SlideShare a Scribd company logo
CYBER SECURITY
Presented By
Ms Subhasheni A
Assistant Professor
Department of Computer Science
Sri Ramakrishna College of Arts & Science
Coimbatore
SUBTITLE: BASIC CONCEPTS AND
PROTECTION STRATEGIES
INTRODUCTION TO CYBER
SECURITY
 Definition of cyber security
 Importance in the digital age
 Goals: Confidentiality, Integrity, Availability
(CIA)
TYPES OF CYBER THREATS
 Malware: viruses, worms, ransomware
 Phishing: deceptive emails or messages
 Denial of Service (DoS): overwhelms systems
 Man-in-the-middle (MitM): intercepts
communications
COMMON CYBER ATTACKS
 SQL Injection: exploits database queries
 Cross-site Scripting (XSS): injects malicious
scripts
 Brute-force attacks: tries all password
combinations
 Zero-day exploits: uses unpatched
vulnerabilities
CYBER SECURITY PRINCIPLES
 Principle of Least Privilege
 Defense in Depth
 Risk Assessment and Management
 Regular Updates and Patching
NETWORK SECURITY
 Firewalls and IDS/IPS (Intrusion
Detection/Prevention Systems)
 Secure network configuration
 Network segmentation
 Use of VPNs and secure protocols
ENDPOINT SECURITY
 Antivirus and anti-malware protection
 Device encryption (e.g., BitLocker)
 Secure configuration and policy enforcement
USER AWARENESS AND TRAINING
 Educate users on risks and threats
 Recognize phishing and social engineering
 Use strong passwords and password managers
 Avoid suspicious links and downloads
DATA PROTECTION
 Encryption: for data at rest and in transit
 Regular data backups and secure storage
 Safe data disposal (e.g., shredding, wiping)
SECURITY POLICIES AND
COMPLIANCE
 Establish security policies and procedures
 Comply with laws like GDPR, HIPAA, ISO
27001
 Perform audits and maintain documentation
INCIDENT RESPONSE
 teps: Detect Contain Eradicate
→ → →
Recover
 Document and analyze incidents
 Learn from past events (Post-Incident
Review)
CYBER SECURITY BEST
PRACTICES
 Use strong, unique passwords
 Enable multi-factor authentication
 Update software regularly
 Backup important data routinely
CONCLUSION
 Cyber security is essential in today’s world
 Requires layered defense and awareness
 Everyone plays a role in protecting
information

More Related Content

PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PDF
CyberSecurity.pdf
PDF
CYBER SECURITY (R18A0521).pdf
PDF
cyber security.pdf
PDF
Cyber security
PPTX
CYBER SECURITY
PPTX
Cyber security
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
CyberSecurity.pdf
CYBER SECURITY (R18A0521).pdf
cyber security.pdf
Cyber security
CYBER SECURITY
Cyber security
Lecture 6 Cybersecurity-Basics and .pptx

Similar to Cyber Security Basics: Stay Safe in the Digital World (20)

PPTX
Introduction of computer security
PPTX
Cyber security beginner level presentation slide
PPTX
An An Exploration Into the Cyber Security
PPTX
cyber security presentation.pptx
PPTX
Information Security Bachelor in Information technology unit 1
PPTX
Network Security Basics in networking to learn
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Cyber security
PDF
CYBER SECURITY (R20A6202)_FINALEeeee.pdf
PDF
Master Cyber Security & Ethical Hacking with Expert Training! 🔐🚀
PPTX
Cyber Security
PPTX
Cyber.pptx
PPTX
Introduction to cyber security amos
PPTX
cyber security and threats.pptx
PDF
Cyber Security Course & Guide. X.GI. pdf
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPTX
Cyber crime and Information Security.pptx
PPTX
Cyber Security Presentation(Neon)xu.pptx
PPTX
Cyber security
PPTX
CYBERSECURITYcoll[1].pptx
Introduction of computer security
Cyber security beginner level presentation slide
An An Exploration Into the Cyber Security
cyber security presentation.pptx
Information Security Bachelor in Information technology unit 1
Network Security Basics in networking to learn
Cyber-Security-Unit-1.pptx
Cyber security
CYBER SECURITY (R20A6202)_FINALEeeee.pdf
Master Cyber Security & Ethical Hacking with Expert Training! 🔐🚀
Cyber Security
Cyber.pptx
Introduction to cyber security amos
cyber security and threats.pptx
Cyber Security Course & Guide. X.GI. pdf
SEMINAR ON CYBER SECURITY.pptx
Cyber crime and Information Security.pptx
Cyber Security Presentation(Neon)xu.pptx
Cyber security
CYBERSECURITYcoll[1].pptx
Ad

