SlideShare ist ein Scribd-Unternehmen logo
1 von 14
WELCOME
CYBER
SECURITY PRESNATION
Introduction:
 The term cyber security is used to refer to the
security offered through on-line services to protect
your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
To Undrstand:
 What is meaning of the word CYBER
 What is the need of Cyber Security
 What are the security problems in Cyber field
 How to implement and maintain Security of a
Cyber field around us.
Meaning of the word CYBER:
 It is a combining form relating to information
technology, the Internet, and virtual reality.
Need of cyber security:
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems:
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and Worms:
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Hackers:
 In common a hacker is person who breaks into
computers, usually by gaining access to
administrative controls.
Malware:
 The word “malwarer” comes from the term “MALicious
softWARE.”
 Malware is any software that infects and damages a
computer system without the owner’s knowledge or
permission.
Trojan Horses:
 Trojan horses are email viruses that can duplicate
themselves, steal information, or harm the computer
system.
 These viruses are the most serious threats to compuers.
How to Avoid Trojans
 Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses.
Password Cracking:
 Password attacks are attacks by hackers that are
able to determine passwords or find passwords to
different protected electronic areas and social
network sites.
Securing Password
 Use always Strong password
 Never use same password for two different sites.
Cuber Security Strategy - India:
 Security Policy, Legal Framework
-It Act, 2000
-It (Amendment) bill, 2006 – Data Protection and Computer crimes
o Capacity building
-skill and Competence development
Research and Development
-Cyber Monitoring
-Network Security
International Collaboration
THANK YOU

Weitere ähnliche Inhalte

Ähnlich wie 4247174743543535355-Cyber-Security-Ppt.pptx

Ähnlich wie 4247174743543535355-Cyber-Security-Ppt.pptx (20)

cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Art integrated project of computer science class 12
Art integrated project of computer science class 12Art integrated project of computer science class 12
Art integrated project of computer science class 12
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Mehr von NIMMANAGANTI RAMAKRISHNA

wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdfwepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
NIMMANAGANTI RAMAKRISHNA
 
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdfwepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
NIMMANAGANTI RAMAKRISHNA
 
Employee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdf
Employee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdfEmployee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdf
Employee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdf
NIMMANAGANTI RAMAKRISHNA
 
wepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdf
wepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdfwepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdf
wepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdf
NIMMANAGANTI RAMAKRISHNA
 
wepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdf
wepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdfwepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdf
wepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdf
NIMMANAGANTI RAMAKRISHNA
 
wepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdf
wepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdfwepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdf
wepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdf
NIMMANAGANTI RAMAKRISHNA
 
wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...
wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...
wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...
NIMMANAGANTI RAMAKRISHNA
 

Mehr von NIMMANAGANTI RAMAKRISHNA (20)

wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdfwepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
 
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdfwepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
 
Employee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdf
Employee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdfEmployee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdf
Employee Satisfactn predfffffffffffddddddddddddddddddddddddsentation.pdf
 
wepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdf
wepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdfwepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdf
wepik-mastering-logarithms-a-comprehensive-guide-20240410094638idzl.pdf
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
wepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdf
wepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdfwepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdf
wepik-exploring-the-world-a-journey-through-tourism-20240404141807fwxg.pdf
 
wepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdf
wepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdfwepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdf
wepik-exploring-the-evolution-of-pharmacy-in-india-20240331081106gqk4.pdf
 
Solar and Lunar Eclipse Theme by Slidesgo.pptx
Solar and Lunar Eclipse Theme by Slidesgo.pptxSolar and Lunar Eclipse Theme by Slidesgo.pptx
Solar and Lunar Eclipse Theme by Slidesgo.pptx
 
wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...
wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...
wepik-empowering-machine-learning-with-artificial-intelligence-20240327140844...
 
COLLEGE tapasya college of commerce and management
COLLEGE tapasya college of commerce and managementCOLLEGE tapasya college of commerce and management
COLLEGE tapasya college of commerce and management
 
Chekhov and The Lottery Ticket.ppt
Chekhov and The Lottery Ticket.pptChekhov and The Lottery Ticket.ppt
Chekhov and The Lottery Ticket.ppt
 
Smart food storage and waste reduction.docx
Smart food storage and waste reduction.docxSmart food storage and waste reduction.docx
Smart food storage and waste reduction.docx
 
freelancing.pptx
freelancing.pptxfreelancing.pptx
freelancing.pptx
 
Placement Cell tapasya.pptx
Placement Cell tapasya.pptxPlacement Cell tapasya.pptx
Placement Cell tapasya.pptx
 
