Cyber Security and its importance in competitive world

KiranShinde80 14 views 24 slides May 23, 2024
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

Cyber Security


Slide Content

Introduction

The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.

With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.

u FEI

Meaning of the Word CYBER

It is a combining form relating to information
technology, the Internet, and virtual reality.

Need of cyber security

Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.

A

Major security problems

Virus
Hacker
Malware

Trojan horses

Us)

Password cracking

Viruses and Worms

A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes

FOOQCOATTIAIA?ADIAOAVAVOOAOABGANO
FIOTFTOFTOT10101010101000%

ODOTITOT1010101A000ADM0
BIS 4 \

a a a. atata x

Solution

Install a security suite that protects the computer
against threats such as viruses and worms.

KAPER\KY 2 7! =

# AVG G PANDA Aj Ahnlab

Norton Sec
avast! F sont an

Qwebroot RISING FRE bitdefender

Hackers

In common a is a person who breaks
into computers, usually by gaining access to
administrative controls.

HOHNONOQOOIDIQIDO
IOIOIO

Types of Hackers

TIL “ur!

White Hat Hacker M 11001!
04110101!

or 8 1010
Grey Hat Hacker ~<a *0101

110

Black Hat Hacker

How To prevent hacking

It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.

http

(a)

1d
.

9 — el

Malware

The word "malware" comes from the term
"MALicious softWARE."

: Malware is any software that infects and damages a
computer system without the owner's knowledge or

permission.

u—Q—

To Stop Malware

~ Download an anti-malware
program that also
helps prevent infections.

| Activate Network Threat
Protection,

Firewall, Antivirus.

Trojan Horses

_ Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.

_ These viruses are the
most serious threats to
computers

How to Avoid Trojans

Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.

avast! Warning eo
A Trojan Horse Was Found!

There is no reason to worry, though. avast! has stopped the
mahvare before it could enter your computer, When you cick on the
"Aboıt connection” button, the download of the dangerous file will
be canceled

File name: hitp://vewew'13. plala cu jp/'settsb/download/beta/seltsbU15a3_PSW
Malware name: Win32KibwineF [Til

Malware type: Trojan Horse

VPS version 0634-0, 21/08/2005

— Processing

| {Abort connection |

hüp://vanvavastcom Filin our virus report to help us

Password Cracking

Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.

ecuring Password

Use always Strong password.
Never use same password for two different sites.

kshdofu =H € 43ynbkog upblkfdmgo ifdanm
sdigusfuuycbr adic tuSvh ls Louhg iovdnhugosho

£huydty5£
acshr
yhB7£z

hecroic 2 (hast 4Ysdit
b2xuixmuam3Sy Ykhot he kdsuh)\ E
6 zsui3k JGoud) Rel
chpasswor ds)
repel dom gar

ge i om
iufaqeTas a
i Jfeoat A #3
Yin ae rat Hho iutyes xr] 7e6
Be 19475 FIN pneus ut 4 Yes
husauitisyque jui isytdonn ic
dddon ios 409 gras. et
neirusd? isyaun-
89eygrediusshuewiongfwgucuenbg
H397675n iurgs igur incuer Lemkıg ievug
isos8rhsigrdergtung‘ Fausanchfwnaag inv iatno

Cyber Security Is Pe S Respors

Cyber Security Strategy — India

« Security Policy, Legal Framework
— IT Act, 2000
— IT (Amendment) Bill, 2006 — Data Protection & Computer crimes

+ Capacity building

— Skill & Competence development

Research and Development N: BANGALORE

— Cyber Monitoring

Em CYBER
International Collaboration SECURITY

2 EE

"India stands 10th in the cyber
crime in the world

usa

= china
germany

@ britain
brazil

= spain
italy

= france
turkey

a india

8 Biggest Cyber Attacks tw 2012

>) One Cyber The . 65 MILLION
= roe Arete a ys in Linkedin Passwords
Zappos?) 24 MILLION ink mo were put at risk AND
EEE 30,000

198 MILLION >. MILLION
AT, RISK., SG STOLEN

PF

>

= 1.5 MILLION 17) Security Hole
e H eHarmony Passwords ee
were stolen In 2012 17) Hackers |

Windows computers
27 MILLION
user account compromised
Ha i
users. ÿ

1,656,227

VIRUS Troja Y a

sn

Conclusion

I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
helps to spread awareness among normal
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.

QUERIES?
Tags