SlideShare a Scribd company logo
Cyber security
INTRODUCTION
Cyber crime is an
activity done using
computers and
internet. We can say
that it is an unlawful
acts wherein the
computer either a tool
or target or both.
“Cyber crime encompasses any
criminal act dealing with
computers and networks (called
hacking). Additionally, cyber
crime also includes traditional
crimes conducted through the
Internet.”
What is a Cyber Security?
 ‘Cyber security is the body of
technologies, processes and
practices designed to protect
networks, computers, programs and
data from attack, damage or
unauthorized’
Categories of cyber crime
We can categorize cyber crime in two ways.
 The computer as a target :- using a
computer to attacks other computer, e.g.
Hacking, virus/worms attacks, Dos attack
etc.
 The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud etc.
Why Cyber Security is needed ?
For Securing:
 Information
 Information System
 Maintain individual privacy
 Etc…
Syllabus
 UNIT-1
 Introduction to information systems,
Types of information Systems,
Development of Information Systems,
Introduction to information security, Need
for Information security, Threats to
Information Systems, Information
Assurance, Cyber Security, and Security
Risk Analysis.
 UNIT-2
 Application security (Database, E-mail and
Internet), Data Security Considerations-
Backups, Archival Storage and Disposal of
Data, Security Technology-Firewall and VPNs,
Intrusion Detection, Access Control.
 Security Threats -Viruses, Worms, Trojan
Horse, Bombs, Trapdoors, Spoofs, E-mail
viruses, Macro viruses, Malicious Software,
Network and Denial of Services Attack,
Security Threats to E-Commerce-
 Electronic Payment System, e-Cash,
Credit/Debit Cards. Digital Signature, public
Key Cryptography
 UNIT-3
 Developing Secure Information Systems,
Application Development Security,
Information Security Governance & Risk
Management, Security Architecture &
Design
 Security Issues in Hardware, Data Storage
& Downloadable Devices, Physical
Security of IT Assets, Access Control,
CCTV and intrusion Detection Systems,
Backup Security Measures.
 UNIT-4
 Security Policies, Why Policies should be
developed, WWW policies, Email Security
policies, Policy Review Process-Corporate
policies-Sample Security Policies,
Publishing and Notification Requirement of
the Policies.
 Information Security Standards-ISO, IT
Act, Copyright Act, Patent Law, IPR. Cyber
Laws in India; IT
 Act 2000 Provisions, Intellectual Property
Law: Copy Right Law, Software License,
Semiconductor Law and Patent Law.
Information System
 IS – a set of interrelated components
working together to collect, retrieve,
process, store, and distribute information
for the purpose of control, coordination,
analysis, and decision making in business
organizations
What is an Information
System
Organized combination of
1. Hardware
2. Software
3. Communications Networks
4. Data
5. People
Types of Information
Systems
History Before Usage of IS
 In the 70s, businessmen used a manual
system to run their business
History Before Usage of IS
 They used traditional filling systems to keep
track of their daily transactions.
History Before Usage of IS
 This cause them delays in making decisions
and in planning strategies.
The Usage of Information
Systems
1. Management Information System
(MIS)
2. Transaction Processing System (TPS)
3. Decision Support System (DSS)
4. Executive Information System (EIS)
5. Expert System (ES)
Objective 1
 The usage of Management Information
System (MIS).
Management Information System
(MIS)
 Used to provide regular information about
the daily activities of a business to the
manager
Management Information System
(MIS)
 Help managers make the business
processes and activities more efficient
compared to doing them manually.
Management Information System
(MIS)
 MIS  Manual Systems
Objective 2
 The usage of Transaction Processing
System (TPS)
Transaction Processing System
(TPS)
 Used to record business transactions.
Information and Communication Technology [Form 5]
Transaction Processing System
(TPS)
 Keep track of daily transactions in a
database.
Objective 3
 The usage of Decision Support System
(DSS).
Decision Support System
(DSS)
 Provide managers with information to
make the best decisions.
Information and Communication Technology [Form 5]
Decision Support System
(DSS)
 Most Decision Support System report are
in the form of charts and diagrams.
Objective 4
 The usage of Executive Information
System (EIS).
Executive Information System
(EIS)
 Helps top-level management to plan
strategies.
Executive Information System
(EIS)
 Used to forecast future trends.
Objective 5
 The usage of Expert System (ES).
Expert System(ES)
 Used to store knowledge and make logical
suggestions for the user.
Expert System(ES)
 Expert system users can be professionals
like doctors and scantiest.
Expert System(ES)
 An expert System can suggest conditions
and estimate the probability of having
illness.
Cyber security

