYSTEM FROM VIRUS.
TYPES OF CYBER SECURITY
THREATE
The process of keeping up with new technologies security
trends and threat intelligence is a challenging task . However,
it is necessary in order to protect information and other
assets from cyber threats, which take many forms they are ….
• ransomware
• Malware
• Social engineering
• phishing
RANSOMWARE
Ransomeware is a type of
malware that involve an
attacked locking the victims
computer system files typically
through encryption and
demanding a payment to
decrypt and unlock them.
Malware, or malicious software, is
any program or file that is harmful
to a computer user. Types
of malware can include computer
viruses, worms, Trojan horses and
spyware. These malicious programs
can perform a variety of different
functions such as stealing,
encrypting or deleting sensitive
data, altering or hijacking core
computing functions and
monitoring users' computer activity
without their permission.
MALWARE
SOCIAL ENGINEERING
Social engineering is an attack
that relies on human
interactions to trick users into
breaking security producers in
order to gain sensitive
information that is typically
protected.
PHISHING
Phishing is a form where
fraudulent emails are sent that
resemble emails from reputable
of these emails is to steel
sensitive data such as credit card
or login information.
CYBER SECURITY VENDORS
Vendors in cyber security fields will typically use endpoint , network , and advanced
threat , protection security as well as data loss prevention .
Three commonaly cyber security vendors are
ADVANTAGE OF CYBER
SECURITY
– It will defend from hacks and virus.
– The application of cyber security used in our pc needs
update everyweek.
– The security develperes will update their database every
week once. Hence the new virus also deleted
DIS ADVANTAGE OF CYBER
SECURITY
– make the system slower than before.
– Need to keep uploading the new software.
– In order to keep security up to date.
– Could be costly for average user.
BENEFITS IN CYBER
SECURITY
– Protection for data and network.
– Prevention of unauthorized users.
– Improve recovery time after a breech .
– Protection to end users.
Cyber Security Guide Covering Threats, Vendors & Benefits

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie Cyber Security Guide Covering Threats, Vendors & Benefits

CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxKAVYAC21
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptxBalwantBesra
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptxBalwantBesra
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxParthYadav89
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 

Ähnlich wie Cyber Security Guide Covering Threats, Vendors & Benefits (20)

CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptx
 
BALWANT BESRA.pptx
BALWANT BESRA.pptxBALWANT BESRA.pptx
BALWANT BESRA.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Computer security
Computer securityComputer security
Computer security
 

Kürzlich hochgeladen

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Kürzlich hochgeladen (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Cyber Security Guide Covering Threats, Vendors & Benefits

  • 2. INTRODUCTION TYPES OF CYBER SECURITY THREATE CYBER SECURITY VENDORS ADVANTAGE IN CYBER SECURITY DISADVANTAGE IN CYBER SECURITY BENEFITS IN CYBER SECURITY CONCLUSION CONTENTS
  • 3. INTODUCTION CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, AND DATA FROM CYBERATTACKS. • MEANING OF CYBER • IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY, THE INTERNET AND VIRTUAL REALITY • NEED OF CYBER SECURITY • CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR SYSTEM FROM VIRUS.
  • 4. TYPES OF CYBER SECURITY THREATE The process of keeping up with new technologies security trends and threat intelligence is a challenging task . However, it is necessary in order to protect information and other assets from cyber threats, which take many forms they are …. • ransomware • Malware • Social engineering • phishing
  • 5. RANSOMWARE Ransomeware is a type of malware that involve an attacked locking the victims computer system files typically through encryption and demanding a payment to decrypt and unlock them.
  • 6. Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission. MALWARE
  • 7. SOCIAL ENGINEERING Social engineering is an attack that relies on human interactions to trick users into breaking security producers in order to gain sensitive information that is typically protected.
  • 8. PHISHING Phishing is a form where fraudulent emails are sent that resemble emails from reputable of these emails is to steel sensitive data such as credit card or login information.
  • 9. CYBER SECURITY VENDORS Vendors in cyber security fields will typically use endpoint , network , and advanced threat , protection security as well as data loss prevention . Three commonaly cyber security vendors are
  • 10. ADVANTAGE OF CYBER SECURITY – It will defend from hacks and virus. – The application of cyber security used in our pc needs update everyweek. – The security develperes will update their database every week once. Hence the new virus also deleted
  • 11. DIS ADVANTAGE OF CYBER SECURITY – make the system slower than before. – Need to keep uploading the new software. – In order to keep security up to date. – Could be costly for average user.
  • 12. BENEFITS IN CYBER SECURITY – Protection for data and network. – Prevention of unauthorized users. – Improve recovery time after a breech . – Protection to end users.