SlideShare a Scribd company logo
CYBER SECURITY
AND
DATA PROTECTION
By
Dr. Hemant Kumar Singh
Associate Professor & Head,
Deptt. of Computer Science & Engineering
INDEX
INTRODUCTION
IMPORTANCE/NEED OF CYBER SECURITY
SECURITY THREATS TO DATA
THREATS AND SOLUTIONS
CYBER LAW
IT ACT 2000/2008
CONCLUSION
Cyber security & Data Protection
Digital Era
Today we are living in digital era
Internet is used today-
 Booking hotels
 Ordering foods
 Booking cabs
Big data is generating today that is stored on cloud on huge data
servers or data centers
Array of devices used to access data stored on cloud.
For Hackers it is golden edge
A lot of access point, IP addresses.
Introduction
 Cyber security is the practice of protecting information and data from
outside sources on the Internet. Cyber security professionals provide
protection for networks, servers, intranets and computer systems.
 It also ensures that only authorized people have access to that
information.
 Cyber is related to the technology which contains systems, network
and programs or data. Whereas security related to the protection
which includes systems security, network security and application
and information security.
Why is cyber security important?
 Cyber security is necessary since it helps in securing data from threats
such as data theft or misuse, also safeguards your system from viruses.
 We all live in a world which is networked together, from internet
banking to government infrastructure, where data is stored on
computers and other devices. A portion of that data can be sensitive
information, whether that be intellectual property, financial data,
personal information, or other types of data for which unauthorized
access or exposure could have negative consequences.
 Cyber-attack is now an international concern and has given many
concerns that hacks and other security attacks could endanger the
global economy. Organizations transmit sensitive data across
networks and to other devices in the course of doing businesses,
and cyber security describes to protect that information and the
systems used to process or store it.
History
 1969- A professor in UCLA sent a message to standard research
institute.
 1970-Robert Thomson created first virus namely CREEPER
I am CREEPER Catch me if you can
Antivirus for creeper was PREEPER
 1986-Rassian used cyber power as weapons
 1988-American scientestist created program to check size of
internet
 After that we people started working on cyber security.
Security Goals(CIA)
 Confidentiality: No unauthorized access
 Integrity: What you sent,
received without alter
 Availability: 24X7 Access availability to authorized user
use encryption
HELLO HELLO
Cyber Threats
INTRUDER
Malware
Phishing
Password
Attacks
Man in
Middle
attack
DDOS
Trapdoors
Logic
bombs
Spoof
Macro
Virus
Malware
 The word "malware" comes from the term "MALicious softWARE“.
 Code with malicious intends steals data and destroys data from
computer eg. Trojan, Virus, Bombs
 To Stop Malware:
 Download an anti-malware program that also helps prevent
infections.
 Activate Network Threat Protection, Firewall, Antivirus.
Virus & Worms
 A piece of software that are designed to spread one computer to another
. Almost all viruses are executable files. A virus can spread using
 Network
 Disk
 File sharing
 Email attachments
 VLC download
Mail
Virus
Attachment
 Worms are piece of malware program that replicates and spreads
one computer to another. It spreads to itself to connected computers.
 Solution: Install a security suite that protects the computer against
threats such as viruses and worms.
Mail
WORM
(I LOVE YOU)2K
Trojan Horse
 Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
 It tricks user to running it behind the trusted program
 These viruses are the most serious threats to computers.
How to Avoid Trojans?
 Security suites, such as Avast Internet Security,
will prevent you from downloading trojan Horses.
Phishing
 Phishing attacks are sent in e mail and said by user to click on it
 Password attacks are attacks by hackers that are able to determine
passwords or find passwords to different protected electronic areas and
social network sites.
Securing Password:
 Use always Strong password.
 Never use same password for two different sites.
Password Attack
DDOS
Logic Bombs
Logic bombs attacks on system on specific condition
Eg. Saturday @10 o’clock
Trapdoors
Secret entry point in to a program that allows to gain access
system without using security access procedure.
Android – google can enter
Spoofing
Spoofing is often the way a bad actor gains access in order to execute a
larger cyber attack . E mail spoofing,Caller id spoof,Website spoof
DNS Spoofing
Man in Middle attack
Macro virus
Not created in any programming languages
Cyber Law
 Cyber Law is the law governing cyber space.
 Cyber space includes computers, networks, software's, data storage devices (such
as hard disks, USB disks etc), the Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Cyber Law Deals with
 Cyber Crimes
 Electronic or Digital Signatures
 Intellectual Property
 Data Protection and Privacy
IT ACT 2000
 The Information Technology Act, 2000 (IT Act), came into force on 17
October 2000.
 The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records with the
Government.
 Information Technology Act 2000 consisted of 94 sections segregated
into 13 chapters.
 To provide legal recognition for transactions
 To facilitate electronic filing of documents with the Government
agencies.
IT ACT 2000
Important Cyber Law Provisions in India
Offence Section under IT Act
 Tampering with Computer source documents
(with out the permission of in charge) Sec.43
 Hacking with Computer systems, Data alteration Sec.66
 Publishing obscene information Sec.67
 Un-authorized access to protected system Sec.70
 Breach of Confidentiality and Privacy Sec.72
 Publishing false digital signature certificates Sec.73
 Sending threatening & Defamatory messages by email
Sec 503 & 499 IPC
 Forgery of electronic records Sec 463 IPC
 Bogus websites, cyber frauds Sec 420 IPC
 Email spoofing & Abuse Sec 463 & 500 IPC
 Web-Jacking Sec 383 IPC
 Online sale of Drugs NDPS Act
 Online sale of Arms Arms Act
If any person uses a computer or system network without
permission of the owner or any other person who is in charge &
Access, download, Copy any data from such computer
 Introduces Computer Virus into any computer.
 Damages any computer network or computer.
Changes Account Settings.
Punishment
He shall be liable to pay damages by the way of compensation not
exceeding 1 Crore to affected person
Eg.-Section 43
Amendment IT ACT 2008
The IT Act 2008 has been notified on October 27, 2009
ITA-2008, is a new version of IT Act 2000
Provides additional focus on Information Security.
Added several new sections on offences including Cyber Terrorism and
Data Protection.
 124 sections and 14 chapters
Data Protection
 Personal data is any information relating to you, whether it relates
to your private, professional, or public life.
 Data protection means you should be able to decide whether or not
you want to share some information, who has access to it, for how
long, for what reason.
 The Data Protection Act 2018 controls how your personal
information is used by organizations, businesses or the government.
 Under the Data Protection Act 2018, you have the right to find out
what information the government and other organisations store
about you.
Conclusion
 In this presentation covers cyber security and information security as
well. Further we came to learn what is the need and history of it.
 Next, we learn about threats which are harmful for the data and system
and also came to know about their solutions.
 Finally cyber law and related acts and its sections and brief
introduction about the data protection.
Thinkbeforeyouclick.
THANK YOU