200499205-DefiningDefining-Distance-Education-Distance-Education-ppt.pptx
200499205-DefiningDefining-Distance-Education-Distance-Education-ppt.pptx200499205-DefiningDefining-Distance-Education-Distance-Education-ppt.pptx
200499205-DefiningDefining-Distance-Education-Distance-Education-ppt.pptx
 
lsntap1707dataviztools-170726205609.pdf
lsntap1707dataviztools-170726205609.pdflsntap1707dataviztools-170726205609.pdf
lsntap1707dataviztools-170726205609.pdf
 
Descriptive Analytics.pptx
Descriptive Analytics.pptxDescriptive Analytics.pptx
Descriptive Analytics.pptx
 
Introduction to BUsiness Analytics.pptx
Introduction to BUsiness Analytics.pptxIntroduction to BUsiness Analytics.pptx
Introduction to BUsiness Analytics.pptx
 
Business Analytics Final.pdf
Business Analytics Final.pdfBusiness Analytics Final.pdf
Business Analytics Final.pdf
 
Presentation_1_Introduction_to_IPR.ppt
Presentation_1_Introduction_to_IPR.pptPresentation_1_Introduction_to_IPR.ppt
Presentation_1_Introduction_to_IPR.ppt
 

Kürzlich hochgeladen

Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
Terna SpA
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdf
Probe Gold
 
VIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts PodanurTop Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
dharasingh5698
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxccccccccccccccc
MollyBrown86
 

Kürzlich hochgeladen (20)

countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
 
Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
 
Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdf
 
VIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Junagadh 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Marunji Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Marunji Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Marunji Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Marunji Call Me 7737669865 Budget Friendly No Advance Booking
 
Diligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage StartupsDiligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage Startups
 
(INDIRA) Call Girl Kashmir Call Now 8617697112 Kashmir Escorts 24x7
(INDIRA) Call Girl Kashmir Call Now 8617697112 Kashmir Escorts 24x7(INDIRA) Call Girl Kashmir Call Now 8617697112 Kashmir Escorts 24x7
(INDIRA) Call Girl Kashmir Call Now 8617697112 Kashmir Escorts 24x7
 
VIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Mehsana 7001035870 Whatsapp Number, 24/07 Booking
 
Dattawadi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready Fo...
Dattawadi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready Fo...Dattawadi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready Fo...
Dattawadi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready Fo...
 
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts PodanurTop Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings Presentation
 
SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
 
VVIP Pune Call Girls Sopan Baug WhatSapp Number 8005736733 With Elite Staff A...
VVIP Pune Call Girls Sopan Baug WhatSapp Number 8005736733 With Elite Staff A...VVIP Pune Call Girls Sopan Baug WhatSapp Number 8005736733 With Elite Staff A...
VVIP Pune Call Girls Sopan Baug WhatSapp Number 8005736733 With Elite Staff A...
 
Vijayawada ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready F...
Vijayawada ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready F...Vijayawada ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready F...
Vijayawada ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready F...
 
Balaji Nagar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Balaji Nagar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Balaji Nagar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Balaji Nagar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxccccccccccccccc
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 Presentation
 
Indapur - Virgin Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service...
Indapur - Virgin Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service...Indapur - Virgin Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service...
Indapur - Virgin Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service...
 

4247174743543535355-Cyber-Security-Ppt.pptx

  • 3. Introduction:  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 4. To Undrstand:  What is meaning of the word CYBER  What is the need of Cyber Security  What are the security problems in Cyber field  How to implement and maintain Security of a Cyber field around us.
  • 5. Meaning of the word CYBER:  It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. Need of cyber security:  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. Major security problems:  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 8. Viruses and Worms:  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 9. Hackers:  In common a hacker is person who breaks into computers, usually by gaining access to administrative controls.
  • 10. Malware:  The word “malwarer” comes from the term “MALicious softWARE.”  Malware is any software that infects and damages a computer system without the owner’s knowledge or permission.
  • 11. Trojan Horses:  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to compuers. How to Avoid Trojans  Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 12. Password Cracking:  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Securing Password  Use always Strong password  Never use same password for two different sites.
  • 13. Cuber Security Strategy - India:  Security Policy, Legal Framework -It Act, 2000 -It (Amendment) bill, 2006 – Data Protection and Computer crimes o Capacity building -skill and Competence development Research and Development -Cyber Monitoring -Network Security International Collaboration