More Related Content

PDF
Cyber security and demonstration of security tools
PPTX
Cyber attacks and IT security management in 2025
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PPTX
Introduction to information security
PPTX
Cyber security
PDF
Ransomware attacks
PPTX
Cyber security system presentation
PPTX
Cyber Security
Cyber security and demonstration of security tools
Cyber attacks and IT security management in 2025
Understanding Cyber Attack - Cyber Kill Chain.pdf
Introduction to information security
Cyber security
Ransomware attacks
Cyber security system presentation
Cyber Security

What's hot (20)

PPTX
cyber security presentation.pptx
PPT
PPTX
Internet security
PPTX
Introduction to cyber security amos
PPTX
Cyber crime and security
PPT
IT Security management and risk assessment
 
PPT
computer forensics
PPTX
Cyber crime
PPT
Computer Malware
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
CYBER SECURITY
PPTX
Cyber security
PPT
Information security
PPTX
Information Security Lecture #1 ppt
PPTX
Introduction to Malware Analysis
PPTX
Security operation center
PPT
Information security management
PPTX
Encryption ppt
PPT
Cyber security & Importance of Cyber Security
PPTX
Cyber security
cyber security presentation.pptx
Internet security
Introduction to cyber security amos
Cyber crime and security
IT Security management and risk assessment
 
computer forensics
Cyber crime
Computer Malware
Cybersecurity 1. intro to cybersecurity
CYBER SECURITY
Cyber security
Information security
Information Security Lecture #1 ppt
Introduction to Malware Analysis
Security operation center
Information security management
Encryption ppt
Cyber security & Importance of Cyber Security
Cyber security
Ad

Viewers also liked (20)

PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Cyber crime and security ppt
PPT
Introduction to Cyber Security
PDF
Top Cyber Security Trends for 2016
PDF
7 cyber security questions for boards
PPT
The Future of Cyber Security
PPTX
Cybercrime.ppt
PDF
UX, ethnography and possibilities: for Libraries, Museums and Archives
PPTX
Cyber security for children
PDF
Philosophy Of Cyberspace
PPT
PDF
Symantec cyber-resilience
PDF
European Cyber Security Challenge - Greel National Cyber Security Team
PPT
Introduction to cyber security by cyber security infotech(csi)
PDF
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
PPTX
Cyber security 07
PPT
Cyber Crime
PPT
Cyber security
PDF
Deep Learning for Cyber Security
Cyber security presentation
Cyber security
Cyber crime and security ppt
Introduction to Cyber Security
Top Cyber Security Trends for 2016
7 cyber security questions for boards
The Future of Cyber Security
Cybercrime.ppt
UX, ethnography and possibilities: for Libraries, Museums and Archives
Cyber security for children
Philosophy Of Cyberspace
Symantec cyber-resilience
European Cyber Security Challenge - Greel National Cyber Security Team
Introduction to cyber security by cyber security infotech(csi)
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Cyber security 07
Cyber Crime
Cyber security
Deep Learning for Cyber Security
Ad

Similar to Cyber security (20)

PPTX
cyber security notes
PDF
Chapter 1.pdf
PPT
sazrxdt fgyhjkl./srxdrtcf yvghujkmreen.ppt
PDF
Case mis ch01
PPT
Security (IM).ppt
PPT
Okara history and security slides 2017
PPTX
IS Unit II.pptx
PDF
Case study financial_services
PPT
business management system field tier.ppt
DOCX
MIS 300 Management Information Systems Concepts and Applications .docx
PPTX
An Introduction to Cyber security
PPTX
Compuetr management and security
PPTX
PPTX
introduction to CS131
PPT
MISCH13.ppt
PPTX
Topic – cyber security, Introduction,future scope
PPTX
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
PPTX
PPTX
Introduction to Information Systems Security
PPT
Chapter 14: Information Technology
cyber security notes
Chapter 1.pdf
sazrxdt fgyhjkl./srxdrtcf yvghujkmreen.ppt
Case mis ch01
Security (IM).ppt
Okara history and security slides 2017
IS Unit II.pptx
Case study financial_services
business management system field tier.ppt
MIS 300 Management Information Systems Concepts and Applications .docx
An Introduction to Cyber security
Compuetr management and security
introduction to CS131
MISCH13.ppt
Topic – cyber security, Introduction,future scope
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Introduction to Information Systems Security
Chapter 14: Information Technology

