SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Cyber Security
Presented By: KANCHAN SAROJ
Contents:
 Introduction
 Overview of the Types of Cyber Security
 Types of Cyber Security Threats
 IT Act 2000
 Safety Tips of Cyber Crime
 Advantage and Disadvantage of Cyber Security
 Conclusion
 Reference
Introduction:
 August Kerckhoffs the father of computer security.
 Cyber Security is a process that’s designed to protect networks and
devices from external threats.
 It aims to reduce the risk of cyber attacks and protect
against the unauthorised exploitation of systems, networks
and technologies.
Overview of The types of Cyber Security:
Network Security
 This type of security refers to the protection of your
computer network from attacks inside and outside of
the network.
 Network security uses many different protocols to
block attacks but allows authorized user access to
the secure network.
Application Security
 This is the process of protecting sensitive information at the
app-level.
 .Application security might involve tactics like requiring a
strong password from the user.
 Application security may include hardware, software, and
procedures that identify or minimize security.
Cloud Security
 This includes keeping data private and safe across online-based infrastructure,
applications, and platforms.
 Most people use online systems such as Google Drive, Microsoft OneDrive, and
Apple iCloud for storage.
It is important for these platforms to remain secure at all times due to the
massive amounts of data stored on them.
 Cloud security can also include business services that are stored in a data
center.
Operational
Security
 Operational security (OPSEC) is a security and risk management
process that prevents sensitive information from getting into
the wrong hands.
 Operations security protects and controls sensitive assets,
contributing to an overall safe and secure organization.
 Good operational security should not require
complex, time consuming or expensive processes.
Types of Cyber Security
Threats:
Phishing
Attack
 These attackts are mainly executed by sending a
large number of emails to different users requesting
them to click a fake link or provide sensitive
information.
 The best way to prevent phishing attacks is to
monitor your emails closely by viewing the sender’s
email address before clicking on anything.
Password Attack
 The most common type of security that every user employs is a password. We
use them to login to our computers, phones, and music devices.
 One common type of password attack is to use social engineering to hack into a
user’s account. This could be sending a phishing email, monitoring social media
accounts.
 The best way to prevent a password attack is to maintain strong passwords and
change them often. Your passwords should include special characters,
numbers, and lower and upper case letters.
 You should never have the same password for more than one account.
Man-in-the-Middle Attack
 It is a type of attack that allows an attacker to intercepts the
connection between client and server and acts as a bridge
between them.
 Due to this, an attacker will be able to read, insert and modify the
data .
 It is the attack in which some data will be injected into a web application
to manipulate the application and fetch the required information.
 Example- SQL Injection, code Injection, log Injection, XML Injection etc.
Injection Attack
Dictionary Attack
 This type of attack stored the list of a commonly used password
and validated them to get original password.
Malware Attack
 A malware attack is when cybercriminals create malicious software that’s installed on
someone else’s device without their knowledge to gain access to personal
information.
 Malware attacks can occur on all sorts of devices and operating systems, including
Microsoft Windows, macOS, Android, and iOS.
 Different types of malware include viruses, spyware, ransomware, and Trojan
horses.
IT Act 2000:
• The Information Technology Act, 2000 is an Act of the Indian Parliament notified on
17 October 2000. It is the primary law in India dealing with cybercrime and electronic
The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and reduce cybercrimes.
commerce.
Originally Published: 9 May 2000
Introduced by: Pramod Mahajan; Minister of Communications and Information
Technology
Commenced: 17 October 2000
The IT Act, 2000 has two schedules:
•First Schedule –
Deals with documents to which the Act shall not apply.
•Second Schedule –
Deals with electronic signature or electronic authentication method.
Safety Tips for Cyber
Crime:
 Use strong password
 Keep your software updated
 Protect your Data
 Talk to your children about the internet
 Block spyware attacks
 Secure your computer
Advantage and Disadvantage of Cyber
Security:
Advantage:
 Protects system against viruses, worms, spyware and other
unwanted programs.
 It twill protect your business.
 Protects the computer from being hacked.
 Minimizes computer freezing and crashes.
 Gives privacy to users.
Disadvantage:
 Firewalls can be difficult to configure
correctly.
 Makes the system slower than before.
 Could be costly for average user.
 Need to keep updating the new
software in order to keep security up to
date.
Conclusion:
Cyber security is one of the most important aspects of the fast-paced
growing digital world.
The threats of it are hard to deny, so it is crucial to learn how to defend
from them and teach others how to do it .
References:
https://www.bsigroup.com
https://www.geeksforgeeks.org
https://en.wikipedia.org
https://www.analyticsinsight.net
Thank You

