SlideShare a Scribd company logo
1 of 20
Introduction :
 The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
1
virus dissemination:
Malicious software that attaches itself to
other software. (virus, worms, Trojan Horse,
web jacking, e-mail bombing etc.)
2
Needof cyber security:
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
3
Major security problem:
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
4
Viruses & worms:
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
5
solution:
 Install a security suite that protects the
computer against threats such as viruses and
worms.
6
Malware:
 The word "malware" comes from the term
 "MALicious softWARE."
 Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
7
Hackers:
 In common a hacker is a person who
breaks into computers, usually by gaining
access to administrative controls.
8
DEFINING CYBER CRIME:
Crime committed using a computer and the
internet to steal data or information.
Illegal imports.
Malicious programs.
9
Types of Hackers:
 White Hat
Hacker
 Grey Hat Hacker
 Black Hat Hacker
10
Hacking:
Hacking in simple terms means an illegal
intrusion into a computer system and/or network.
11
How To prevent hacking:
 It may be impossible to prevent computer hacking,
however effective security controls including
strong passwords, and the use of firewalls can
helps.
12
Trojan Horses :
 Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
 These viruses are the
most serious threats
to computers
13
PasswordCracking:
 Password attacks are attacks by hackers that are able
to determine passwords or find passwords to
different protected electronic areas and social
network sites.
14
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
15
CYBERATTACK:
A malicious attempt, using digital
technologies, to cause personal or property
loss or damage, and/or steal or alter
confidential personal or organisational
data.
16
Scope of cyber security:
Techniques of threat and attack analysis
and mitigation
Protection and recovery technologies,
processes and procedures for individuals,
business and government
Policies, laws and regulation relevant to
the use of computers and the Internet
17
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
18
Cyber security

More Related Content

What's hot

10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information securityRashad Aliyev
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 

What's hot (18)

10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 

Viewers also liked

El grito de independencia
El grito de independenciaEl grito de independencia
El grito de independenciaMariana Delgado
 
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.Norbert Niemirski
 
Budget Presentation for Budget Managers
Budget Presentation for Budget Managers Budget Presentation for Budget Managers
Budget Presentation for Budget Managers Diana Antezana
 
3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin Hatfield3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin HatfieldDustin Hatfield
 
Angeles cobo segundo parcial
Angeles cobo segundo parcialAngeles cobo segundo parcial
Angeles cobo segundo parcialAngeles Cobo
 

Viewers also liked (9)

Likoni farming centre
Likoni farming centreLikoni farming centre
Likoni farming centre
 
The Rag Doll
The Rag DollThe Rag Doll
The Rag Doll
 
El grito de independencia
El grito de independenciaEl grito de independencia
El grito de independencia
 
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
Zea konkurs regulamin który z hoteli w zea cieszy się najwiekszą popularnością.
 
Reforma Tributaria ADF
Reforma Tributaria ADFReforma Tributaria ADF
Reforma Tributaria ADF
 
Ppt ch07
Ppt ch07Ppt ch07
Ppt ch07
 
Budget Presentation for Budget Managers
Budget Presentation for Budget Managers Budget Presentation for Budget Managers
Budget Presentation for Budget Managers
 
3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin Hatfield3 Elements to Setting Goals By: Dustin Hatfield
3 Elements to Setting Goals By: Dustin Hatfield
 
Angeles cobo segundo parcial
Angeles cobo segundo parcialAngeles cobo segundo parcial
Angeles cobo segundo parcial
 

Similar to Cyber security

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12ANURAGYADAV265
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 

Similar to Cyber security (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
Cyber security
Cyber securityCyber security
Cyber security
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

More from Sajid Hasan

Digital differential analyzer
Digital differential analyzerDigital differential analyzer
Digital differential analyzerSajid Hasan
 
Rgb and Cmy color model
Rgb and Cmy color modelRgb and Cmy color model
Rgb and Cmy color modelSajid Hasan
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security AttacksSajid Hasan
 
Lcs & fractional knapsack
Lcs & fractional knapsackLcs & fractional knapsack
Lcs & fractional knapsackSajid Hasan
 
Bar chart, pie chart, histogram
Bar chart, pie chart, histogramBar chart, pie chart, histogram
Bar chart, pie chart, histogramSajid Hasan
 
Rangpur as a division in Bangladesh
Rangpur as a division in BangladeshRangpur as a division in Bangladesh
Rangpur as a division in BangladeshSajid Hasan
 
Basic array in c programming
Basic array in c programmingBasic array in c programming
Basic array in c programmingSajid Hasan
 

More from Sajid Hasan (11)

Digital differential analyzer
Digital differential analyzerDigital differential analyzer
Digital differential analyzer
 
Rgb and Cmy color model
Rgb and Cmy color modelRgb and Cmy color model
Rgb and Cmy color model
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Line coding
Line codingLine coding
Line coding
 
Plasmid
PlasmidPlasmid
Plasmid
 
Lcs & fractional knapsack
Lcs & fractional knapsackLcs & fractional knapsack
Lcs & fractional knapsack
 
Bar chart, pie chart, histogram
Bar chart, pie chart, histogramBar chart, pie chart, histogram
Bar chart, pie chart, histogram
 
Semiconductor
SemiconductorSemiconductor
Semiconductor
 
Rangpur as a division in Bangladesh
Rangpur as a division in BangladeshRangpur as a division in Bangladesh
Rangpur as a division in Bangladesh
 
Basic array in c programming
Basic array in c programmingBasic array in c programming
Basic array in c programming
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Cyber security

  • 1.
  • 2. Introduction :  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. 1
  • 3. virus dissemination: Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 2
  • 4. Needof cyber security:  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses. 3
  • 5. Major security problem:  Virus  Hacker  Malware  Trojan horses  Password cracking 4
  • 6. Viruses & worms:  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes 5
  • 7. solution:  Install a security suite that protects the computer against threats such as viruses and worms. 6
  • 8. Malware:  The word "malware" comes from the term  "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission. 7
  • 9. Hackers:  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls. 8
  • 10. DEFINING CYBER CRIME: Crime committed using a computer and the internet to steal data or information. Illegal imports. Malicious programs. 9
  • 11. Types of Hackers:  White Hat Hacker  Grey Hat Hacker  Black Hat Hacker 10
  • 12. Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network. 11
  • 13. How To prevent hacking:  It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps. 12
  • 14. Trojan Horses :  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers 13
  • 15. PasswordCracking:  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. 14
  • 16. Securing Password:  Use always Strong password.  Never use same password for two different sites. 15
  • 17. CYBERATTACK: A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organisational data. 16
  • 18. Scope of cyber security: Techniques of threat and attack analysis and mitigation Protection and recovery technologies, processes and procedures for individuals, business and government Policies, laws and regulation relevant to the use of computers and the Internet 17
  • 19. Securing Password:  Use always Strong password.  Never use same password for two different sites. 18