More from subhashenia (18)

PPTX
How to Make Pie Charts in R Programming language
PPTX
Understanding Data Frames in R Programming
PPTX
How to Add Columns and Rows in an R Data Frame
PPTX
Data Collection Strategies for Better Insights#DataCollection
PPTX
What Is Data Integration and Transformation?
PPTX
Powerful Uses of Data Analytics You Should Know
PPTX
R Data Types: A Beginner’s Guide to Data in R
PPTX
Understanding Operators in R Programming
PPTX
Introduction to Data Analytics and Its Importance
PPTX
Key Features and Benefits of Using DHTML
PPTX
Components of DHTML for Dynamic Web Pages
PPTX
HTML Table Layout: Structure, Tags, and Features
PPTX
Understanding the Core Concepts of Hypertext
PPTX
Introduction to Web Publishing for Beginners
PPTX
Introduction to Web Communication Protocols
PPTX
Introduction to Distributed Database with Concurrency control in Relation Dat...
PPTX
Introduction about Microsoft Office 365 and its usage
PPTX
Overall system structure in Relational Database Management System
How to Make Pie Charts in R Programming language
Understanding Data Frames in R Programming
How to Add Columns and Rows in an R Data Frame
Data Collection Strategies for Better Insights#DataCollection
What Is Data Integration and Transformation?
Powerful Uses of Data Analytics You Should Know
R Data Types: A Beginner’s Guide to Data in R
Understanding Operators in R Programming
Introduction to Data Analytics and Its Importance
Key Features and Benefits of Using DHTML
Components of DHTML for Dynamic Web Pages
HTML Table Layout: Structure, Tags, and Features
Understanding the Core Concepts of Hypertext
Introduction to Web Publishing for Beginners
Introduction to Web Communication Protocols
Introduction to Distributed Database with Concurrency control in Relation Dat...
Introduction about Microsoft Office 365 and its usage
Overall system structure in Relational Database Management System
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Big Data Technologies - Introduction.pptx

Cyber Security Basics: Stay Safe in the Digital World

  • 1. CYBER SECURITY Presented By Ms Subhasheni A Assistant Professor Department of Computer Science Sri Ramakrishna College of Arts & Science Coimbatore SUBTITLE: BASIC CONCEPTS AND PROTECTION STRATEGIES
  • 2. INTRODUCTION TO CYBER SECURITY  Definition of cyber security  Importance in the digital age  Goals: Confidentiality, Integrity, Availability (CIA)
  • 3. TYPES OF CYBER THREATS  Malware: viruses, worms, ransomware  Phishing: deceptive emails or messages  Denial of Service (DoS): overwhelms systems  Man-in-the-middle (MitM): intercepts communications
  • 4. COMMON CYBER ATTACKS  SQL Injection: exploits database queries  Cross-site Scripting (XSS): injects malicious scripts  Brute-force attacks: tries all password combinations  Zero-day exploits: uses unpatched vulnerabilities
  • 5. CYBER SECURITY PRINCIPLES  Principle of Least Privilege  Defense in Depth  Risk Assessment and Management  Regular Updates and Patching
  • 6. NETWORK SECURITY  Firewalls and IDS/IPS (Intrusion Detection/Prevention Systems)  Secure network configuration  Network segmentation  Use of VPNs and secure protocols
  • 7. ENDPOINT SECURITY  Antivirus and anti-malware protection  Device encryption (e.g., BitLocker)  Secure configuration and policy enforcement
  • 8. USER AWARENESS AND TRAINING  Educate users on risks and threats  Recognize phishing and social engineering  Use strong passwords and password managers  Avoid suspicious links and downloads
  • 9. DATA PROTECTION  Encryption: for data at rest and in transit  Regular data backups and secure storage  Safe data disposal (e.g., shredding, wiping)
  • 10. SECURITY POLICIES AND COMPLIANCE  Establish security policies and procedures  Comply with laws like GDPR, HIPAA, ISO 27001  Perform audits and maintain documentation
  • 11. INCIDENT RESPONSE  teps: Detect Contain Eradicate → → → Recover  Document and analyze incidents  Learn from past events (Post-Incident Review)
  • 12. CYBER SECURITY BEST PRACTICES  Use strong, unique passwords  Enable multi-factor authentication  Update software regularly  Backup important data routinely
  • 13. CONCLUSION  Cyber security is essential in today’s world  Requires layered defense and awareness  Everyone plays a role in protecting information