SlideShare a Scribd company logo
CYBEr SECURITY
KMBB COLLEGE OF ENGINEERING &
TECHNOLOGY
PRESENTED BY-BADAL KUMAR MUDULI
REG NO-2201329089
- CONTENTS -
 Introduction to Cyber Security
 Types of Cyber Threats
 Cyber Security Measures
 Best Practices for Cyber Security
 Real-World Examples and Case Studies
 Conclusion
Introduction to Cyber Security -
 Cyber security is the practice of protecting digital information,
networks, and computer systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.
 If you're in information security, your main concern is protecting
your company's data from unauthorized access of any sort,and if
you're in cyber security, your main concern is protecting your
company's sensitive data from unauthorized electronic access. In
both scenarios, the value of the data is of utmost importance.
Types of Cyber Threats –
 Malware - It is any software
intentionally designed to harm,
exploit, or otherwise compromise devices,
networks, or data.
 Phishing - It is the practice of sending
fraudulent communications that
appear to come from a legitimate and
reputable source, usually through
email and text messaging.
 Ransomware -Ransomware is a type of
malware that locks a device or encrypts
data, and then demands payment to
restore access.
 IoT attacks -Hackers exploit weak
security measures in IoT devices to
access sensitive data or disrupt
operations .
 SQL Injection -Attack on a database to
access sensitive information.
MOST TARGETED INDUSTRIES FOR PHISHING ATTACK -
Cyber Security Measures :-
 Firewalls:-
 Firewalls monitor and filter incoming and outgoing network traffic.
 They use security rules to decide whether to allow or block traffic.
 Firewalls can prevent malicious software from accessing a network or
computer.
 Encryption:-
 Encryption uses mathematical models to convert readable data (plaintext)
into an unreadable form (ciphertext).
 The process of reversing the encryption to restore the original data is
called decryption.
 Access Control:-
 Access control is a data security process that enables organizations to
manage who is authorized to access corporate data and resources.
 Intrusion Detection and Prevention Systems (IDPS):-
 An intrusion detection and prevention system (IDPS) is a network
monitoring strategy that works by both passively monitoring traffic and
actively blocking suspicious or malicious behavior once it is flagged.
 Virtual Private Networks (VPNs):-
 VPNs create a secure tunnel between a device and the internet.
 VPNs hide a user's IP address and location.
 VPNs allow users to access websites and applications through a proxy
server.
Best Practices for Cyber Security:-
 Use Strong Passwords:-
 Strong passwords are long, random, and unique. They are made up of a
combination of letters, numbers, and symbols.
 Keep Software Up-to-Date:-
 Most software and apps have an option to automatically download and
install updates as soon as they are available from the developer. This is the
easiest way to keep your software up to date without having to check for
updates manually.
 Use Antivirus Software:-
 Antivirus software helps protect your computer, network, and other devices
from viruses and malware. You can use antivirus software to prevent,
detect, search for, and remove threats.
 Phishing scams:-
 Phishing is a type of online scam that targets consumers by sending them an
e-mail that appears to be from a well-known source – an internet service
provider, a bank, or a mortgage company, for example.
 AppSec :-
 It is a set of measures to protect software applications from cyber threats. It
includes security measures during development, deployment, and ongoing
maintenance.
 Use 2FA:-
 Two-factor authentication (2FA) is a security method that requires two forms
of identification to log in to an account. 2FA can be used to protect online
accounts, smartphones, and company networks.
Real-World Examples and Case Studies :-
 Google Chrome Cyber-Espionage
Attacks (March 2025)-
 Google identified a surge in cyber-
espionage attacks targeting Chrome
users through sophisticated malware
delivered via phishing emails. Media
professionals, educational institutions,
and government agencies.
 North Korea's $1.5 Billion
Crypto Heist (February
2025)-
 The FBI attributed a $1.5 billion
theft from the cryptocurrency
exchange ByBit to North
Korean hackers, marking the
largest virtual asset heist in
history.
 AIIMS Ransomware Attack
(2023):
 The All India Institute of Medical
Sciences in Delhi faced a
ransomware attack that led to
server shutdowns, disrupting
healthcare services and
potentially compromising
patient data.
 X cyber attack-
 In March 2025, X (formerly
Twitter) faced major outages,
which Elon Musk attributed to a
massive cyberattack, possibly
from Ukraine. The hacking group
Dark Storm Team claimed
responsibility for a DDoS attack,
though experts questioned the
attribution and X’s vulnerability.
CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE
Government Initiatives:
 The Indian Computer Emergency Response Team (CERT-In) has
established memorandums of understanding with counterparts in
several countries to enhance cybersecurity measures and facilitate
information exchange.
 The government has launched awareness campaigns to educate
citizens about emerging cyber threats, such as "digital arrest"
scams, where fraudsters impersonate authorities to extort money.
 Exercise caution with unsolicited communications, regularly
update passwords, and stay informed about common scam tactics.
​
CONCLUSION-
 Cybersecurity is essential in protecting digital systems from
evolving threats. Strong security practices, continuous
monitoring, user awareness, and a solid incident response
plan are key. Global cooperation is needed to ensure
privacy, trust, and safety in the digital world.
THANK YOU

More Related Content

PPTX
Cyber Security PPT.pptx
PPTX
Computer-Security.pptx
PPTX
Cyber Security: A Hands on review
PPTX
R20BM564.pptx
PPTX
R20BM564_NAWARAJSUNARPPT.pptx
PPTX
cyber security and forensic tools
PDF
A Review Paper on Cyber-Security
PPTX
Cyber Security PPT.pptx
Cyber Security PPT.pptx
Computer-Security.pptx
Cyber Security: A Hands on review
R20BM564.pptx
R20BM564_NAWARAJSUNARPPT.pptx
cyber security and forensic tools
A Review Paper on Cyber-Security
Cyber Security PPT.pptx

Similar to CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE (20)

PPTX
Rishabhcyber security.pptx
PPTX
Cyber Security PPT.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Cyber security
PDF
C018131821
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
PPTX
Cyber Security PPT.pptx
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PDF
CyberSecurity.pdf
PPTX
Cysec.pptx
PPTX
Cyber Security PPT.pptx
PPTX
Cyber security
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PPTX
Cyber Security in detail PPT BY HIMANXU.pptx
PDF
Cyber Security
PPTX
Cyber Security
DOCX
Cyber crime
PDF
Type of Security Threats and its Prevention
PPTX
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
PDF
Introduction to cyber security i
Rishabhcyber security.pptx
Cyber Security PPT.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Cyber security
C018131821
hgfhvgggggggggggggggggggggggpresent.pptx
Cyber Security PPT.pptx
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
CyberSecurity.pdf
Cysec.pptx
Cyber Security PPT.pptx
Cyber security
Top 5 Cybersecurity Threats in Retail Industry
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security
Cyber Security
Cyber crime
Type of Security Threats and its Prevention
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
Introduction to cyber security i
Ad

Recently uploaded (20)

PPTX
The Stock at arrangement the stock and product.pptx
PPTX
Job-opportunities lecture about it skills
PPT
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PDF
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
DOCX
mcsp232projectguidelinesjan2023 (1).docx
PPTX
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
PPTX
_Dispute Resolution_July 2022.pptxmhhghhhh
PDF
MCQ Practice CBT OL Official Language 1.pptx.pdf
PPT
NO000387 (1).pptsbsnsnsnsnsnsnsmsnnsnsnsjsnnsnsnsnnsnnansnwjwnshshshs
PDF
Entrepreneurship PowerPoint for students
PPTX
microtomy kkk. presenting to cryst in gl
PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PPTX
A slide for students with the advantagea
PPTX
Slideham presentation for the students a
PPT
ALLIED MATHEMATICS -I UNIT III MATRICES.ppt
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PPTX
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
PPTX
Principles of Inheritance and variation class 12.pptx
PPTX
Surgical thesis protocol formation ppt.pptx
The Stock at arrangement the stock and product.pptx
Job-opportunities lecture about it skills
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
mcsp232projectguidelinesjan2023 (1).docx
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
_Dispute Resolution_July 2022.pptxmhhghhhh
MCQ Practice CBT OL Official Language 1.pptx.pdf
NO000387 (1).pptsbsnsnsnsnsnsnsmsnnsnsnsjsnnsnsnsnnsnnansnwjwnshshshs
Entrepreneurship PowerPoint for students
microtomy kkk. presenting to cryst in gl
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
A slide for students with the advantagea
Slideham presentation for the students a
ALLIED MATHEMATICS -I UNIT III MATRICES.ppt
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
Principles of Inheritance and variation class 12.pptx
Surgical thesis protocol formation ppt.pptx
Ad

CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE

  • 1. CYBEr SECURITY KMBB COLLEGE OF ENGINEERING & TECHNOLOGY PRESENTED BY-BADAL KUMAR MUDULI REG NO-2201329089
  • 2. - CONTENTS -  Introduction to Cyber Security  Types of Cyber Threats  Cyber Security Measures  Best Practices for Cyber Security  Real-World Examples and Case Studies  Conclusion
  • 3. Introduction to Cyber Security -  Cyber security is the practice of protecting digital information, networks, and computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction.  If you're in information security, your main concern is protecting your company's data from unauthorized access of any sort,and if you're in cyber security, your main concern is protecting your company's sensitive data from unauthorized electronic access. In both scenarios, the value of the data is of utmost importance.
  • 4. Types of Cyber Threats –  Malware - It is any software intentionally designed to harm, exploit, or otherwise compromise devices, networks, or data.  Phishing - It is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.  Ransomware -Ransomware is a type of malware that locks a device or encrypts data, and then demands payment to restore access.  IoT attacks -Hackers exploit weak security measures in IoT devices to access sensitive data or disrupt operations .  SQL Injection -Attack on a database to access sensitive information.
  • 5. MOST TARGETED INDUSTRIES FOR PHISHING ATTACK -
  • 6. Cyber Security Measures :-  Firewalls:-  Firewalls monitor and filter incoming and outgoing network traffic.  They use security rules to decide whether to allow or block traffic.  Firewalls can prevent malicious software from accessing a network or computer.  Encryption:-  Encryption uses mathematical models to convert readable data (plaintext) into an unreadable form (ciphertext).  The process of reversing the encryption to restore the original data is called decryption.  Access Control:-  Access control is a data security process that enables organizations to manage who is authorized to access corporate data and resources.
  • 7.  Intrusion Detection and Prevention Systems (IDPS):-  An intrusion detection and prevention system (IDPS) is a network monitoring strategy that works by both passively monitoring traffic and actively blocking suspicious or malicious behavior once it is flagged.  Virtual Private Networks (VPNs):-  VPNs create a secure tunnel between a device and the internet.  VPNs hide a user's IP address and location.  VPNs allow users to access websites and applications through a proxy server.
  • 8. Best Practices for Cyber Security:-  Use Strong Passwords:-  Strong passwords are long, random, and unique. They are made up of a combination of letters, numbers, and symbols.  Keep Software Up-to-Date:-  Most software and apps have an option to automatically download and install updates as soon as they are available from the developer. This is the easiest way to keep your software up to date without having to check for updates manually.  Use Antivirus Software:-  Antivirus software helps protect your computer, network, and other devices from viruses and malware. You can use antivirus software to prevent, detect, search for, and remove threats.
  • 9.  Phishing scams:-  Phishing is a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source – an internet service provider, a bank, or a mortgage company, for example.  AppSec :-  It is a set of measures to protect software applications from cyber threats. It includes security measures during development, deployment, and ongoing maintenance.  Use 2FA:-  Two-factor authentication (2FA) is a security method that requires two forms of identification to log in to an account. 2FA can be used to protect online accounts, smartphones, and company networks.
  • 10. Real-World Examples and Case Studies :-  Google Chrome Cyber-Espionage Attacks (March 2025)-  Google identified a surge in cyber- espionage attacks targeting Chrome users through sophisticated malware delivered via phishing emails. Media professionals, educational institutions, and government agencies.  North Korea's $1.5 Billion Crypto Heist (February 2025)-  The FBI attributed a $1.5 billion theft from the cryptocurrency exchange ByBit to North Korean hackers, marking the largest virtual asset heist in history.
  • 11.  AIIMS Ransomware Attack (2023):  The All India Institute of Medical Sciences in Delhi faced a ransomware attack that led to server shutdowns, disrupting healthcare services and potentially compromising patient data.  X cyber attack-  In March 2025, X (formerly Twitter) faced major outages, which Elon Musk attributed to a massive cyberattack, possibly from Ukraine. The hacking group Dark Storm Team claimed responsibility for a DDoS attack, though experts questioned the attribution and X’s vulnerability.
  • 13. Government Initiatives:  The Indian Computer Emergency Response Team (CERT-In) has established memorandums of understanding with counterparts in several countries to enhance cybersecurity measures and facilitate information exchange.  The government has launched awareness campaigns to educate citizens about emerging cyber threats, such as "digital arrest" scams, where fraudsters impersonate authorities to extort money.  Exercise caution with unsolicited communications, regularly update passwords, and stay informed about common scam tactics. ​
  • 14. CONCLUSION-  Cybersecurity is essential in protecting digital systems from evolving threats. Strong security practices, continuous monitoring, user awareness, and a solid incident response plan are key. Global cooperation is needed to ensure privacy, trust, and safety in the digital world.