SlideShare a Scribd company logo
5
Most read
10
Most read
21
Most read
By
SAURABH H KHENI
BCA Dept. (PICA)
Sem-3-A
ROLL NO. 19
 The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
Introduction
What is the
meaning of
the word
CYBER
What is the need
of Cyber Security
What are the
security
problems in
Cyber field
How to
implement and
maintain
Security of a
Cyber field
 It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Need of CYBER SECURITY
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and Worms
 A Virus is a β€œprogram that is loaded onto your
computer without your knowledge and runs
against your wishes
Solution
 Install a security suite that protects the computer
against threats such as viruses and worms.
Cyber Security A Challenges For Mankind
Hackers
 In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of HACKERS
 White Hat Hacker
 Grey Hat Hacker
 Black Hat Hacker
How To prevent hacking
 It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can help us.
Malware
 The word "malware" comes from the term
"MALicious softWARE."
 Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
 Download an anti-malware
program that also
helps prevent infections.
 Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
 Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
 These viruses are the
most serious threats to
computers
How to Avoid Trojans
 Security suites,
such as Avast
Internet Security ,
Quick Heal , etc.
will prevent you
from downloading
Trojan Horses.
Password Cracking
 Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
 Use always Strong password.
 Never use same password for two different sites.
Cyber Security Is Everyone’s Responsibility
India stands 11th in the cyber
crime in the world
Cyber Security A Challenges For Mankind
QUERIES?
Cyber Security A Challenges For Mankind

More Related Content

PPTX
Cyber security
PPTX
Cyber Security
PPTX
Cyber security presentation
PPTX
Cyber security
PDF
Smart cities
PPTX
Cyber security
PPTX
Introduction to cyber security amos
PPTX
cyber security
Cyber security
Cyber Security
Cyber security presentation
Cyber security
Smart cities
Cyber security
Introduction to cyber security amos
cyber security

What's hot (20)

PPTX
Cybercrime and Security
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
Cyber security
PPTX
PPTX
Cyber security
PDF
Cyber security
PPTX
CYBER SECURITY
PPT
Cyber Crime and Security
PPTX
Cyber security
PPTX
PPTX
Cyber security
PPTX
Cyber security
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
CYBER SECURITY
PPTX
Cyber security
PDF
Cyber Security Awareness
PPTX
Cyber Security Presentation
PDF
Cyber Security
PPTX
Cyber crime and security
Cybercrime and Security
Cyber security system presentation
Cyber security
Cyber security
Cyber security
Cyber security
CYBER SECURITY
Cyber Crime and Security
Cyber security
Cyber security
Cyber security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
CYBER SECURITY
Cyber security
Cyber Security Awareness
Cyber Security Presentation
Cyber Security
Cyber crime and security
Ad

Viewers also liked (18)

PDF
Understanding and preventing cyber crime and its impact on your organisation
PPTX
Cyber crime and security ppt
PPT
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
PPTX
Cyber training 23 5 2012
PDF
Cyber Security Threats and Data Breaches
PPTX
10 Critical Corporate Cyber Security Risks
PDF
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
PPT
Cyber Crimes
PPTX
Cyber fraud a threat to E commerce
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PDF
Cyber fraud in banks
PDF
Cyber security threats for 2017
PDF
Cyber Security 2017 Challenges
PPTX
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Fraud in the Banking Sector
PPT
Introduction to Cyber Security
PPTX
Cyber crime ppt
Understanding and preventing cyber crime and its impact on your organisation
Cyber crime and security ppt
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Cyber training 23 5 2012
Cyber Security Threats and Data Breaches
10 Critical Corporate Cyber Security Risks
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Cyber Crimes
Cyber fraud a threat to E commerce
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber fraud in banks
Cyber security threats for 2017
Cyber Security 2017 Challenges
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Cybersecurity 1. intro to cybersecurity
Fraud in the Banking Sector
Introduction to Cyber Security
Cyber crime ppt
Ad

Similar to Cyber Security A Challenges For Mankind (20)

PPTX
Cyber security (daffodil international university)
PPTX
Cyber security by Anushka Jha
PPTX
Introduction to cyber security
PPTX
SAHITHI.PPT.pptx
PPTX
cybersec sumit (1).pptx
PPTX
Cyber Security 03
Β 
PPTX
Art integrated project of computer science class 12
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security
PPTX
cyber security.pptx
PPTX
cybersecurity.pptx
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PDF
cyber security.pdf
PPTX
CYBER SECURITY
PPTX
cyber security,need,security problem and types of cyber security
PPTX
basic and advance awareness of cyber security
PPTX
Cybersecurity
PDF
cybersecurity-210715084148.pdf
Cyber security (daffodil international university)
Cyber security by Anushka Jha
Introduction to cyber security
SAHITHI.PPT.pptx
cybersec sumit (1).pptx
Cyber Security 03
Β 
Art integrated project of computer science class 12
Cybersecurity 140713064844-phpapp01 (1)-converted
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
Cyber security
cyber security.pptx
cybersecurity.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
cyber security.pdf
CYBER SECURITY
cyber security,need,security problem and types of cyber security
basic and advance awareness of cyber security
Cybersecurity
cybersecurity-210715084148.pdf

More from Saurabh Kheni (6)

PPTX
E voting(online voting system)
PPTX
Online voting system
PPTX
TAXI-GO (Taxi Booking System)
PPTX
Developing for Firefox
PPTX
A Little Security For Big Data
PPTX
Replacing flash with HTML5 and CSS3
E voting(online voting system)
Online voting system
TAXI-GO (Taxi Booking System)
Developing for Firefox
A Little Security For Big Data
Replacing flash with HTML5 and CSS3

Recently uploaded (20)

PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Slides PPTX World Game (s) Eco Economic Epochs.pptx
tcp ip networks nd ip layering assotred slides
SASE Traffic Flow - ZTNA Connector-1.pdf
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
Decoding a Decade: 10 Years of Applied CTI Discipline
Unit-1 introduction to cyber security discuss about how to secure a system
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Paper PDF World Game (s) Great Redesign.pdf
The Internet -By the Numbers, Sri Lanka Edition
Β 
Module 1 - Cyber Law and Ethics 101.pptx
Unit-3 cyber security network security of internet system
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
international classification of diseases ICD-10 review PPT.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx

Cyber Security A Challenges For Mankind

  • 1. By SAURABH H KHENI BCA Dept. (PICA) Sem-3-A ROLL NO. 19
  • 2.  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Introduction
  • 3. What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field
  • 4.  It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 5. Need of CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 6. Major security problems  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 7. Viruses and Worms  A Virus is a β€œprogram that is loaded onto your computer without your knowledge and runs against your wishes
  • 8. Solution  Install a security suite that protects the computer against threats such as viruses and worms.
  • 10. Hackers  In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11. Types of HACKERS  White Hat Hacker  Grey Hat Hacker  Black Hat Hacker
  • 12. How To prevent hacking  It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can help us.
  • 13. Malware  The word "malware" comes from the term "MALicious softWARE."  Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 14. To Stop Malware  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 15. Trojan Horses  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers
  • 16. How to Avoid Trojans  Security suites, such as Avast Internet Security , Quick Heal , etc. will prevent you from downloading Trojan Horses.
  • 17. Password Cracking  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 18. Securing Password  Use always Strong password.  Never use same password for two different sites.
  • 19. Cyber Security Is Everyone’s Responsibility
  • 20. India stands 11th in the cyber crime in the world