SlideShare a Scribd company logo
Welcome to our presentation
cyber security
SUBMITTED BY:
Roksana Akter
I’d:151-15-4864
Mst Tanha Tasnim
I’d:151-15-5420
Hadiea Rashid
I'd:151-15-5298
Renu Akther
I'd:151-15-5096
SUBMITTED to:
Mohammad Jahangir
LECTURER AT
DEPARTMENT OF CSE
DAFFODIL
INTERNATIONAL
UNIVERSITY
Roksana Akter
I’d:151-15-4864
WHAT IS CYBER SECURITY??
The security offered
through on-line services to
protect your online
information is Called Cyber
Security.
MEANING OF THE WORD CYBER
It is a combining form
relating to information
technology, the Internet,
and virtual reality.
NEED OF CYBER SECURITY
 Cyber security is necessary
since it helps in securing
data from threats such as
data theft or misuse, also
safeguards your system
from viruses.
MAJOR SECURITY PROBLEMS
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Mst Tanha Tasnim
I’d:151-15-5420
Viruses
Solution
Install a security suite that protects the
computer against threats such as viruses and
worms
CYBER SECURITY
Hackers
In common a hacker is a person who
breaks into computers, usually by
gaining access to administrative
controls
Types of Hackers
How To prevent hacking
Hadiea Rashid
I'd:151-15-5298
Malware
Where malware comes from?
How to recognize malware?
How to remove malware?
Trojan Virus
How Trojans can impact you
 Backdoor
 Exploit
 Rootkit
 rojan-Banker
 Trojan-Downloader
 Trojan-Dropper
 Trojan-SMS
 Trojan-Spy
How to protect against Trojan
By installing effective anti-malware software,
you can defend your devices.A rigorous anti-
malware solution – such as Kaspersky Anti-
Virus – will detect and prevent Trojan attacks
on your devices. Kaspersky Lab has anti-
malware products that defend the following
devices against Trojans
 Windows PCs
 Linux computers
 Apple Macs
 Smart phones
Password Cracking & Securing Password
In computersecurity, password cracking is
the process of
recovering passwords from data that have
been stored in or transmitted by a computer
system. A common approach is to try guesses
repeatedly for the password and check them
against an available cryptographic hash of the
password.
CYBER SECURITY
Software:
There are many password cracking software tools,
but the most popular are Aircrack, Cain and
Abel, John the Ripper, Hashcat,Hydra and so on.
Securing Password from cracking by following this
method “Easy to remember, hard to guess”
Renu akther
I'd:151-15-5096
Big cyber attacks on
2016
CYBER SECURITY
Why should we care ?
It is a criminal activity committed on the
internet .
Cyber crime – where computer is either a
tool or target or both.
Advantage of cyber
security It will defend from hacks and virus.
 The application of cyber security used in our
PC needs update every week.
 The security developers will update their
database every week once. Hence the new
virus also deleted.
Our responsibility
Conclusion
The only system which is truly
secure is one which is switched
off and unplugged. So , only way
to be safe is Pay attention and
Act smart
CYBER SECURITY

More Related Content

PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cybersecurity
PDF
Cyber Security
Cyber security
Cyber security
Cyber security system presentation
Cyber security
Cyber security
Cyber security
Cybersecurity
Cyber Security

What's hot (20)

PPTX
Cyber Crime and Security
PPTX
Introduction to cyber security amos
PDF
Cyber security
PPTX
Cyber Security
PPTX
Cyber security
PPTX
Cyber Security A Challenges For Mankind
PPTX
Cyber Security 03
PPTX
Cyber security
PPTX
Cyber Security
PPTX
Cyber security
PPTX
Cyber attacks and IT security management in 2025
PPTX
Cyber crime and security
PPTX
Cyber security
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cyber Security in Society
PPT
Cyber Crime and Security
PPTX
Cyber Security Presentation
PPTX
Cyber security
PPTX
Cyber security
PPTX
Introduction to cyber security
Cyber Crime and Security
Introduction to cyber security amos
Cyber security
Cyber Security
Cyber security
Cyber Security A Challenges For Mankind
Cyber Security 03
Cyber security
Cyber Security
Cyber security
Cyber attacks and IT security management in 2025
Cyber crime and security
Cyber security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber Security in Society
Cyber Crime and Security
Cyber Security Presentation
Cyber security
Cyber security
Introduction to cyber security
Ad

Similar to CYBER SECURITY (20)

