SlideShare a Scribd company logo
1 of 26
โ€ขNetworks
โ€ขComputers
โ€ขPrograms
โ€ขData from attack
โ€ขDamage
โ€ขUnauthorized access
CYBER SECURITY
1
IS THE BODY OF TECHNOLOGIES PROCESSES AND PRACTICES DESIGNED TO PROTECT
Jatins
โ€ขLoss or damage to computer hardware
โ€ขSoftware
โ€ขData
โ€ข Information
Some breaches to computer security are accidental, but
some are planned. Any illegal act involving a computer is
generally referred to as a computer crime.
RISKS OF COMPUTER SECURITY
2Jatins
Information systems security is INFOSEC, refers to the
processes and methodologies involved with keeping :
โ€ขInformation confidential
โ€ขAvailable
โ€ขAssuring its integrity
It also refers to: Access controls, which prevent unauthorized
personnel from entering or accessing a system.
SECURITY SYSTEM
3Jatins
CYBER TECHNOLOGY
4
Field of technology that deals with the development of:
โ€ขArtificial devices
โ€ขMachines
โ€ขTechniques
โ€ขIntelligence
โ€ขComponents
Jatins
5Jatins
Virus protection software is designed to prevent
viruses, worms and Trojan horses from getting onto a
computer as well as remove any malicious software
code that has already infected computer.
COMPUTER PROTECTION
6Jatins
Governments, military, corporations, financial institutions, hospitals
and other businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume and
sophistication of cyber attacks, ongoing attention is required to
protect sensitive business and personal information, as well as
safeguard national security.
7Jatins
AREAS OF CYBER SECURITY
8
Data in a database or on the file system
or a system resource
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity, and availability
Disaster recovery is the area of security planning
that deals with protecting an organization from
the effects of significant negative events.
policies and practices adopted to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network
and network-accessible resources.
Application Security
Information Security
Disaster recovery
Network Security
Jatins
9Jatins
Weakness
Exploitation of Weakness
Protections on Weakness
Plan to reduce Threats
Identify Threats
Cyber Securities
10
SECURE COMPUTER FROM ONLINE
THREATS WHILE SURFING INTERNET
1. Enable windows automatic updates feature
2. Install antivirus software
3. Activate windows firewall
4. Enable pop up blocker of your browser
5. Clean cookies and session data after using internet
6. Be aware from email spam
7. Be aware from phishing and internet frauds
Jatins
11Jatins
COMPUTER SECURITY - THREATS
โ€ข Intrusions
โ€“ Any attempt to gain unauthorized access to a system
โ€“ Cracking
โ€“ Hacking
โ€“ Social Engineering
โ€“ War-driving
WHAT IS CYBERCRIME?
โ€ข Using the Internet to commit a crime.
โ€“ Identity Theft
โ€“ Hacking
โ€“ Virus
โ€ข Facilitation of traditional criminal activity
โ€“ Stalking
โ€“ Stealing information
โ€“ Child Pornography
CYBERCRIME COMPONENTS
โ€ข Computers
โ€ข Cell Phones
โ€ข PDAโ€™s
โ€ข Game Consoles
COMPUTER SECURITY - TERMINOLOGY
โ€ข Script Kiddies
โ€“ Someone that calls themselves a โ€˜hackerโ€™ but really
isnโ€™t
โ€ข Ethical Hacker
โ€“ Someone hired to hack a system to find vulnerabilities
and report on them.
โ€“ Also called a โ€˜sneakerโ€™
Jatins
16
Allow a program or feature through window Firewall
18Jatins
Setting for each type of Network
19Jatins
20Jatins
21Jatins
22Jatins
23Jatins
24Jatins
25Jatins
26Jatins

More Related Content

What's hot

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
ย 
Securing information system
Securing information systemSecuring information system
Securing information system
ย 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
ย 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
ย 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
ย 
Computer security
Computer securityComputer security
Computer security
ย 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
Network Security
Network SecurityNetwork Security
Network Security
ย 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
ย 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
ย 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
ย 
cyber security
cyber securitycyber security
cyber security
ย 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
ย 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
ย 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
ย 
Security tools
Security toolsSecurity tools
Security tools
ย 

Similar to Cs tations-pps xversion

Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
ย 
SumitSingh51.pptx
SumitSingh51.pptxSumitSingh51.pptx
SumitSingh51.pptx
65sumitsingh
ย 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
ย 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
ย 

Similar to Cs tations-pps xversion (20)

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
ย 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
ย 
Computer Security
Computer SecurityComputer Security
Computer Security
ย 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
ย 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
ย 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
ย 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
ย 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
ย 
Cybersecurity_Issues and challenges.pptx
Cybersecurity_Issues and challenges.pptxCybersecurity_Issues and challenges.pptx
Cybersecurity_Issues and challenges.pptx
ย 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
ย 
Network security
Network securityNetwork security
Network security
ย 
Network Security
Network SecurityNetwork Security
Network Security
ย 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
ย 
SumitSingh51.pptx
SumitSingh51.pptxSumitSingh51.pptx
SumitSingh51.pptx
ย 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
ย 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
ย 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
ย 
Chapter 13
Chapter 13Chapter 13
Chapter 13
ย 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
ย 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
ย 

