2. INTRODUCTION
WHAT REALLY IS CYBER SECURITY???
Cyber security standards are security which
enables organizations to practice safe security
techniques to minimize the number of successful
cyber security attacks
3. WHY IS CYBER SECURITY IMPORTANT????
Cyber crime threatens national security As the
Internet becomes a favorite tool of international
criminals, cyber crime perpetrated by organized
crime networks has become a real threat to
national and international
4. WHY SHOULD WE CARE ABOUT CYBER CRIME SECURITY???
Cyber crime is an criminal activity as there
are many activities such as hacking ,spams
,frauds,etc.
In cyber crime computer is either a tool or
target both.
5. HOW TO AVOID CYBER CRIME?
Read privacy policy carefully when you
submit the data through internet.
Encryption :lots of website uses SSL
(secures socket layer) to encrypt a data.
Disable remote connectivity
6. CURRENT STATS OF CYBER CRIME
current account of the RPG Group of companies and shifted
Cyber criminals hacked into the Mumbai-based Rs 2.4 crore
recently. The bank has blocked the accounts of the illegal
beneficiaries, but the hackers have already managed to
withdraw some funds from them, sources said.
8. HOW CYBER SECURITY LEADS THREATS TO ORGANISATION???
Majority see many cyber security threats to
organisation currently both insider threats
(malicious& non malicious) and hacktivism are
predicted by majority pose risk in 12 months
This highlights how cyber security is a continuing
challenge for organisations
9. ADVANTAGES OF CYBER SECURITY
It will defend from hacks and virus.
The application of cyber security used in our PC
needs update every week.
The security developers will update their database
every week once. Hence the new virus also
deleted.
10. SAFETY TIPS TO USE CYBER SECURITY
Understanding Hidden Threats: Rootkits and Botnets
Recognizing Fake Antiviruses
Avoiding the Pitfalls of Online Trading
Avoiding Social Engineering and Phishing Attacks
Dealing with Cyberbullies
Identifying Hoaxes and Urban Legends
Preventing and Responding to Identity Theft
Recognizing and Avoiding Spyware
Recovering from Viruses, Worms, and Trojan Horses
Handling Destructive Malware
Understanding Denial-of-Service Attacks
Understanding Hidden Threats: Corrupted Software Files
Email and communication
11. CONCLUSION
Some of the IPC under section laws in India are
1.Sec 66(tampering with computer documents)
2.Sec 66A(computer related offences)
3.Sec 66C(punishment for identity theft)
4.Sec 67(punishment for publishing or transmitting
obscene material in electronic form)