Cyber security refers to protecting networks, devices, programs and data from attacks, damage or unauthorized access. It is important as more people and infrastructure rely on online systems. Major cyber security threats include viruses, malware, trojan horses, hackers and password cracking. To improve cyber security, strong passwords, antivirus software, firewalls and keeping systems updated can help prevent hacking and malware infections. Cyber security is a shared responsibility and India has seen increasing cyber crimes like ransomware attacks and an online bank robbery where over 94 crore rupees were stolen.
2. INTRODUCTION
• The term cyber security is used to refer to the security offered through on-
line services to protect your online information.
• With an increasing amount of people getting connected to Internet, the
security threats that cause massive harm are increasing also.
• Cyber security refers to the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack,
damage, or unauthorized access. Cyber security may also be referred to as
information technology security.
3. Meaning of theWord CYBER
• It is a combining form relating to information technology, the Internet, and
virtual reality.
• Computer is just a type of box which is widely used in all over the world as a
machine. But actually it is a type of machine which is used to do the most
hard or difficult work easily. And now i am coming to the topic which is cyber
world introduction. Cyber means meant net, and world is world as all we
know. So that Cyber world means a a world of net in which anyone can
trapped of easily access your own personal identity.
4. Need of cyber security
• Cyber security is necessary since it helps in securing data from threats such
as data theft or misuse, also safeguards your system from viruses
• The increasing reliance of our information age economies and governments
on cyber (computer-based) infrastructure makes them progressively more
vulnerable to cyber attacks on our computer systems, networks and data. In
their most disruptive form, cyber attacks target the enterprise, government,
military, or other infrastructural assets of a nation or its citizens..
6. Viruses andWorms
• AVirus is a “program that is loaded onto your computer without your
knowledge and runs against your wishes.
7. Malware
• The word "malware" comes from the term "MALicious softWARE.“
• Malware is any software that infects and damages a computer system
without the owner's knowledge or permission.
8. Trojan Horses
• Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers.
9. Hackers
• In common a hacker is a person who breaks into computers, usually by
gaining access to administrative controls.
10. Password Cracking
• Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
11. HowTo prevent hacking
• It may be impossible to prevent computer hacking, however effective
security controls including strong passwords, and the use of firewalls can
helps.
12. Types of Hackers
• White Hat Hacker
• The term "white hat" in Internet slang refers to an ethical computer hacker,
or a computer security expert, who specializes in penetration testing and in
other testing methodologies that ensures the security of an organization's
information systems.
• Grey Hat Hacker
• The term "grey hat" refers to a computer hacker or computer security expert
who may sometimes violate laws or typical ethical standards, but does not
have the malicious intent typical of a black hat hacker.
• Black Hat Hacker
• A black hat hacker is a hacker who "violates computer security for little
reason beyond maliciousness or for personal gain".
13. Solution
• Install a security suite that protects the computer against threats such as
viruses and worms.
14. To Stop Malware
• Download an anti-malware program that also helps prevent infections.
• Activate NetworkThreat Protection, Firewall, Antivirus.
15. How to AvoidTrojans
• Security suites, such as Avast Internet Security, will prevent you from
downloadingTrojan Horses.
16. Securing Password
• Use always Strong password.
• Never use same password for two different sites.
18. Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes.
Capacity building
– Skill & Competence development
Research and Development
– Cyber Monitoring
– Network Security
International Collaboration
20. Cyber attacks in india
• ransomeware attack:-
• the global ransomeware attacks that hit hundred of system to phishing an
dsccaningh rackets ,
• at least one cybercrime was reported every 10 minutes inIndia in the first six
month of 2017.
21. Cosmos online bank robbery
• Attackers managed to siphon off over Rs 94 crore through a malware attack
on the server of Pune-based Cosmos Bank and cloning thousands of the
bank's debit cards over a period of two days .
• The fraudulent transactions were carried out onAugust 11 and August 13
and the malware attack by the hackers originated in Canada.
22. Conclusion
• I hope that my presentation will be helpful for my audience to improve their
knowledge about cyber security and to overcome several security loopholes
on their computer operation. Also it helps to spread awareness among
normal people about emerging security threats. Simple and practical
prevention methods are explained in the Seminar to prevent PCs from
infection.