Computer Science Power point presentation PPT on Cyber Security11.pptx
laptopemail70
36 views
21 slides
Sep 03, 2024
Slide 1 of 21
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
About This Presentation
Class 11th Cyber Security PPT
Size: 4.13 MB
Language: en
Added: Sep 03, 2024
Slides: 21 pages
Slide Content
LITTLE HEARTS PUBLIC SCHOOL , BHIWANI TOPIC – CYBERSRCURITY AND DATAPROTECTION SUMBITTED TO - SUBMITTED BY- MRS. RAJNEE TUSHAR GARG XI TH (SCIENCE) 03
INTRODUCTION OBJECTIVE : To understand the significance of cybersecurity and data protection in today's digital age. OVERVIEW : This presentation will cover the need for cybersecurity, symptoms of malware and hacking, data protection laws, types of cyber crimes, cyber safety tips, and real-life case studies.
NEED FOR CYBERSECURITY AND DATA PROTECTION IMPORTANCE : Cybersecurity is crucial to protect sensitive information from unauthorized access, ensuring privacy and safeguarding personal and organizational data. RISKS : With the increasing number of cyber threats, individuals and organizations face potential data breaches, financial losses, and damage to reputation.
SYMPTOMS OF MALWARE AND HACKING SIGNS : Symptoms such as slow system performance, unexpected pop-ups, and unauthorized transactions may indicate a malware infection or hacking attempt. EXAMPLES : Phishing emails, which attempt to steal personal information, and ransomware, which locks files and demands payment for their release.
UNDERSTANDING DATA PROTECTION INTELLECTUAL PROPERTY RIGHTS : Legal protections for creations of the mind, such as inventions, literary and artistic works, and symbols. EXAMPLES : Copyright protects literary works, patents protect inventions, and trademarks protect brands.
VIOLATION OF IPR TYPES : The unauthorized use of someone else's work is known as Plagiarism , the unauthorized use of works protected by copyright, and the unauthorized use of protected trademarks is known as Trademark infringement . IMPACT : Violations can lead to legal consequences and significant financial losses.
DIFFERENCE BETWEEN OPEN SOURCE AND LICENSED SOFTWARE OPEN SOURCE Purchased with its source code. User can get open software for free of cost. User can modify the software. user can install software freely into any software. No one is responsible for the software. LICENSED SOFTWARE Purchased with its source code. User must pay to get the licensed software. User cannot modify the software. User must have license from vendor before installing to your computer. Full support from the vendor if anything happened.
CYBER CRIME DEFINITION : Cyber crime refers to illegal activities conducted using digital means. TYPES : Includes hacking, phishing, ransomware, and more.
HACKING AND EAVESDROPPING HACKING : Unauthorized access to computer systems, often to steal data or disrupt operations. EAVESDROPPING : Intercepting private communications, such as emails or phone calls, without permission.
PHISHING AND FRAUD EMAILS PHISHING : Deceptive emails designed to trick recipients into revealing personal information . EXAMPLES : Emails that appear to be from legitimate sources but are actually from cyber criminals.
RANSOMWARE DEFINITION : A type of malware that locks files and demands payment for their release. EXAMPLES : Notable ransomware attacks include WannaCry and Crypto Locker .
CYBER TROLLS AND CYBERBULLYING CYBER TROLLS : Individuals who deliberately provoke and upset others online. CYBERBULLYING : Repeated harassment and bullying conducted via digital platforms .
CYBER SAFETY SAFE BROWSING : Tips for secure internet use, such as avoiding suspicious links and using secure connections. IDENTITY PROTECTION : Measures to protect personal information online, such as using strong passwords and enabling two-factor authentication.
CONFIDENTIALITY IMPORTANCE : Keeping sensitive data private is crucial for personal and organizational security. METHODS : Encryption, secure communication channels, and data access controls help maintain confidentiality.
MALWARE Malware is a malicious software that gets installed in your device and performs unwanted tasks Mainly designed to transmit information about your web browsing habits to third party
CASE STUDY 1: MAJOR CYBER-ATTACK EXAMPLE : The 2017 WannaCry ransomware attack affected over 200,000 computers in 150 countries, causing widespread disruption and financial losses. Impact : Demonstrated the importance of keeping systems updated and having robust cybersecurity measures in place.
CASE STUDY 2 : MAJOR CYBER-ATTACK EXAMPLE : The 2013 Target data breach compromised 40 million credit card accounts and exposed personal information of 70 million customers. IMPACT : Led to significant financial losses and highlighted the need for stronger data protection practices.
CAREERS IN CYBERSECURITY FIELDS : Includes roles such as security analysts, ethical hackers, and forensic experts. SKILLS REQUIRED : Technical expertise, analytical skills, and knowledge of cybersecurity principles.
ENHANCING PERSONAL CYBERSECURITY MEASURES : Use strong passwords, regularly update software, and install antivirus programs. TIPS : Be cautious of phishing attempts, secure your Wi-Fi networks, and backup important data.
CONCLUSION SUMMARY : This presentation covered the importance of cybersecurity and data protection, symptoms of malware and hacking, intellectual property rights, types of cyber crimes, and tips for enhancing cybersecurity. FINAL THOUGHTS : Staying vigilant and informed about cybersecurity is crucial for protecting personal and organizational data.