SlideShare a Scribd company logo
1 of 28
INTRODUCTION
Meaning Of Word Cyber
It is a combining form
relating to information
technology, the
Internet, and virtual
reality.
Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming) or is used as a tool to commit an offense
(child pornography, hate crimes). Cybercriminals
may use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
Criminals can also use computers for communication
and document or data storage. Criminals who
perform these illegal activities are often referred to
as hackers.
CYBERCRIME
TYPES OF CYBER CRIME
1. HACKING
• Hacking in simple terms means an illegal intrusion into a computer
system and/or network.
2. DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the bandwidth of the victims
network.
3. VIRUS DISSEMINATION
• Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc.)
4. COMPUTER VANDALISM
• Damaging or destroying data rather than stealing.
5. CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
6. SOFTWARE PIRACY • Theft of software through the illegal copying of
genuine programs.
CYBER SECURITY
• The term Cyber security is used to
refer to the security offered through
on-line services to protect your
online information. With an
increasing amount of people getting
connected to Internet, the security
threats that cause massive harm are
increasing also.
WHAT IS CYBERBULLYING ?
Cyber Bullying is the use of the Internet and related
technologies to harm other people in a deliberate, repeated,
and hostile manner."
• Sending mean messages or threats to a person's email
account or cell phone.
• Spreading rumors online or through texts. • Posting hurtful
or threatening messages on social networking sites or web
pages.
• Stealing a person's account information to break into their
account and send damaging messages.
• Pretending to be someone else online to hurt another
person.
• Taking unflattering pictures of a person and spreading them
through cell phones or the Internet
FORMS OF CYBERBULLYING ?
• Whether it's posting public pictures, social statuses, or personal
messages, cyber bullying takes many forms. The most popular cyber
bullying tactics are:
• FLAMING -Online fights using electronic messages with angry and
vulgar language.
• HARASSMENT -Repeatedly sending nasty, mean, and insulting
messages.
• DENIGRATION - "Dissing" someone on line. Sending or posting
gossip or rumors about a person to damage his or her reputation or
friendships,
• IMPERSONATION - Pretending to be someone else and sending or
posting material to get that person in trouble or danger or to
damage that person's reputation or friendships.
EFFECTS OF CYBERBULLING
• SOLUTION :-
MALWAR
• The word "malware" comes from the term
"MALicious softWARE." Malware is any
software that infects and damages a
computer system without the owner's
knowledge or permission.
• SOLUTION :-
• To Stop Malware
• Download an anti-malware program that
also helps prevent infections. Activate
Network Threat Protection, Firewall,
TROJAN HORSES
• A Trojan horse is a file that is often confused to be
a computer virus. While it is still harmful, it is not
considered a virus because it does not spread from
computer to computer. What a Trojan horse does
do is disguise itself as another file, such as a
computer game or a Word document, and then
activates once you open up the file.
• SOLUTION :-
• Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses
EMAIL VIRUSES
• Password attacks are attacks by
hackers that are able to determine
passwords or find passwords to
different protected electronic areas
and social network sites
• In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
• Types of Hackers ::-
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
• SOLUTION:-
• It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
ANTIVIRUS
• Viruses have been designed by cybercriminals to compromise
the data in your system.
• In the absence of an antivirus solution, they can easily
damage important information and disturb the operating
system, ultimately rendering the machine virtually
worthless.
• With the security provided by strong antivirus protection,
however, the self-replicating codes don’t stand a chance of
reaching the heart and brain of your computer that is the
CPU – accordingly protecting your system and the data it
contains.
Protection from Hackers
ADVANTAGES OF ANTIVIRUS
Extends the life of your computer
• Some of the most comprehensive and
reliable antivirus applications on the
market are viewed as an unnecessary
and costly addition to your computer
when, in real sense, they are offering
insurance against future expense
• "Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity“
BE CAREFUL
• While there are many ways for your identity to get stolen,
the easiest way to become a victim of identity theft is by
sharing personal information over the internet. If you
aren't careful, criminals could steal your identity by
finding any of the following:
• Credit Card Information
• Bank Account Number
• Personal Identification
DIFFERENT ANTIVIRUS
NAME:-
• QUICK TIPS:-
• Update your software frequently.There are new types of
viruses coming out every day and if your anti-virus program
might not catch them if it's too old.
• Always be careful, even if you have an anti-virus software. It
is common for some programs to miss Trojan horses so you
watch out for suspicious files.
• Backup your computer regularly. This is a good habit to get
into in case any fatal errors occur.
• Be aware of everything you download. This task might seem
mundane but it's one of the most important steps you can
take.
• Scan any new files you may download. You can perform a
virus scan with your anti-virus software as an extra
protection measure.
GENERAL INTERNET SAFETY• It's always good to be cautious while on the internet. There are people in
the cyber world who want to do harm to you or your computer.
• These are some good tips to keep in mind while you are surfing:
• Be careful about what you put on the web.
• It's on there forever and can be used to trace back to you at any time.
• Keep track of who you interact with on the internet.
• Some people may not be who they seem to be.
• Know that privacy is just an illusion.
• Even personal information on social networks can be easily recovered by
anyone.
• Don't open any links in emails or chat rooms that look suspicious or
unfamiliar.
• Also, never open any strange files that your computer may have
downloaded from an email or a website.
I hope that my presentation will be helpful
for my audience to improve their knowledge
about cyber security and to overcome
several security loopholes on their
computer operation. Also it helps to spread
awareness among normal people about
emerging security threats. Simple and
practical prevention methods are explained
in the Seminar to prevent PCs from infection
Saurabh Kaushik

