SlideShare a Scribd company logo
Cyber security system presentation
 The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
 With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm are
increasing also.
Introduction
What is the
meaning of
the word
CYBER
What is the need
of Cyber Security
What are the
security
problems in
Cyber field
How to
implement and
maintain
Security of a
Cyber field
around us.
 It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Need of cyber security
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and Worms
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Solution
 Install a security suite that protects the computer
against threats such as viruses and worms.
Hackers
 In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of Hackers
 White Hat Hacker
 Grey Hat Hacker
 Black Hat Hacker
How To prevent hacking
 It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
 The word "malware" comes from the term
"MALicious softWARE."
 Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
 Download an anti-malware
program that also
helps prevent infections.
 Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
 Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
 These viruses are the
most serious threats to
computers
How to Avoid Trojans
 Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password Cracking
 Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
 Use always Strong password.
 Never use same password for two different sites.
Cyber Security Is Everyone’s Responsibility
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
India stands 10th in the cyber
crime in the world
usa
china
germany
britain
brazil
spain
italy
france
turkey
india
Cyber security system presentation
Conclusion
I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
helps to spread awareness among normal
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.
Cyber security system presentation
QUERIES?
REFERENCES
owww.wikipedia.org
owww.avtest.org
owww.billmullins.blogspot.com
owww.digit/forum.com
owww.antivirusnews.com

More Related Content

PPT
PPTX
CYBER SECURITY
PPTX
Cybersecurity
PPTX
Cyber security
PPTX
CYBER SECURITY
PPTX
Cyber security
PPTX
Cybercrime and Security
PPTX
Cyber security
CYBER SECURITY
Cybersecurity
Cyber security
CYBER SECURITY
Cyber security
Cybercrime and Security
Cyber security

What's hot (20)

PPTX
Cyber security
PPT
Introduction to Cyber Security
PPTX
Cyber Security Presentation
PPTX
Introduction to cyber security amos
PPTX
Cyber Security
PPTX
Cyber security
PPTX
Introduction to cyber security
PPTX
Cyber security
PPTX
Cyber Security in Society
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber Security
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Cyber Security A Challenges For Mankind
PPTX
Cyber Security Introduction.pptx
PPTX
Cyber security ppt
PPTX
Cybersecurity PowerPoint Presentation
PDF
Cyber security
PPTX
Cyber crime and security
PPTX
Cyber Crime
PPTX
Cyber security
Cyber security
Introduction to Cyber Security
Cyber Security Presentation
Introduction to cyber security amos
Cyber Security
Cyber security
Introduction to cyber security
Cyber security
Cyber Security in Society
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber Security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cyber Security A Challenges For Mankind
Cyber Security Introduction.pptx
Cyber security ppt
Cybersecurity PowerPoint Presentation
Cyber security
Cyber crime and security
Cyber Crime
Cyber security
Ad

Similar to Cyber security system presentation (20)

PPTX
Cyber security by Anushka Jha
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security
PDF
cyber security.pdf
PPTX
cybersec sumit (1).pptx
PPTX
SAHITHI.PPT.pptx
PPTX
cybersecurity.pptx
PPTX
Art integrated project of computer science class 12
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Cyber security
PPTX
cyber security.pptx
PPTX
Cyber security (daffodil international university)
PPTX
Cyber Security 03
PDF
cybersecurity-210715084148.pdf
PPTX
Cyber security(2018 updated)
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PPTX
cyber security,need,security problem and types of cyber security
PDF
Cyber Security
PPTX
CYBER SECURITY
Cyber security by Anushka Jha
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
Cyber security
cyber security.pdf
cybersec sumit (1).pptx
SAHITHI.PPT.pptx
cybersecurity.pptx
Art integrated project of computer science class 12
Cybersecurity 140713064844-phpapp01 (1)-converted
Cyber security
cyber security.pptx
Cyber security (daffodil international university)
Cyber Security 03
cybersecurity-210715084148.pdf
Cyber security(2018 updated)
4247174743543535355-Cyber-Security-Ppt.pptx
cyber security,need,security problem and types of cyber security
Cyber Security
CYBER SECURITY
Ad

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
composite construction of structures.pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Sustainable Sites - Green Building Construction
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
web development for engineering and engineering
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Construction Project Organization Group 2.pptx
composite construction of structures.pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
bas. eng. economics group 4 presentation 1.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Sustainable Sites - Green Building Construction
ETO & MEO Certificate of Competency Questions and Answers
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Lecture Notes Electrical Wiring System Components
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Internet of Things (IOT) - A guide to understanding
web development for engineering and engineering
Arduino robotics embedded978-1-4302-3184-4.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Model Code of Practice - Construction Work - 21102022 .pdf

Cyber security system presentation

  • 2.  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Introduction
  • 3. What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 4.  It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 5. Need of cyber security  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 6. Major security problems  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 7. Viruses and Worms  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 8. Solution  Install a security suite that protects the computer against threats such as viruses and worms.
  • 9. Hackers  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 10. Types of Hackers  White Hat Hacker  Grey Hat Hacker  Black Hat Hacker
  • 11. How To prevent hacking  It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 12. Malware  The word "malware" comes from the term "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 13. To Stop Malware  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 14. Trojan Horses  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers
  • 15. How to Avoid Trojans  Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 16. Password Cracking  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 17. Securing Password  Use always Strong password.  Never use same password for two different sites.
  • 18. Cyber Security Is Everyone’s Responsibility
  • 19. Cyber Security Strategy – India • Security Policy, Legal Framework – IT Act, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  • 20. India stands 10th in the cyber crime in the world usa china germany britain brazil spain italy france turkey india
  • 22. Conclusion I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection.