8675njfgffgvf57765754764t764hfgfhsj1.pptx

SravyaSathi 8 views 21 slides May 02, 2024
Slide 1
Slide 1 of 21
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21

About This Presentation

report on cyber security


Slide Content

CONTENTS Company Profile Abstract Introduction Objectives Week-1 Week-2 Week-3 Week-4 Week-5 Week-6 Week-7 Week-8 Outcomes of Internship Internship Certificate 1

ABSTRACT Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies .It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyb er security. 5/2/2024 Second Review - Batch 1 2

5/2/2024 Second Review - Batch 1 3

OBJECTIVES OF INTERNSHIP The goal of cyber security is to ensure secure storage, control access and prevent unauthorized processing, transfer, or deletion of data.  The primary goal of cyber security is to protect data. To safeguard data from cyber- attacks, the security sector offers a triangle of three connected principles. The CIA trio is the name for this principle. The CIA model is intended to help organizations develop policies for their information security architecture. One or more of these principles has been broken when a security breach is discovered. Confidentiality, Integrity, and Availability are the three components of the CIA model. It's a security paradigm that guides individuals through many aspects of IT security. Let's take a closer look at each section. 5/2/2024 Second Review - Batch 1 4

WEEK-1 5/2/2024 Second Review - Batch 1 5

WEEK-2 Types of Security Tools 5/2/2024 Second Review - Batch 1 6

5/2/2024 Second Review - Batch 1 7

Wireshark 5/2/2024 Second Review - Batch 1 8

WEEK-3 5/2/2024 Second Review - Batch 1 9

5/2/2024 Second Review - Batch 1 10

5/2/2024 Second Review - Batch 1 11

WEEK-4

WEEK-5

WEEK-6 STUDY OF EXCEPTION 5/2/2024 Second Review - Batch 1 14

WEEK-7 Violation of Information Violation of Information Security International Threat Information Tampering Information shall be harvested by private companies owning the platform as they control storage servers that are often located outside the country. Disrupt digital operations or damage information of the plans and projects yet to be formalized The classified official communication(i.e. in four categories TOP SECRET, SECRET, CONFIDENTIAL and RESTRICTED. ) on public domain messaging platform like WhatsApp, Telegram, messenger etc. is a clear violation of information security instructions as provided in Manual of Departmental Security Instructions (MoDSl) and National information Security Policy Guidelines (NISPG). According to NISPG, the Top Secret and Secret information shall be shared only in a closed network with leased line connectivity where Scientific Analysis Group - DRDO(SAG) grade encryption mechanism is deployed. However, Confidential and Restricted information can be shared on internet through networks that have deployed commercial AES 256-bit encryption. Individual Information leakage Personal information of an individual is used for adversaries or can be monetised for gains. 5/2/2024 Second Review - Batch 1 15

WEEK-8 Cyber Security do’s & don’ts Use hard-to-guess passwords or passphrases. A password should have a minimum of 10 characters using uppercase letters, lowercase letters, numbers, and special characters. To make it easy for you to remember but hard for an attacker to guess, create an acronym. For example, pick a phrase that is meaningful to you, such as “My son's birthday is 12 December 2004.” Using that phrase as your guide, you might use Msbi12@Dec,4 for your password Use different passwords for different accounts. If one password gets hacked, your other accounts are not compromised. Keep your passwords or passphrases confidential. You are responsible for all activities associated with your credentials 5/2/2024 Second Review - Batch 1 16

Don’ts Do not use simple dictionary words, your name, username, Date of Birth, Vehicle No, Relatives, Pet names, computer terms (Admin etc.), common names (including people or city etc.), technical jargon, etc. as password. Do not use all letters or all numbers, repeating sequences and keyboard sequences, word, or number patterns (abcdefg, qazxsw, qwerty, 123456 etc). Do not share passwords or other Sesnitive Information with others or write them down on Notepads or Sticky Note etc. 5/2/2024 Second Review - Batch 1 17

5/2/2024 Second Review - Batch 1 18

OUTCOMES OF INTERNSHIP Students will understand the fundamental elements that define Web and Security, cyber security, information security, cryptography, and digital investigation Students will develop an awareness of the management, economic, legal, social, professional and ethical issues relating to cyber security and the use of cyber security technologies Students can identify and define challenges to achieving cyber security in organizations Students will possess through knowledge of the fundamental theories; models practice of information and cyber security management for both large and small organization. Ability to examine the technological, economic, human, legal, organizational, socio political and policy challenges in cyber security field; Design strategies that integrate best practices in cyber security, regulatory compliance, and risk management Gain hands-on experience, developing and executing integrated strategies, policies, and safeguards to manage cyber security risks across any organization 5/2/2024 Second Review - Batch 1 19

CERTIFICATE 5/2/2024 Second Review - Batch 1 20

21
Tags