More Related Content

What's hot

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptxSonuRoy30
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber SecurityPrashant Sharma
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 

What's hot (20)

Network Security
Network Security Network Security
Network Security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 

Similar to Cyber security

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 

Similar to Cyber security (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Cyber security

  • 1.
  • 3. Meaning Of Word Cyber It is a combining form relating to information technology, the Internet, and virtual reality.
  • 4. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. CYBERCRIME
  • 5. TYPES OF CYBER CRIME 1. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network. 2. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. 3. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 4. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. 5. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. 6. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs.
  • 6. CYBER SECURITY • The term Cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 7.
  • 8. WHAT IS CYBERBULLYING ? Cyber Bullying is the use of the Internet and related technologies to harm other people in a deliberate, repeated, and hostile manner." • Sending mean messages or threats to a person's email account or cell phone. • Spreading rumors online or through texts. • Posting hurtful or threatening messages on social networking sites or web pages. • Stealing a person's account information to break into their account and send damaging messages. • Pretending to be someone else online to hurt another person. • Taking unflattering pictures of a person and spreading them through cell phones or the Internet
  • 9. FORMS OF CYBERBULLYING ? • Whether it's posting public pictures, social statuses, or personal messages, cyber bullying takes many forms. The most popular cyber bullying tactics are: • FLAMING -Online fights using electronic messages with angry and vulgar language. • HARASSMENT -Repeatedly sending nasty, mean, and insulting messages. • DENIGRATION - "Dissing" someone on line. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships, • IMPERSONATION - Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  • 11.
  • 13. MALWAR • The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission. • SOLUTION :- • To Stop Malware • Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall,
  • 14. TROJAN HORSES • A Trojan horse is a file that is often confused to be a computer virus. While it is still harmful, it is not considered a virus because it does not spread from computer to computer. What a Trojan horse does do is disguise itself as another file, such as a computer game or a Word document, and then activates once you open up the file. • SOLUTION :- • Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses
  • 16. • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites
  • 17. • In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls. • Types of Hackers ::- • White Hat Hacker • Grey Hat Hacker • Black Hat Hacker • SOLUTION:- • It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 19. • Viruses have been designed by cybercriminals to compromise the data in your system. • In the absence of an antivirus solution, they can easily damage important information and disturb the operating system, ultimately rendering the machine virtually worthless. • With the security provided by strong antivirus protection, however, the self-replicating codes don’t stand a chance of reaching the heart and brain of your computer that is the CPU – accordingly protecting your system and the data it contains.
  • 21. ADVANTAGES OF ANTIVIRUS Extends the life of your computer • Some of the most comprehensive and reliable antivirus applications on the market are viewed as an unnecessary and costly addition to your computer when, in real sense, they are offering insurance against future expense
  • 22. • "Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity“ BE CAREFUL • While there are many ways for your identity to get stolen, the easiest way to become a victim of identity theft is by sharing personal information over the internet. If you aren't careful, criminals could steal your identity by finding any of the following: • Credit Card Information • Bank Account Number • Personal Identification
  • 24. • QUICK TIPS:- • Update your software frequently.There are new types of viruses coming out every day and if your anti-virus program might not catch them if it's too old. • Always be careful, even if you have an anti-virus software. It is common for some programs to miss Trojan horses so you watch out for suspicious files. • Backup your computer regularly. This is a good habit to get into in case any fatal errors occur. • Be aware of everything you download. This task might seem mundane but it's one of the most important steps you can take. • Scan any new files you may download. You can perform a virus scan with your anti-virus software as an extra protection measure.
  • 25. GENERAL INTERNET SAFETY• It's always good to be cautious while on the internet. There are people in the cyber world who want to do harm to you or your computer. • These are some good tips to keep in mind while you are surfing: • Be careful about what you put on the web. • It's on there forever and can be used to trace back to you at any time. • Keep track of who you interact with on the internet. • Some people may not be who they seem to be. • Know that privacy is just an illusion. • Even personal information on social networks can be easily recovered by anyone. • Don't open any links in emails or chat rooms that look suspicious or unfamiliar. • Also, never open any strange files that your computer may have downloaded from an email or a website.
  • 26. I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection
  • 27.