More Related Content

PPT
Canons of taxation
PPTX
Data security
PPTX
Narcotic Drugs & Psychotropic Subtances
PPTX
Slides Chapter10.1 10.2
PPTX
Addressing modes of 8051
PPTX
Rape- Sexual Assault
PDF
Training course on Mobile Data Collection using KoBoToolBox (form builder & S...
PPTX
Computer security and privacy
Canons of taxation
Data security
Narcotic Drugs & Psychotropic Subtances
Slides Chapter10.1 10.2
Addressing modes of 8051
Rape- Sexual Assault
Training course on Mobile Data Collection using KoBoToolBox (form builder & S...
Computer security and privacy

What's hot (20)

PPT
Cyber Crime and Security
PPTX
Cyber security
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Cyber security presentation
PPTX
Computer Crimes
PPTX
Cyber security
PPTX
Cyber security government ppt By Vishwadeep Badgujar
PPTX
Data Privacy Introduction
PPTX
Ppt on cyber security
PPT
Cyber Crime
PPTX
Cybercrime and Security
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPT
Ethics in IT Security
PPTX
Cyber Crime and Security
PPTX
Ethical hacking
PPTX
Cyber Crime
PPTX
Cyber Terrorism
PPTX
Cyber Security Awareness
PPTX
Introduction to cyber security
PPTX
Introduction to security
Cyber Crime and Security
Cyber security
Cyber Security Presentation "It Will Never Happen To Me"
Cyber security presentation
Computer Crimes
Cyber security
Cyber security government ppt By Vishwadeep Badgujar
Data Privacy Introduction
Ppt on cyber security
Cyber Crime
Cybercrime and Security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Ethics in IT Security
Cyber Crime and Security
Ethical hacking
Cyber Crime
Cyber Terrorism
Cyber Security Awareness
Introduction to cyber security
Introduction to security
Ad

