SlideShare ist ein Scribd-Unternehmen logo
1 von 19
CYBER SECURITY
ThisPhotobyUnknownAuthorislicensedunderCCBY-SA-NC
 INTRODUCTION
 TYPES OF CYBER SECURITY THREATE
 CYBER SECURITY VENDORS
 ADVANTAGE IN CYBER SECURITY
 DISADVANTAGE IN CYBER SECURITY
 BENEFITS IN CYBER SECURITY
 CAREER IN CYBER SECURITY
 CONCLUSION This Photo by Unknown Author is licensed under CC BY
INTRODUCTION
• CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS
INCLUDING ,HARDWARE,SOFTWARE,
• AND DATA FROM CYBERATTACKS.
• MEANING OF CYBER
• IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE
INTERNET AND VIRTUAL REALITY
• NEED OF CYBER SECURITY
• CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM
THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR
SYSTEM FROM VIRUS.
•
•
•
•
TYPES OF CYBER SECURITY THREATE
The process of keeping up with new
technologies security trends and
threat intelligence is a challenging
task . However, it is necessary in
order to protect information and
other assets from cyber threats,
which take many forms they are ….
• ransomware
• Malware
• Social engineering
• phishing
RANSOMWARE:
Ransome ware is a type of
malware that involve an
attacked locking the victims
computer system files
typically through encryption-
and demanding a payment
to decrypt and unlock them.
This Photo by Unknown Author is licensed under CC BY
MALWARE:
Malware is any file
or program used to
harm a computer
user, such as
worms, computer
viruses, trojan
horses and spyware.
This Photo by Unknown Author is licensed under CC BY
SOCIAL ENGINEERING:
Social engineering is an
attack that relies on human
interactions to trick users
into breaking security
producers in order to gain
sensitive information that is
typically protected.
This Photo by Unknown Author is licensed under CC BY-SA
PHISHING:
Phishing is a form where
fraudulent emails are sent
that resemble emails
from reputable of these
emails is to steel sensitive
data such as credit card or
login information.
This Photo by Unknown Author is licensed under CC BY-SA-NC
CYBER SECURITY VENDORS
Vendors in cyber security
fields will typically use
endpoint ,network,and
advanced
threat,protection security
as well as data loss
prevention .
three commonaly
cybersecurity
vendors are..
cisco Mcafee Trend micro.
This Photo by Unknown
Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY-SA
ADVANTAGE OF CYBER SECURITY
 it will defend from hacks and virus.
 the application of cyber security used in ourpc
needs update everyweek
The security develpers will update their database
every week once. Henc the new virus also deleted
DIS ADVANTAGE OF CYBER SECURITY
 make the system slower than before
Need to keep uploading the new software
In order to keep security up to date
Could be costly for average user
BENEFITS IN CYBER SECURITY
Protection for data and network
Prevention of unauthorized users
Improve recovery time after a breech
Protection to end users
CAREER IN CYBER SECURITY
• AS the cyber threat land scape continues to grow and
emerging threats such as the internet of things require
hardware and software skills. it is estimated that there are
1 million unfilled cyber security job world wide. IT
professionals and other computer specialist are needed in
security job.
CISO (CHIEF INFORMATION SECURITY OFFICER)
SECURITY ENGINEER
ARCHITECT
ANALYST
This Photo by Unknown Author is licensed under CC BY-SA
CONCLUSION
• The only system which is truly secure is one
which is switched off and unplugged.
• So, only way to be safe is pay attention and act
smart
This Photo by Unknown Author is
licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is
licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by Unknown
Author is licensed under CC
BY-SA-NC
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by
Unknown Author
is licensed under
CC BY
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY
This Photo by
Unknown Author is
licensed under CC
BY-ND
BY- ABITHA JAYAVEL
ECE-1ST YEAR
R M K ENGINEERING COLLEGE
KAVARAIPETTAI.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 