PPTX
cyber security,need,security problem and types of cyber security
PPTX
Introduction to cyber security
PPTX
Cyber security (daffodil international university)
PPT
Cyber Security in Bangladesh
PPTX
Cyber security
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security by Anushka Jha
PDF
cyber security.pdf
PPTX
cyber security.pptx
PPTX
Cyber Security Presentation By(Aashish Tanania)
PPTX
cybersecurity.pptx
PPTX
SAHITHI.PPT.pptx
PDF
cybersecurity-210715084148.pdf
PPTX
CYBER SECURITY
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Art integrated project of computer science class 12
PPTX
cyber security PPT
PPTX
cybersec sumit (1).pptx
cyber security,need,security problem and types of cyber security
Introduction to cyber security
Cyber security (daffodil international university)
Cyber Security in Bangladesh
Cyber security
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
Cyber security by Anushka Jha
cyber security.pdf
cyber security.pptx
Cyber Security Presentation By(Aashish Tanania)
cybersecurity.pptx
SAHITHI.PPT.pptx
cybersecurity-210715084148.pdf
CYBER SECURITY
4247174743543535355-Cyber-Security-Ppt.pptx
Cybersecurity 140713064844-phpapp01 (1)-converted
Art integrated project of computer science class 12
cyber security PPT
cybersec sumit (1).pptx
Ad

More from Mohammad Shakirul islam (20)

PPTX
Relationship between serum uric acid and hypertension
PPTX
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
PPTX
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
PPT
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
PPT
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
PPTX
Start With Why
PDF
PDF
All about Uganda
PPTX
MEMORY AND STROGE
PPTX
Computer Network
PPTX
Cloud Computing
PPTX
Embedded system
PPTX
Applications of numerical methods
PPTX
Multistage transistor
PPTX
Fourier series
PPTX
Laser security system
PPTX
Useful Knowledge Of Ecosystem & Environmental Degradation
PPTX
Student information-result-system
PPT
Presentation on Programming Languages.
PPTX
INTERFERNCE & DIFFRACTION
Relationship between serum uric acid and hypertension
Fungal Isolates from the Honey Samples Collected from Retail Outlets in South...
Bayanno-Net: Bangla Handwritten Digit Recognition using CNN
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
Start With Why
All about Uganda
MEMORY AND STROGE
Computer Network
Cloud Computing
Embedded system
Applications of numerical methods
Multistage transistor
Fourier series
Laser security system
Useful Knowledge Of Ecosystem & Environmental Degradation
Student information-result-system
Presentation on Programming Languages.
INTERFERNCE & DIFFRACTION

Recently uploaded (20)

PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
01-Introduction-to-Information-Management.pdf
PDF
Complications of Minimal Access Surgery at WLH
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Week 4 Term 3 Study Techniques revisited.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
master seminar digital applications in india
Pre independence Education in Inndia.pdf
Cell Types and Its function , kingdom of life
Module 4: Burden of Disease Tutorial Slides S2 2025
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Renaissance Architecture: A Journey from Faith to Humanism
Final Presentation General Medicine 03-08-2024.pptx
PPH.pptx obstetrics and gynecology in nursing
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
O7-L3 Supply Chain Operations - ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
102 student loan defaulters named and shamed – Is someone you know on the list?
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial diseases, their pathogenesis and prophylaxis
01-Introduction-to-Information-Management.pdf
Complications of Minimal Access Surgery at WLH

CYBER SECURITY

  • 1. Welcome to our presentation
  • 2. cyber security SUBMITTED BY: Roksana Akter I’d:151-15-4864 Mst Tanha Tasnim I’d:151-15-5420 Hadiea Rashid I'd:151-15-5298 Renu Akther I'd:151-15-5096 SUBMITTED to: Mohammad Jahangir LECTURER AT DEPARTMENT OF CSE DAFFODIL INTERNATIONAL UNIVERSITY
  • 4. WHAT IS CYBER SECURITY?? The security offered through on-line services to protect your online information is Called Cyber Security.
  • 5. MEANING OF THE WORD CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. NEED OF CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. MAJOR SECURITY PROBLEMS  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 10. Solution Install a security suite that protects the computer against threats such as viruses and worms
  • 12. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls
  • 14. How To prevent hacking
  • 17. Where malware comes from? How to recognize malware? How to remove malware?
  • 19. How Trojans can impact you  Backdoor  Exploit  Rootkit  rojan-Banker  Trojan-Downloader  Trojan-Dropper  Trojan-SMS  Trojan-Spy
  • 20. How to protect against Trojan By installing effective anti-malware software, you can defend your devices.A rigorous anti- malware solution – such as Kaspersky Anti- Virus – will detect and prevent Trojan attacks on your devices. Kaspersky Lab has anti- malware products that defend the following devices against Trojans
  • 21.  Windows PCs  Linux computers  Apple Macs  Smart phones
  • 22. Password Cracking & Securing Password In computersecurity, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.
  • 24. Software: There are many password cracking software tools, but the most popular are Aircrack, Cain and Abel, John the Ripper, Hashcat,Hydra and so on. Securing Password from cracking by following this method “Easy to remember, hard to guess”
  • 26. Big cyber attacks on 2016
  • 28. Why should we care ? It is a criminal activity committed on the internet . Cyber crime – where computer is either a tool or target or both.
  • 29. Advantage of cyber security It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 31. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart