SlideShare a Scribd company logo
cyber security PPT
cyber security PPT
Introduction
The term cyber security is used to refer tothe
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasingalso.
What is the need
of Cyber Security
What is the
meaning of
the word
CYBER is the need
of Cyber Security
How to
implement and
maintain
Security of a
Cyber field
around us.
What are the
security
problems in
Cyber field
Meaning of the WordCYBER
It is a combining form relating to information
technology, the Internet, and virtualreality.
Need of cybersecurity
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system fromviruses.
Major security problems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses and Worms
AVirus is a “program that is loaded onto your
computer without your knowledge and runs
against yourwishes
Solution
Install a security suite that protects thecomputer
against threats such as viruses andworms.
.
.
AV
G
PANCJA PfuAhnl
a1b
Se~
UEssenti
alsrity
Norto
n·
from
symantec
e
t
,.
r·~ec
ure t
avast!
.web
Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
Download an anti-malware
program thatalso
helps preventinfections.
Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threatsto
computers
How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
Use always Strong password.
Never use same password for two different sites.
C
C
y
y
b
b
e
e
r
rS
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y IIssE
E
v
v
e
e
r
r
y
y
o
o
n
n
e
e
'’
s
s
R
R
e
e
s
s
p
p
o
o
n
n
s
s
i
i
b
b
i
i
l
l
i
i
t
t
y
y
Cyber Security Strategy –
• S
Ie
nc
du
r
iai
t
yPolicy, Legal Framework
– ITAct, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computercrimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
India stands 10th in the cyber
crime in the world
65 MILLION
Linkedin Passwords
were pur at risk AND
30,000
Pa><word1 were cracked
One Cyber Theft
l'aclc.edtt',e ,nforma1 ion
of
24 MILLION
7appof:/Amazon c1.Hlomen
•
In
link me
198 MILLION
Android owners met'OO()' card(
AT RISK
1. MILLION
C
5a
r
dNumbers: were
STOLEN
by malicious link or app.
-
e H
1. MILLION Security Hole
discovered allow<
e
5
Harmony Passwords
were s-tolen in 2012
&
Hackers
to ln<ta11 1nallc.ioui ~oftwa~ on
Windows computers
1,656,227
computer Viru<E'i, worms &
Trojans
were found
VIRUS
27 MILLION
user acccunt compromhed
Hackers Obtained
users. pa,swords. credtt card number
Conclusion
I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
normal
helps to spread awareness among
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.
cyber security PPT
QUERIES?
REFERENCES
owww.wikipedia.org
owww.avtest.org
owww
.billmullins.blogspot.com
owww.digit/forum.com
owww.antivirusnews.com

More Related Content

PPTX
CYBER SECURITY
PPTX
Cyber security
PPTX
Cyber security ppt
PPTX
PPTX
Cyber Crime and Cyber Security
PPTX
Cyber Security A Challenges For Mankind
PDF
Cyber Security
DOC
Cybersecurity
CYBER SECURITY
Cyber security
Cyber security ppt
Cyber Crime and Cyber Security
Cyber Security A Challenges For Mankind
Cyber Security
Cybersecurity

What's hot (20)

PPTX
Cybercrime and Security
PPTX
Cybersecurity
PPTX
Cyber security
PPTX
cyber security,need,security problem and types of cyber security
PDF
Cyber security
PPT
Cyber Crime and Security
PPTX
Cyber crime and security
PPT
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Social engineering
PPTX
Types of Cyber Attacks
PPTX
Cyber crime and security
PPTX
Cyber security ppt final
PPTX
Cyber security
PPT
Cyber Security and Cyber Awareness
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber security
Cybercrime and Security
Cybersecurity
Cyber security
cyber security,need,security problem and types of cyber security
Cyber security
Cyber Crime and Security
Cyber crime and security
Cybersecurity 140713064844-phpapp01 (1)-converted
Cyber Security Presentation "It Will Never Happen To Me"
Social engineering
Types of Cyber Attacks
Cyber crime and security
Cyber security ppt final
Cyber security
Cyber Security and Cyber Awareness
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber security
Cyber security
Cyber security
Ad

Similar to cyber security PPT (20)

PPTX
Cyber security
PPTX
cybersecurity.pptx
PDF
cyber security.pdf
PPTX
Cyber security
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
SAHITHI.PPT.pptx
PPTX
Art integrated project of computer science class 12
PPTX
cybersec sumit (1).pptx
PPTX
Cyber security by Anushka Jha
PPTX
Cybersecurity
PDF
cybersecurity-210715084148.pdf
PPTX
Introduction to cyber security
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
Cyber security(2018 updated)
PPTX
Internet Securities Issues
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PPTX
Cyber security (daffodil international university)
PPTX
Cyber Security 03
Cyber security
cybersecurity.pptx
cyber security.pdf
Cyber security
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
SAHITHI.PPT.pptx
Art integrated project of computer science class 12
cybersec sumit (1).pptx
Cyber security by Anushka Jha
Cybersecurity
cybersecurity-210715084148.pdf
Introduction to cyber security
Cyber security system presentation
Cyber security
Cyber security(2018 updated)
Internet Securities Issues
4247174743543535355-Cyber-Security-Ppt.pptx
Cyber security (daffodil international university)
Cyber Security 03
Ad

More from Nitesh Dubey (20)

PPTX
HTML Presentation
PPT
MLApproachToProgramming.ppt
PPT
seminar topic of holography.ppt
PDF
Compiler design.pdf
PPTX
Online shopping ppt
DOCX
Python lab manual all the experiments are available
PDF
Web Technology Lab files with practical
PDF
Theory of automata and formal language lab manual
PDF
Software engineering practical
PDF
Principal of programming language lab files
PDF
database management system lab files
PDF
design and analysis of algorithm Lab files
PDF
Computer Organization And Architecture lab manual
DOCX
industrial training report on Ethical hacking
DOCX
Project synopsis on face recognition in e attendance
DOCX
Hrms industrial training report
DOCX
Industrial training report on core java
PDF
SEWAGE TREATMENT PLANT mini project report
PDF
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
PPTX
artificial intelligence ppt
HTML Presentation
MLApproachToProgramming.ppt
seminar topic of holography.ppt
Compiler design.pdf
Online shopping ppt
Python lab manual all the experiments are available
Web Technology Lab files with practical
Theory of automata and formal language lab manual
Software engineering practical
Principal of programming language lab files
database management system lab files
design and analysis of algorithm Lab files
Computer Organization And Architecture lab manual
industrial training report on Ethical hacking
Project synopsis on face recognition in e attendance
Hrms industrial training report
Industrial training report on core java
SEWAGE TREATMENT PLANT mini project report
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
artificial intelligence ppt

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
OOP with Java - Java Introduction (Basics)
PDF
PPT on Performance Review to get promotions
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Geodesy 1.pptx...............................................
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
composite construction of structures.pdf
Mechanical Engineering MATERIALS Selection
UNIT-1 - COAL BASED THERMAL POWER PLANTS
OOP with Java - Java Introduction (Basics)
PPT on Performance Review to get promotions
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Construction Project Organization Group 2.pptx
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
UNIT 4 Total Quality Management .pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
Geodesy 1.pptx...............................................
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
composite construction of structures.pdf

cyber security PPT