1. CYBER SECURITY
PPT PRESENTATION
FOR
COMMUNICATION SKILL IN
ENGLISH
SUBMITTED TO:-
Dr. Arun Malik
Dr. Shahida
SUMITTED BY:-
Lakshay Jain
M&C (A-01)
123110004
DEPARTMENT OF HUMANITES
NATIONAL INSTITUTE OF
KURUKSHETRA
3. WHAT IS CYBER SECURITY ?
Cybersecurity, is the practice of protecting computer systems, networks,
and digital data from theft, damage, unauthorized access, and other
forms of cyberattacks. It encompasses a wide range of technologies,
processes, and practices designed to safeguard the confidentiality,
integrity, and availability of information in the digital realm. Cybersecurity
is crucial in our increasingly connected world, where we rely on digital
technology for communication, commerce, and many aspects of our daily
lives.
4. Why Cyber Security matters?
Protection of sensitive information
Preventing financial loss
Ensuring national security
Maintaining trust in digital world
Preventing data loss
Preventing personal harm
6. WHAT IS HACKING?
Hacking is the act of gaining unauthorized access to computer systems,
networks, or digital devices, often with the intent of altering, stealing, or
manipulating data, or disrupting the normal functioning of the target
system. Hacking can take various forms, from ethical hacking, where
individuals or cybersecurity professionals legally assess systems for
vulnerabilities, to malicious hacking, where unauthorized access is used
for personal gain, damage, or other illicit purposes.
8. Ethical Hackers
Ethical hackers, also known as "white hat hackers," are cybersecurity
professionals or individuals who use their skills and knowledge to protect
computer systems, networks, and digital information.
Their primary objective is to identify security vulnerabilities and
weaknesses in systems and applications.
They act in a legal and authorized capacity, often with the explicit consent
of the system owners or organizations.
9. Career Opportunities
Career opportunities in cybersecurity are diverse and promising, given the
ever-increasing importance of cybersecurity in today's digital world. Here are
some of the many career paths available in the field of cybersecurity:
Security analysts
Security Cousultant
Incident responser
Threat Intelligence analyst
Security Architect
Penetration tester
10. Case Study : Pegasus spyware
Pegasus is a highly advanced and controversial spyware created by the
Israeli cybersecurity firm, NSO Group. This case study delves into its use
and implications in various high-profile incidents.
infection Mechanism: Pegasus infiltrates mobile devices,
especially smartphones, using a combination of sophisticated
techniques. This includes phishing attacks, malicious SMS
messages, and exploitation of undisclosed software
vulnerabilities. Once installed on a target device, it gains full
control, allowing for activities such as eavesdropping, tracking,
and data extraction.
11. Consequences and Impact: The use of Pegasus has led to significant
consequences, with concerns revolving around privacy, security, and
human rights violations. Targeted individuals have faced threats to their
personal safety, exposure of sensitive data, and surveillance without their
knowledge or consent.
Legal and Ethical Dilemmas: Pegasus raises complex legal and ethical
questions. The surveillance often occurs without proper legal
authorization, and governments and organizations have been criticized
for their involvement in deploying the spyware. This highlights the tension
between national security and individual rights.
12. Conclusion:
The Pegasus case study underscores the critical importance of
cybersecurity, the protection of privacy, and the need to protect
individuals from unwarranted surveillance. It serves as a reminder of
the ongoing struggle faced by governments, cybersecurity experts, and
advocates for digital rights in an increasingly connected and complex
digital landscape.