Similar to Cyber security & Data Protection (20)

PPTX
Cyber crime & law
PPTX
Seminar ppt.pptx
PPTX
cyber security.pptx
PPTX
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
PPTX
Cyber Security Concepts, layers of security,
PPTX
Cyber Security PPT.pptx
PDF
Type of Security Threats and its Prevention
PPTX
Cyber crime & security
PDF
Cyber Security Notes Unit 1 for Engineering
DOCX
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
PPTX
IT-Presentation.pptx
PPTX
Cyber crime ppt
PDF
Cyber Security
PPTX
CYBER CRIME sujal education it related ppt. Pptx
PPT
SHAILENDRA.ppt
PPTX
Presentation1_CYBERCRIME.pptx
PPT
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
DOCX
Cyber crime
PPTX
Cybercrime and security.pptx
PPTX
Cyber crime and its safety
Cyber crime & law
Seminar ppt.pptx
cyber security.pptx
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
Cyber Security Concepts, layers of security,
Cyber Security PPT.pptx
Type of Security Threats and its Prevention
Cyber crime & security
Cyber Security Notes Unit 1 for Engineering
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
IT-Presentation.pptx
Cyber crime ppt
Cyber Security
CYBER CRIME sujal education it related ppt. Pptx
SHAILENDRA.ppt
Presentation1_CYBERCRIME.pptx
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber crime
Cybercrime and security.pptx
Cyber crime and its safety
Ad

More from Dr. Hemant Kumar Singh (6)

PPTX
PPTX
Engineers day
PPSX
PPTX
Ubuntu(Linux)
PPSX
Efficient approach for website design ppt
PPSX
SMS CISCO Networking Academy
Engineers day
Ubuntu(Linux)
Efficient approach for website design ppt
SMS CISCO Networking Academy

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Construction Project Organization Group 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Welding lecture in detail for understanding
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Project quality management in manufacturing
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Geodesy 1.pptx...............................................
Lecture Notes Electrical Wiring System Components
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Construction Project Organization Group 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Sustainable Sites - Green Building Construction
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Embodied AI: Ushering in the Next Era of Intelligent Systems
Welding lecture in detail for understanding
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Project quality management in manufacturing

