CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS

AzharShaikh408054 26 views 35 slides Jun 12, 2024
Slide 1
Slide 1 of 35
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35

About This Presentation

Cyber Security Presentation


Slide Content

CYBER SECURITY

What is security? Security  refers  to all the measures that are taken to protect a place, or to ensure that only people with  permission  enter it or leave it.

What is cyber? Cyber refers to Involving computers or computer networks A Computer network refers to interconnected computing devices that can exchange data and share resources with each other .

What is cyber security? Cyber security is the practice of protecting systems, networks, and programs from digital attacks.

What is the need of cyber security? Cyber security is important because it  safeguards individuals and organizations against cyber attacks and theft or loss of sensitive and confidential information .

NEED OF SECURITY FROM HACKER COMPUTER VIRUS a person who uses a computer to look at and/or change information on another computer without permission an unwanted malicious software that infects or corrupts the file and hampers the functioning of a computer.

malware The word ‘malware’ is a short form of ‘malicious software’. Malware is intrusive software that is intentionally designed to cause damage to computers and computer systems.

What is cyber CRIME? Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money . O ccasionally cybercrime aims to damage computers or networks for reasons other than profit.

TYPES OF MALWARE Phishing and Scam: Phishing is a type of social engineering attack that targets the user and tricks them by sending fake messages and emails to get sensitive information about the user or trying to download malicious software and exploit it on the target system.

TYPES OF MALWARE Identity Theft: Identity theft occurs when a cybercriminal uses another person’s personal data like credit card numbers or personal pictures without their permission to commit a fraud or a crime.

TYPES OF MALWARE Ransomware Attack: Ransomware attacks are a very common type of cybercrime. It is a type of malware that has the capability to prevent users from accessing all of their personal data on the system by encrypting them and then asking for a ransom in order to give access to the encrypted data.

TYPES OF MALWARE Trojan Horse Attack: A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

TYPES OF MALWARE Botnets : A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “ bot -herder.” Each individual machine under the control of the bot -herder is known as a bot. From one central point, the attacking party can command every computer on its botnet to simultaneously carry out a coordinated criminal action. The scale of a botnet (many comprised of millions of bots) enable the attacker to perform large-scale actions that were previously impossible with malware.

TYPES OF MALWARE Spyware: Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising. However, malicious spyware is explicitly used to profit from stolen data.

TYPES OF MALWARE Keyloggers : Keyloggers are a particularly insidious type of spyware that can record and steal consecutive keystrokes (and much more) that the user enters on a device. The term keylogger , or “keystroke logger,” is self-explanatory: Software that logs what you type on your keyboard. However, keyloggers can also enable cybercriminals to eavesdrop on you, watch you on your system camera, or listen over your smartphone’s microphone.

Some TYPES OF cyber CRIME Email and internet fraud. Theft of financial or card payment data. Theft and sale of corporate data. Cyber extortion (demanding money to prevent a threatened attack). Cyber espionage (where hackers access government or company data). Infringing copyright. Selling illegal items online.

Famous examples OF cyber CRIME A famous example of a malware attack was the WannaCry ransomware attack , a global cybercrime committed in May 2017. WannaCry is a type of ransomware , a malware used to extort money by holding the victim’s data or device to ransom. The ransomware targeted a vulnerability in computers running Microsoft Windows. When the WannaCry ransomware attack hit, 230,000 computers were affected across 150 countries. Users were locked out of their files and sent a message demanding that they pay a Bitcoin ransom to regain access. Worldwide, the WannaCry cybercrime is estimated to have caused $4 billion in financial losses.

CYBERBULLYING Cyberbullying is when someone uses technology to harass, threaten, embarrass, or target another person. It happens on devices like smartphones , computers, tablets, and gaming systems. Cyberbullying hurts people, and in some cases is against the law.

STEPS TO PREVENT CYBERBULLYING Manage privacy settings online. Protect your passwords. Keep clear records. Don’t respond or retaliate . Block cyberbullies via user settings . Report cyberbullying to site admins . Stay safe online . Ask when you think a friend might need help. Remember you aren’t alone. Contact law enforcement if you feel threatened.

PLAGIARISM Plagiarism is derived from the Latin word “ Plagiarius ” meaning “kidnapper”. Plagiarism means stealing or copying another’s work and representing it as own work.

KEYPOINTS OF PLAGIARISM If we use another person’s work under our name. If we copy other’s ideas and words and don’t give them the credit . If we download copyrighted images or music and present them as our own. . If we copy maximum words and modify them so that we can cleverly use them under our own name. If we use someone else’s copyrighted music or video for our own music cover or video. If we recreate an image, video, music, article, etc in such a manner that it is quite similar to the original one.

SOFTWARE PIRACY Software piracy is the act of illegally using, copying, modifying, distributing, sharing, or selling computer software protected by copyright laws. A software pirate is anyone who intentionally or unintentionally commits these illegal acts.

STEPS TO PREVENT SOFTWARE PIRACY Buy the licensed copy of a software. Purchase software CDs from a reputed seller to ensure it is genuine. If software is available online, download it from manufacturer’s website . Register your software online to avoid soft lifting.

SAFETY MEASURES WHILE USING INTERNET Protect Your Personal Information With Strong Passwords. Keep Personal Information Private . Make Sure Your Devices Are Secure . Pay Attention to Software Updates. Be Careful About Wifi . Set Up Two-Factor Authentication. Back Up Your Personal Data. Ignore unwanted and strange emails & be cautious about attachments, links, etc. Make use of Firewall.

THANK YOU
Tags