KEMBAR78
Cyber security | PPTX
Introduction :
 The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
1
virus dissemination:
Malicious software that attaches itself to
other software. (virus, worms, Trojan Horse,
web jacking, e-mail bombing etc.)
2
Needof cyber security:
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
3
Major security problem:
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
4
Viruses & worms:
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
5
solution:
 Install a security suite that protects the
computer against threats such as viruses and
worms.
6
Malware:
 The word "malware" comes from the term
 "MALicious softWARE."
 Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
7
Hackers:
 In common a hacker is a person who
breaks into computers, usually by gaining
access to administrative controls.
8
DEFINING CYBER CRIME:
Crime committed using a computer and the
internet to steal data or information.
Illegal imports.
Malicious programs.
9
Types of Hackers:
 White Hat
Hacker
 Grey Hat Hacker
 Black Hat Hacker
10
Hacking:
Hacking in simple terms means an illegal
intrusion into a computer system and/or network.
11
How To prevent hacking:
 It may be impossible to prevent computer hacking,
however effective security controls including
strong passwords, and the use of firewalls can
helps.
12
Trojan Horses :
 Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
 These viruses are the
most serious threats
to computers
13
PasswordCracking:
 Password attacks are attacks by hackers that are able
to determine passwords or find passwords to
different protected electronic areas and social
network sites.
14
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
15
CYBERATTACK:
A malicious attempt, using digital
technologies, to cause personal or property
loss or damage, and/or steal or alter
confidential personal or organisational
data.
16
Scope of cyber security:
Techniques of threat and attack analysis
and mitigation
Protection and recovery technologies,
processes and procedures for individuals,
business and government
Policies, laws and regulation relevant to
the use of computers and the Internet
17
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
18
Cyber security

Cyber security

  • 2.
    Introduction :  Theterm cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. 1
  • 3.
    virus dissemination: Malicious softwarethat attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 2
  • 4.
    Needof cyber security: Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses. 3
  • 5.
    Major security problem: Virus  Hacker  Malware  Trojan horses  Password cracking 4
  • 6.
    Viruses & worms: A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes 5
  • 7.
    solution:  Install asecurity suite that protects the computer against threats such as viruses and worms. 6
  • 8.
    Malware:  The word"malware" comes from the term  "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission. 7
  • 9.
    Hackers:  In commona hacker is a person who breaks into computers, usually by gaining access to administrative controls. 8
  • 10.
    DEFINING CYBER CRIME: Crimecommitted using a computer and the internet to steal data or information. Illegal imports. Malicious programs. 9
  • 11.
    Types of Hackers: White Hat Hacker  Grey Hat Hacker  Black Hat Hacker 10
  • 12.
    Hacking: Hacking in simpleterms means an illegal intrusion into a computer system and/or network. 11
  • 13.
    How To preventhacking:  It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps. 12
  • 14.
    Trojan Horses : Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers 13
  • 15.
    PasswordCracking:  Password attacksare attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. 14
  • 16.
    Securing Password:  Usealways Strong password.  Never use same password for two different sites. 15
  • 17.
    CYBERATTACK: A malicious attempt,using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organisational data. 16
  • 18.
    Scope of cybersecurity: Techniques of threat and attack analysis and mitigation Protection and recovery technologies, processes and procedures for individuals, business and government Policies, laws and regulation relevant to the use of computers and the Internet 17
  • 19.
    Securing Password:  Usealways Strong password.  Never use same password for two different sites. 18