Weitere ähnliche Inhalte

Ähnlich wie Seminar ppt.pptx

Ähnlich wie Seminar ppt.pptx (20)

UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Information security
Information securityInformation security
Information security
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Kürzlich hochgeladen

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Kürzlich hochgeladen (20)

Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 

Seminar ppt.pptx

  • 2. Contents:  Introduction  Overview of the Types of Cyber Security  Types of Cyber Security Threats  IT Act 2000  Safety Tips of Cyber Crime  Advantage and Disadvantage of Cyber Security  Conclusion  Reference
  • 4.  August Kerckhoffs the father of computer security.  Cyber Security is a process that’s designed to protect networks and devices from external threats.  It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.
  • 5. Overview of The types of Cyber Security: Network Security  This type of security refers to the protection of your computer network from attacks inside and outside of the network.  Network security uses many different protocols to block attacks but allows authorized user access to the secure network.
  • 6. Application Security  This is the process of protecting sensitive information at the app-level.  .Application security might involve tactics like requiring a strong password from the user.  Application security may include hardware, software, and procedures that identify or minimize security.
  • 7. Cloud Security  This includes keeping data private and safe across online-based infrastructure, applications, and platforms.  Most people use online systems such as Google Drive, Microsoft OneDrive, and Apple iCloud for storage. It is important for these platforms to remain secure at all times due to the massive amounts of data stored on them.  Cloud security can also include business services that are stored in a data center.
  • 8. Operational Security  Operational security (OPSEC) is a security and risk management process that prevents sensitive information from getting into the wrong hands.  Operations security protects and controls sensitive assets, contributing to an overall safe and secure organization.  Good operational security should not require complex, time consuming or expensive processes.
  • 9. Types of Cyber Security Threats: Phishing Attack  These attackts are mainly executed by sending a large number of emails to different users requesting them to click a fake link or provide sensitive information.  The best way to prevent phishing attacks is to monitor your emails closely by viewing the sender’s email address before clicking on anything.
  • 10. Password Attack  The most common type of security that every user employs is a password. We use them to login to our computers, phones, and music devices.  One common type of password attack is to use social engineering to hack into a user’s account. This could be sending a phishing email, monitoring social media accounts.  The best way to prevent a password attack is to maintain strong passwords and change them often. Your passwords should include special characters, numbers, and lower and upper case letters.  You should never have the same password for more than one account.
  • 11. Man-in-the-Middle Attack  It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them.  Due to this, an attacker will be able to read, insert and modify the data .
  • 12.  It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information.  Example- SQL Injection, code Injection, log Injection, XML Injection etc. Injection Attack Dictionary Attack  This type of attack stored the list of a commonly used password and validated them to get original password.
  • 13. Malware Attack  A malware attack is when cybercriminals create malicious software that’s installed on someone else’s device without their knowledge to gain access to personal information.  Malware attacks can occur on all sorts of devices and operating systems, including Microsoft Windows, macOS, Android, and iOS.  Different types of malware include viruses, spyware, ransomware, and Trojan horses.
  • 14. IT Act 2000: • The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic The main objective of this act is to carry lawful and trustworthy electronic, digital and online transactions and reduce cybercrimes. commerce. Originally Published: 9 May 2000 Introduced by: Pramod Mahajan; Minister of Communications and Information Technology Commenced: 17 October 2000
  • 15. The IT Act, 2000 has two schedules: •First Schedule – Deals with documents to which the Act shall not apply. •Second Schedule – Deals with electronic signature or electronic authentication method.
  • 16. Safety Tips for Cyber Crime:  Use strong password  Keep your software updated  Protect your Data  Talk to your children about the internet  Block spyware attacks  Secure your computer
  • 17. Advantage and Disadvantage of Cyber Security: Advantage:  Protects system against viruses, worms, spyware and other unwanted programs.  It twill protect your business.  Protects the computer from being hacked.  Minimizes computer freezing and crashes.  Gives privacy to users.
  • 18. Disadvantage:  Firewalls can be difficult to configure correctly.  Makes the system slower than before.  Could be costly for average user.  Need to keep updating the new software in order to keep security up to date.
  • 19. Conclusion: Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats of it are hard to deny, so it is crucial to learn how to defend from them and teach others how to do it .