Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx

kamleshabss 26 views 22 slides Jun 26, 2024
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

By CP Sir
RN College


Slide Content

System security A quick representation through PPT By – Shreya kumari security

KNOWLEDGEBLE FACTS Every year case of hacked people This year data breached case R 8,000,000+ 52,000,000+ . The first computer virus was Creeper that was invented in 1971 by Bob thomas Brain was also the first computer virus for Ms dos which was developed by pakistani developer Amjad farooq in 1986

Table contents :- What is system security ? Why system security ? Goals of system security Potential loss during security attacks What to secure in system security ? How to secure system ? Types of system security. Advantages of system security

FAMOUS HACKER AND THEIR AMAZING STORY Owen thor walker Hamza Bendellaj Hamza bendellaj was the person who hacked 1.6 crore computer with the profit of 1 crore dollar with the help of spyeye Owen made EXBOT virus and hacked the computer (at least 1.3 million )as this virus enter into the system and passes all the login –details to hacker he hacked many oraganisation ,universities and earn money afternoon 2 yrs he was arrested Jonathan james Jonathan james was the first person who hacked NASA for three weeks in 1999 with he loss of 4000 dollar

BIGGEST HACKS IN HISTORY A perfect example of massive Cybersecurity incident was The Aadhaar breached in 2009 that leaked the information of1 billion people According to Data breach Statics the largest data breach in the history is that one is YAHOO that beeches the account detail of 3 billion people in 2014 The American business Hac k in which the debit and credit card of 1.3 million people at a Times by a Russian hacker group

What is system security ? System security is the process to secure hardware software or electronic data against system theft and viruses like trojan horse computer worms etc. It is defined as control that are put in place to provide confidentiality , integrity and availability for all the compute system . These component include Hardware – The physical part of computer like the system memory and disk drive . Software - The programming that offers service like operating system , word processor , internet browser to the user . Filmware – A specific class of computer that provides the low level control for a device specific hardware such as the BIOS of a personal computer may contain basic function of a device .

Why system security ? We are a human being , so most of the security breaches comes from uniformed and untrained persons which leaks the information to the third person or party or publish date on the internet with knowing consequences .

Goals of system security

Confidentiality : Keep your secrets confidentiality Data integrity Availability Control Audit Typically achieved by :- * Physical isolation * Cryptography * Background checks on people It is design to prevent sensitivity information from authorized access attempts .

Data integrity : prevent people from modifying data Confidentiality Data integrity Availability Control Audit Typically achieved by :- * Redundancy * Backups * Checksums & digital signature It is refer to the reliability and trust worthiness of data throughout its life cycle .

Availability : makes sure you can use your system Typically achieved by :- Hardening Reference checks on people Redundancy Confidentiality Data integrity Availability Control Audit It means that system and data are available to individual whom they need it under any circumstances including power or natural disaster .

Control : Regulate your system usages Typically achieved by :- Access control list Physical security Confidentiality Data integrity Availability Control Audit It is safeguard or count measures to avoid , detect counter act or minimize security risk to physical property .

Audit : something wrong happened . How to undo it ? Typically achieved by : Log files Human auditors & expert system Confidentiality Data integrity Availability Control Audit It involves a comprehensive analysis and review of the it infrastructure of your business .

Potential loss during security attacks :- Losses Losing your data Unethical use Of computer resources Reputation loss Identity theft

What to secure ?

How to secure ? Check if the user is password protected . Check if O.S is updated . Download software from reputable sources Terminate unusual services running that consumes resources.

Check if antivirus is installed Check if the firewall is on or not . Clear your private data from web browser . Check up your backups regularly.

Types of system security . a) Securing of O.S :- i ) Antivirus :- Antivirus software is also , known as antimalware that is used to prevent , detect and remove malware & virus like computer warm , trojan warm etc. ii) Data encryption :- This is also a way to keep files safe . It is process of encoding message so that it can only be viewed by authorized indivisuals .

iii) Biometric :- It involves using biometric security software to automatically recognize people based on their behavioral or biological character it involves voice recognition , fingerprint , facial recognition , iris recognition and heart rate sensor .

b) Securing network :- i ) Firewall :- This Photo by Unknown Author is licensed under CC BY-SA One widely used strategy to improve system security is to use a firewall . A firewall consists of software and hardware setup between an internal computer network and the internet . A C.N manager sets up rules for firewall to filter out unwanted intrusions these rules are set up in such a way that unauthorized access is much more difficult .

Advantage of cyber security :- It will defend us from hacks and virus it helps us to browse the safe website . Internet security process all the incoming and outgoing data on our O.S . The SOS will defend us from critical attacks . The security developer will update database every week once , hence the new virus also detected .

Thanks to all respected spectators This presentation is done by Shreya kumari (59) in fellowship of Honourable C . P . Mahto sir T H E E N D
Tags