More from Jatins Anand

Measuring monitoring-reporting-performance
Measuring monitoring-reporting-performanceMeasuring monitoring-reporting-performance
Measuring monitoring-reporting-performance
Jatins Anand
ย 
432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2
Jatins Anand
ย 
415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf
Jatins Anand
ย 
309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1
Jatins Anand
ย 
309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1
Jatins Anand
ย 

More from Jatins Anand (9)

Articulating teachers
Articulating teachersArticulating teachers
Articulating teachers
ย 
Measuring monitoring-reporting-performance
Measuring monitoring-reporting-performanceMeasuring monitoring-reporting-performance
Measuring monitoring-reporting-performance
ย 
Articulating teachers
Articulating teachersArticulating teachers
Articulating teachers
ย 
All tasks assessment-501
All tasks assessment-501All tasks assessment-501
All tasks assessment-501
ย 
432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2432678614 done-bsbfim501-assessment-tasks-workbook2
432678614 done-bsbfim501-assessment-tasks-workbook2
ย 
415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf415629046 assessment-task-2-docx-pdf
415629046 assessment-task-2-docx-pdf
ย 
309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1309545760 bsbmkg501-e book-v1-1
309545760 bsbmkg501-e book-v1-1
ย 
309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1309545719 bsbmkg501-presentation-1
309545719 bsbmkg501-presentation-1
ย 
287363813 student workbook-7
287363813 student workbook-7287363813 student workbook-7
287363813 student workbook-7
ย 

Recently uploaded

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
SUHANI PANDEY
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
Diya Sharma
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
SUHANI PANDEY
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
SUHANI PANDEY
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
SUHANI PANDEY
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
imonikaupta
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 

Recently uploaded (20)

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
ย 

Cs tations-pps xversion

  • 1. โ€ขNetworks โ€ขComputers โ€ขPrograms โ€ขData from attack โ€ขDamage โ€ขUnauthorized access CYBER SECURITY 1 IS THE BODY OF TECHNOLOGIES PROCESSES AND PRACTICES DESIGNED TO PROTECT Jatins
  • 2. โ€ขLoss or damage to computer hardware โ€ขSoftware โ€ขData โ€ข Information Some breaches to computer security are accidental, but some are planned. Any illegal act involving a computer is generally referred to as a computer crime. RISKS OF COMPUTER SECURITY 2Jatins
  • 3. Information systems security is INFOSEC, refers to the processes and methodologies involved with keeping : โ€ขInformation confidential โ€ขAvailable โ€ขAssuring its integrity It also refers to: Access controls, which prevent unauthorized personnel from entering or accessing a system. SECURITY SYSTEM 3Jatins
  • 4. CYBER TECHNOLOGY 4 Field of technology that deals with the development of: โ€ขArtificial devices โ€ขMachines โ€ขTechniques โ€ขIntelligence โ€ขComponents Jatins
  • 6. Virus protection software is designed to prevent viruses, worms and Trojan horses from getting onto a computer as well as remove any malicious software code that has already infected computer. COMPUTER PROTECTION 6Jatins
  • 7. Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. 7Jatins
  • 8. AREAS OF CYBER SECURITY 8 Data in a database or on the file system or a system resource unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability Disaster recovery is the area of security planning that deals with protecting an organization from the effects of significant negative events. policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Application Security Information Security Disaster recovery Network Security Jatins
  • 9. 9Jatins Weakness Exploitation of Weakness Protections on Weakness Plan to reduce Threats Identify Threats Cyber Securities
  • 10. 10 SECURE COMPUTER FROM ONLINE THREATS WHILE SURFING INTERNET 1. Enable windows automatic updates feature 2. Install antivirus software 3. Activate windows firewall 4. Enable pop up blocker of your browser 5. Clean cookies and session data after using internet 6. Be aware from email spam 7. Be aware from phishing and internet frauds Jatins
  • 12. COMPUTER SECURITY - THREATS โ€ข Intrusions โ€“ Any attempt to gain unauthorized access to a system โ€“ Cracking โ€“ Hacking โ€“ Social Engineering โ€“ War-driving
  • 13. WHAT IS CYBERCRIME? โ€ข Using the Internet to commit a crime. โ€“ Identity Theft โ€“ Hacking โ€“ Virus โ€ข Facilitation of traditional criminal activity โ€“ Stalking โ€“ Stealing information โ€“ Child Pornography
  • 14. CYBERCRIME COMPONENTS โ€ข Computers โ€ข Cell Phones โ€ข PDAโ€™s โ€ข Game Consoles
  • 15. COMPUTER SECURITY - TERMINOLOGY โ€ข Script Kiddies โ€“ Someone that calls themselves a โ€˜hackerโ€™ but really isnโ€™t โ€ข Ethical Hacker โ€“ Someone hired to hack a system to find vulnerabilities and report on them. โ€“ Also called a โ€˜sneakerโ€™
  • 17. Allow a program or feature through window Firewall
  • 18. 18Jatins Setting for each type of Network