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Structs to JSON How Go Powers REST APIs.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Welding lecture in detail for understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
Internet of Things (IOT) - A guide to understanding
Structs to JSON How Go Powers REST APIs.pdf
573137875-Attendance-Management-System-original
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Operating System & Kernel Study Guide-1 - converted.pdf
Digital Logic Computer Design lecture notes
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
Welding lecture in detail for understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

Cyber security

  • 2. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 3. “Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.”
  • 4. What is a Cyber Security?  ‘Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized’
  • 5. Categories of cyber crime We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud etc.
  • 6. Why Cyber Security is needed ? For Securing:  Information  Information System  Maintain individual privacy  Etc…
  • 7. Syllabus  UNIT-1  Introduction to information systems, Types of information Systems, Development of Information Systems, Introduction to information security, Need for Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis.
  • 8.  UNIT-2  Application security (Database, E-mail and Internet), Data Security Considerations- Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control.  Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious Software, Network and Denial of Services Attack, Security Threats to E-Commerce-  Electronic Payment System, e-Cash, Credit/Debit Cards. Digital Signature, public Key Cryptography
  • 9.  UNIT-3  Developing Secure Information Systems, Application Development Security, Information Security Governance & Risk Management, Security Architecture & Design  Security Issues in Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets, Access Control, CCTV and intrusion Detection Systems, Backup Security Measures.
  • 10.  UNIT-4  Security Policies, Why Policies should be developed, WWW policies, Email Security policies, Policy Review Process-Corporate policies-Sample Security Policies, Publishing and Notification Requirement of the Policies.  Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT  Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law.
  • 11. Information System  IS – a set of interrelated components working together to collect, retrieve, process, store, and distribute information for the purpose of control, coordination, analysis, and decision making in business organizations
  • 12. What is an Information System Organized combination of 1. Hardware 2. Software 3. Communications Networks 4. Data 5. People
  • 14. History Before Usage of IS  In the 70s, businessmen used a manual system to run their business
  • 15. History Before Usage of IS  They used traditional filling systems to keep track of their daily transactions.
  • 16. History Before Usage of IS  This cause them delays in making decisions and in planning strategies.
  • 17. The Usage of Information Systems 1. Management Information System (MIS) 2. Transaction Processing System (TPS) 3. Decision Support System (DSS) 4. Executive Information System (EIS) 5. Expert System (ES)
  • 18. Objective 1  The usage of Management Information System (MIS).
  • 19. Management Information System (MIS)  Used to provide regular information about the daily activities of a business to the manager
  • 20. Management Information System (MIS)  Help managers make the business processes and activities more efficient compared to doing them manually.
  • 21. Management Information System (MIS)  MIS  Manual Systems
  • 22. Objective 2  The usage of Transaction Processing System (TPS)
  • 23. Transaction Processing System (TPS)  Used to record business transactions. Information and Communication Technology [Form 5]
  • 24. Transaction Processing System (TPS)  Keep track of daily transactions in a database.
  • 25. Objective 3  The usage of Decision Support System (DSS).
  • 26. Decision Support System (DSS)  Provide managers with information to make the best decisions. Information and Communication Technology [Form 5]
  • 27. Decision Support System (DSS)  Most Decision Support System report are in the form of charts and diagrams.
  • 28. Objective 4  The usage of Executive Information System (EIS).
  • 29. Executive Information System (EIS)  Helps top-level management to plan strategies.
  • 30. Executive Information System (EIS)  Used to forecast future trends.
  • 31. Objective 5  The usage of Expert System (ES).
  • 32. Expert System(ES)  Used to store knowledge and make logical suggestions for the user.
  • 33. Expert System(ES)  Expert system users can be professionals like doctors and scantiest.
  • 34. Expert System(ES)  An expert System can suggest conditions and estimate the probability of having illness.