Cyber sec PPT.pptx.it is related to cyber security of every one in day to day life.

AnjuYadav106940 1 views 38 slides Oct 12, 2025
Slide 1
Slide 1 of 38
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38

About This Presentation

Follow the steps to protect urself from cyber crimes


Slide Content

Cyber Security

Cyber Security

NEED FOR CYBER SECURITY Gone Were The Days When Passwords Were Enough To Protect Your System And Your Data . We All Want To Protect Our Personal And Professional Data . Thus Cyber Security Is What You Should Know About To Ensure Your Data Protection .

Weak Network Security Weak User Security Unprot-ected Strong Network Security Weak User Security Average Weak Network Security Strong User Security Weak Strong Network Security Strong User Security Strong NETWORK Vs USER LEVEL SECURITY Scenario -1 Scenario -2 Scenario -3 Scenario -4

SOLUTIONS Max Use Of Messaging System On LAN Shared Folders To Be Disabled LAN For Everybody, But Limit CISF Intranet Access To Few Use Of CD/ Dvd’s For Sharing Of Info Between Internet/Standalone PC And CISF Intranet PC After Using Sandbox. Use Of Licensed Windows Os Migration To Linux ? Accept The Fact That Securing Info Is The User’s Responsibility

Definition Cyber security is the process & techniques involved in protecting sensitive data,computer system ,networks and software applications from Cyber Attacks.

Cyber attacks Cyber Attack Is A General Terminology ,Which Cover A Large No. Of Topics But Some Popular Are : Tampering System And Data Stored With In. Exploitation Of Resources . Unauthorized Access To Targeted System And Accessing Sensitive Information . Disrupting Normal Functioning Of Business And Its Process. Using Ransom ware Attacks To Encrypt Data And Extort Money From Victims.

Types of threats and attacks RANSOMWARE : This Is A File Encryption Program A Unique ,Robust Encryption Algorithm To Encrypt Files On Targeted System. The Authors Of Ransom ware Generate Unique Decryption Key For Each Of Its Victims And Save It In A Remote Server . The Author Demand A Considerable Ransom Amount For Decryption Code.

BOTNETTS ATTACK Designed To Carry Out Specific Task With In A Group. It Is Defined As A Group Of Computers Or Devices Connected With The Same Network To Execute Some Task. This Is Used By Hacker’s To Access Network And Inject Malicious Code /Malware To Disrupt Its Working. And Hacker Can Control Large No Of Devices.

Some botnetts are Spreading Spam Mails . Stealing Of Confidential Data . Distributed Denial Of Service Attacks.

Basic steps to protect youself online Use Two Factor Authentification . Don't Use Same Password Everywhere. Update Software Of Your Computer, laptop And Mobiles On Regular Basis. Be Careful Of How Much Information You Post Online. Be Careful While Sharing Personal Information.

Safety Tips 1) Use Antivirus Software ( AVAST, AVG…..) 2) Insert Firewalls , Pop Up Blocker ( Windows, Comodo ) 3) Uninstall Unnecessary Software ( Adware's) 4) Maintain Backup ( Weekly/Monthly) 5) Use Secure Connection ( HTTPS) 6) Open Attachments Carefully 7) Use Strong Passwords , Don’t Give Personal Information Unless Required.

COMMON PASSWORD THREATS User Disclosure . Social Engineering. Phishing. Key Logging. Wireless Sniffing. Brute Force Guessing . Dictionary Attacks. Password Files Not Encrypted. Exposed Password With Known Hash Value . Security Questions.

MANAGING PASSWORDS Create Password Strong And Unique. Change Password Frequently. Never Write On Office Table ,Diary And At Place That Is Easily Accessable . Write Password And Keep It A Secret Place. Write Password Like No One Able To Identify And Keep Clue For Yourself. Use Password Management Software Like Last Pass Password Manager.