Cyber security & Data Protection

  • 1. CYBER SECURITY AND DATA PROTECTION By Dr. Hemant Kumar Singh Associate Professor & Head, Deptt. of Computer Science & Engineering
  • 2. INDEX INTRODUCTION IMPORTANCE/NEED OF CYBER SECURITY SECURITY THREATS TO DATA THREATS AND SOLUTIONS CYBER LAW IT ACT 2000/2008 CONCLUSION
  • 4. Digital Era Today we are living in digital era Internet is used today-  Booking hotels  Ordering foods  Booking cabs Big data is generating today that is stored on cloud on huge data servers or data centers Array of devices used to access data stored on cloud. For Hackers it is golden edge A lot of access point, IP addresses.
  • 5. Introduction  Cyber security is the practice of protecting information and data from outside sources on the Internet. Cyber security professionals provide protection for networks, servers, intranets and computer systems.  It also ensures that only authorized people have access to that information.
  • 6.  Cyber is related to the technology which contains systems, network and programs or data. Whereas security related to the protection which includes systems security, network security and application and information security.
  • 7. Why is cyber security important?  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.  We all live in a world which is networked together, from internet banking to government infrastructure, where data is stored on computers and other devices. A portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.
  • 8.  Cyber-attack is now an international concern and has given many concerns that hacks and other security attacks could endanger the global economy. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describes to protect that information and the systems used to process or store it.
  • 9. History  1969- A professor in UCLA sent a message to standard research institute.  1970-Robert Thomson created first virus namely CREEPER I am CREEPER Catch me if you can Antivirus for creeper was PREEPER  1986-Rassian used cyber power as weapons  1988-American scientestist created program to check size of internet  After that we people started working on cyber security.
  • 10. Security Goals(CIA)  Confidentiality: No unauthorized access  Integrity: What you sent, received without alter  Availability: 24X7 Access availability to authorized user use encryption HELLO HELLO
  • 12. Malware  The word "malware" comes from the term "MALicious softWARE“.  Code with malicious intends steals data and destroys data from computer eg. Trojan, Virus, Bombs  To Stop Malware:  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 13. Virus & Worms  A piece of software that are designed to spread one computer to another . Almost all viruses are executable files. A virus can spread using  Network  Disk  File sharing  Email attachments  VLC download Mail Virus Attachment
  • 14.  Worms are piece of malware program that replicates and spreads one computer to another. It spreads to itself to connected computers.  Solution: Install a security suite that protects the computer against threats such as viruses and worms. Mail WORM (I LOVE YOU)2K
  • 15. Trojan Horse  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  It tricks user to running it behind the trusted program  These viruses are the most serious threats to computers. How to Avoid Trojans?  Security suites, such as Avast Internet Security, will prevent you from downloading trojan Horses.
  • 16. Phishing  Phishing attacks are sent in e mail and said by user to click on it
  • 17.  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Securing Password:  Use always Strong password.  Never use same password for two different sites. Password Attack
  • 18. DDOS
  • 19. Logic Bombs Logic bombs attacks on system on specific condition Eg. Saturday @10 o’clock
  • 20. Trapdoors Secret entry point in to a program that allows to gain access system without using security access procedure. Android – google can enter
  • 21. Spoofing Spoofing is often the way a bad actor gains access in order to execute a larger cyber attack . E mail spoofing,Caller id spoof,Website spoof DNS Spoofing
  • 22. Man in Middle attack
  • 23. Macro virus Not created in any programming languages
  • 24. Cyber Law  Cyber Law is the law governing cyber space.  Cyber space includes computers, networks, software's, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Cyber Law Deals with  Cyber Crimes  Electronic or Digital Signatures  Intellectual Property  Data Protection and Privacy
  • 25. IT ACT 2000  The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  Information Technology Act 2000 consisted of 94 sections segregated into 13 chapters.  To provide legal recognition for transactions  To facilitate electronic filing of documents with the Government agencies.
  • 26. IT ACT 2000 Important Cyber Law Provisions in India Offence Section under IT Act  Tampering with Computer source documents (with out the permission of in charge) Sec.43  Hacking with Computer systems, Data alteration Sec.66  Publishing obscene information Sec.67  Un-authorized access to protected system Sec.70  Breach of Confidentiality and Privacy Sec.72  Publishing false digital signature certificates Sec.73
  • 27.  Sending threatening & Defamatory messages by email Sec 503 & 499 IPC  Forgery of electronic records Sec 463 IPC  Bogus websites, cyber frauds Sec 420 IPC  Email spoofing & Abuse Sec 463 & 500 IPC  Web-Jacking Sec 383 IPC  Online sale of Drugs NDPS Act  Online sale of Arms Arms Act
  • 28. If any person uses a computer or system network without permission of the owner or any other person who is in charge & Access, download, Copy any data from such computer  Introduces Computer Virus into any computer.  Damages any computer network or computer. Changes Account Settings. Punishment He shall be liable to pay damages by the way of compensation not exceeding 1 Crore to affected person Eg.-Section 43
  • 29. Amendment IT ACT 2008 The IT Act 2008 has been notified on October 27, 2009 ITA-2008, is a new version of IT Act 2000 Provides additional focus on Information Security. Added several new sections on offences including Cyber Terrorism and Data Protection.  124 sections and 14 chapters
  • 30. Data Protection  Personal data is any information relating to you, whether it relates to your private, professional, or public life.  Data protection means you should be able to decide whether or not you want to share some information, who has access to it, for how long, for what reason.  The Data Protection Act 2018 controls how your personal information is used by organizations, businesses or the government.  Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.
  • 31. Conclusion  In this presentation covers cyber security and information security as well. Further we came to learn what is the need and history of it.  Next, we learn about threats which are harmful for the data and system and also came to know about their solutions.  Finally cyber law and related acts and its sections and brief introduction about the data protection.

Editor's Notes