KEMBAR78
Cyber Security | PDF | Security | Computer Security
0% found this document useful (0 votes)
25 views5 pages

Cyber Security

The document discusses cyber security and provides tips to protect against cyber threats. It defines cyber security, viruses, and different types of cyber crimes. It also explains tools used in cyber security like antivirus software, firewalls, and their uses.

Uploaded by

mithilassi69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views5 pages

Cyber Security

The document discusses cyber security and provides tips to protect against cyber threats. It defines cyber security, viruses, and different types of cyber crimes. It also explains tools used in cyber security like antivirus software, firewalls, and their uses.

Uploaded by

mithilassi69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber Security

Issues related to E-mail, Virus protection, Firewall

Cyber Security

Password management (strong password)

Precautions against cyber threat

Types of Cyber crimes

Cyber Security tools

What is Cyber Security?

The technique of protecting internet-connected systems such


as computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks is known as
cybersecurity.

Cyber Safety Tips


Let us see how to protect ourselves when any cyberattacks
happen. The following are the popular cyber safety tips:
Update software and operating system: The most popular
safety measure is to update the software and O.S. to get the
benefit of the latest security patches.
Use anti-virus software: It is also useful to use the anti-virus
software that will detect and removes unwanted threats from
your device. This software is always updated to get the best
level of protection.
Perform periodic security reviews: Every organization
ensures periodic security inspections of all software and
networks to identify security risks early in a secure
environment. Some popular examples of security reviews are
application and network penetration testing, source code
reviews, architecture design reviews, and red team
assessments. In addition, organizations should prioritize and
mitigate security vulnerabilities as quickly as possible after
they are discovered.
Use strong passwords: It is recommended to always use
long and various combinations of characters and symbols in the
password. It makes the passwords are not easily guessable.
Do not open email attachments from unknown senders:
The cyber expert always advises not to open or click the email
attachment getting from unverified senders or unfamiliar
websites because it could be infected with malware.
Avoid using unsecured Wi-Fi networks in public places:
It should also be advised not to use insecure networks because
they can leave you vulnerable to man-in-the-middle attacks.
Backup data: Every organization must periodically take
backup of their data to ensure all sensitive data is not lost or
recovered after a security breach. In addition, backups can
help maintain data integrity in cyber-attack such as SQL
injections, phishing, and ransomware.

VIRUS: Vital Information Resources Under Seize


A computer virus is a computer program or a piece of
code that is loaded onto your computer without your
knowledge and run against your consent. Virus has a property
to replicate itself and spread itself from one computer to
another computer. It can affect the data files, boot sector of
hard drive etc. when its replication succeeds. The affected area
is said infected.
Virus Protection

What is an Anti Virus?


Antivirus is a sort of software used to prevent, test and delete
viruses from a computer. Virus protection programs assist
defend your files and hardware from malware along with
worms, Trojan horses and spyware, and can additionally
provide extra safety which include customizable firewalls and
internet site blocking off.
What is a firewall?

A firewall is a security system that monitors and controls


network traffic based on a set of security rules. Firewalls
usually sit between a trusted network and an untrusted
network; oftentimes the untrusted network is the Internet. For
example, office networks often use a firewall to protect their
network from online threats.

Why use a firewall?

The primary use case for a firewall is security. Firewalls can


intercept incoming malicious traffic before it reaches the
network, as well as prevent sensitive information from leaving
the network.

Firewalls can also be used for content filtering. For example, a


school can configure a firewall to prevent users on their
network from accessing adult material. Similarly, in some
nations the government runs a firewall that can prevent people
inside that nation-state from accessing certain parts of the
Internet.

Firewalls decide whether to allow incoming and outgoing traffic


to pass through. They can be built into hardware, software, or
a combination of both.

What is cybercrime?
A Cybercrime is a crime involving computers and networks.

List of Cybercrimes: Examples

2. Cyber Bullying
A form of harassment or bullying inflicted through the use of
electronic or communication devices such as computers, mobile
phones, laptops, etc.

3. Cyber Stalking
Cyberstalking is the use of electronic communication by a
person to follow a person, or attempts to contact a person to
foster personal interaction repeatedly despite a clear indication
of disinterest by such person; or monitors the internet, email
or any other form of electronic communication commits the
offence of stalking.
4. Cyber Grooming
Cyber Grooming is when a person builds an online relationship
with a young person and tricks or pressures him/ her into doing
a sexual act.

5. Online Job Fraud


Online Job Fraud is an attempt to defraud people who are in
need of employment by giving them false hope/ promise of
better employment with higher wages.

6. Online Sextortion
Online Sextortion occurs when someone threatens to distribute
private and sensitive material using an electronic medium if he/
she doesn’t provide images of a sexual nature, sexual favours,
or money.

7. Phishing
Phishing is a type of fraud that involves stealing personal
information such as Customer ID, IPIN, Credit/Debit Card
number, Card expiry date, CVV number, etc. through emails
that appear to be from a legitimate source.

12. Credit Card Fraud or Debit Card Fraud

13. Impersonation and identity theft

You might also like