Rank your password Tier -1. Highest Priority . Change Every 6 Month. Primary Mails. Bank Account And Other Financial Accounts. Create Unique And Strong Password Using Capital Letter ,Small Letter, Numbers , Special Character And Similar Looking Keys Like $ For S,# For H,@ For A,! For I

Tier – 2 Social Media. Facebook . Twitter. Change Every 12 Month.

Tier - 3 Online Newspaper .. E Blogs. Change If Compromised .

USER DISCLOSURE Should Not Tell Your Password To Anyone(trust Worthy Or Not). Accidentally Disclose. Don’t Email ,Message Passwords. Don’t Write Password Near Office Table. Dont Keep Password List Even Dont Keep In Pc Without Protection App.

SOCIAL ENGINEERING Social Situations That Encourage Users To Disclose Their Passwords. Bank , Lic Representative, Shows Any Emergency Etc.

Phishing Like Social Engineering Send Update E-mail Or Message Like : Your Account Will Expire Today On Today’s Date Like Monday , Feb. 17,2020. To Keep Your Account Updated Please Click ..Link. And Proceed With Verification Process. Note : Bank Never Send You Urgent Link. If Recieve Such Message Call Customer Care. ONLY WISDOM CAN SAVE YOU.

KEYLOGGER Types

KEY LOGGING There Are Two Types Of Key Logger Software HARDWARE NAD SOFTWARE. Harware : Small Device Plugged In Usb Port (Key Logger). Key Logging Software To Record Key Strokes. Preccautions For Avoiding Are : Don’t Log In Public Pc Or Network. Software From Trusted Sites To Be Used. Never Log In Friends Pc,mobile .

WIRELESS SNIFFING PUBLIC Wireless Intercept Info Of Pc Or Mobile.

Brute force guessing Only Long Strong Password Can Save From It. Use Key Symbol , Capital ,Small Letters And Special Characters . Use Identical Looking Special Character To Replace Alphabets. For Eg . Capache For Robot Attacks And Avoid Atomatic Logging.

Dictionary Attacks Popular Password Limits Guess For Example : Let Me In,password ,12345,qwertyuiop,asdfghjkl,zxcvbnm , Name, Address, Phone No. And Publicly Available Information ( Knoweledge ) Comes Under Dictionary Attack Like Children Name , D.Ob.,Anniversay Or Family Related Common Information Profession Related Information

Password files not encrypted Like Simple Passwords 123456,12345,password,iloveyou,princess,rockyou,1234567,12345678,abc123,lovely,111111,000000,trigger,friends Etc.

Exposed password with known hash value Steal Hash Value Of Passwords List Of Encrypted Password Stolen. Strong Password Less Chance Of Encrption

Security questions Security Questions Like : What’s Your Mothers ‘S Maiden Name? What’s Your Best Friend’s Name ? What’s Your Fav . Pet’s Name? Simple Thing To Avoid This Is Just Lie. Because These Can Be Guessed By Our Social Info. Available.

How to create strong password Muffin#mas2012(muffin Found From Pound At Charismas' In 2012) Make A Story. Replace Letter With Similar Looking Symbol For Example : H =#,S=$, i =!,O=0(zero),a=@, I Love Muffin (Eye<3muphyn) Godisgreat =G0d!$Gr8 Avoid Guessable Password Like 12345,asdfghjkl,letmein, Avoid Password Trick And Tutorial Password Already Shared With Public.

conclusion In An Organisation To Accomplish An Effective Security Approach, peoples, process ,Computers ,Network And Technology Of An Organisation Either Big Orr Small Should Be Equally Responsible. If All Component Will Complement Each Other Then, its Very Much Possible To Stand Against The Rough Cyber Threat And Attacks.

USAGE OF SOFTWARE & HARDWARE Responsibility of the User : The user shall- Use only the software/hardware which are authorized by the Department. The User shall ensure the following: Operating System and other software are installed using authorized source/Original Equipment Manufacturer (OEM) media with valid license. While installing the Operating System and other software packages, only the required utilities are installed/enabled. Latest available service packs, patches and drivers are installed. Booting from removable media is disabled. Auto-run on all removable drives is disabled. Allow the installation of service packs and patches provided by the patch server .