Was ist angesagt? (20)

Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie cyber security

Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfCareerera
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxKAVYAC21
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cyber security
Cyber securityCyber security
Cyber securityAmanLodhi3
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10Sudeshna Biswas
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxMuhammad Khalid
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxAvanishsahu
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptxMamthaMam1
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 

Ähnlich wie cyber security (20)

Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
 
Cyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptxCyber-Security.9286189.powerpoint.pptx
Cyber-Security.9286189.powerpoint.pptx
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 

Kürzlich hochgeladen

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 

Kürzlich hochgeladen (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 

cyber security

  • 2.  INTRODUCTION  TYPES OF CYBER SECURITY THREATE  CYBER SECURITY VENDORS  ADVANTAGE IN CYBER SECURITY  DISADVANTAGE IN CYBER SECURITY  BENEFITS IN CYBER SECURITY  CAREER IN CYBER SECURITY  CONCLUSION This Photo by Unknown Author is licensed under CC BY
  • 3. INTRODUCTION • CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS INCLUDING ,HARDWARE,SOFTWARE, • AND DATA FROM CYBERATTACKS. • MEANING OF CYBER • IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE INTERNET AND VIRTUAL REALITY • NEED OF CYBER SECURITY • CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR SYSTEM FROM VIRUS. • • • •
  • 4. TYPES OF CYBER SECURITY THREATE The process of keeping up with new technologies security trends and threat intelligence is a challenging task . However, it is necessary in order to protect information and other assets from cyber threats, which take many forms they are …. • ransomware • Malware • Social engineering • phishing
  • 5. RANSOMWARE: Ransome ware is a type of malware that involve an attacked locking the victims computer system files typically through encryption- and demanding a payment to decrypt and unlock them. This Photo by Unknown Author is licensed under CC BY
  • 6. MALWARE: Malware is any file or program used to harm a computer user, such as worms, computer viruses, trojan horses and spyware. This Photo by Unknown Author is licensed under CC BY
  • 7. SOCIAL ENGINEERING: Social engineering is an attack that relies on human interactions to trick users into breaking security producers in order to gain sensitive information that is typically protected. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. PHISHING: Phishing is a form where fraudulent emails are sent that resemble emails from reputable of these emails is to steel sensitive data such as credit card or login information. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 9. CYBER SECURITY VENDORS Vendors in cyber security fields will typically use endpoint ,network,and advanced threat,protection security as well as data loss prevention . three commonaly cybersecurity vendors are.. cisco Mcafee Trend micro. This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA
  • 10. ADVANTAGE OF CYBER SECURITY  it will defend from hacks and virus.  the application of cyber security used in ourpc needs update everyweek The security develpers will update their database every week once. Henc the new virus also deleted
  • 11. DIS ADVANTAGE OF CYBER SECURITY  make the system slower than before Need to keep uploading the new software In order to keep security up to date Could be costly for average user
  • 12. BENEFITS IN CYBER SECURITY Protection for data and network Prevention of unauthorized users Improve recovery time after a breech Protection to end users
  • 13.
  • 14. CAREER IN CYBER SECURITY • AS the cyber threat land scape continues to grow and emerging threats such as the internet of things require hardware and software skills. it is estimated that there are 1 million unfilled cyber security job world wide. IT professionals and other computer specialist are needed in security job.
  • 15. CISO (CHIEF INFORMATION SECURITY OFFICER) SECURITY ENGINEER ARCHITECT ANALYST This Photo by Unknown Author is licensed under CC BY-SA
  • 16. CONCLUSION • The only system which is truly secure is one which is switched off and unplugged. • So, only way to be safe is pay attention and act smart
  • 17. This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA-NC This Photo by Unknown Author is licensed under CC BY-ND This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY-ND
  • 18.
  • 19. BY- ABITHA JAYAVEL ECE-1ST YEAR R M K ENGINEERING COLLEGE KAVARAIPETTAI.