SlideShare a Scribd company logo
CYBER SECURITY
PPT PRESENTATION
FOR
COMMUNICATION SKILL IN
ENGLISH
SUBMITTED TO:-
Dr. Arun Malik
Dr. Shahida
SUMITTED BY:-
Lakshay Jain
M&C (A-01)
123110004
DEPARTMENT OF HUMANITES
NATIONAL INSTITUTE OF
KURUKSHETRA
CYBERSECURITY :
PROTECTING THE DIGITAL WORLD
WHAT IS CYBER SECURITY ?
Cybersecurity, is the practice of protecting computer systems, networks,
and digital data from theft, damage, unauthorized access, and other
forms of cyberattacks. It encompasses a wide range of technologies,
processes, and practices designed to safeguard the confidentiality,
integrity, and availability of information in the digital realm. Cybersecurity
is crucial in our increasingly connected world, where we rely on digital
technology for communication, commerce, and many aspects of our daily
lives.
Why Cyber Security matters?
 Protection of sensitive information
 Preventing financial loss
 Ensuring national security
 Maintaining trust in digital world
 Preventing data loss
 Preventing personal harm
CYBER THREATS
 Malware
 Phishing
 DDoS attacks
 Ransomeware
 MITM attacks
 SQL injection
 IoT vulnerabilities
WHAT IS HACKING?
Hacking is the act of gaining unauthorized access to computer systems,
networks, or digital devices, often with the intent of altering, stealing, or
manipulating data, or disrupting the normal functioning of the target
system. Hacking can take various forms, from ethical hacking, where
individuals or cybersecurity professionals legally assess systems for
vulnerabilities, to malicious hacking, where unauthorized access is used
for personal gain, damage, or other illicit purposes.
Types of Hackers
Ethical Hackers
 Ethical hackers, also known as "white hat hackers," are cybersecurity
professionals or individuals who use their skills and knowledge to protect
computer systems, networks, and digital information.
 Their primary objective is to identify security vulnerabilities and
weaknesses in systems and applications.
 They act in a legal and authorized capacity, often with the explicit consent
of the system owners or organizations.
Career Opportunities
Career opportunities in cybersecurity are diverse and promising, given the
ever-increasing importance of cybersecurity in today's digital world. Here are
some of the many career paths available in the field of cybersecurity:
 Security analysts
 Security Cousultant
 Incident responser
 Threat Intelligence analyst
 Security Architect
 Penetration tester
Case Study : Pegasus spyware
Pegasus is a highly advanced and controversial spyware created by the
Israeli cybersecurity firm, NSO Group. This case study delves into its use
and implications in various high-profile incidents.
infection Mechanism: Pegasus infiltrates mobile devices,
especially smartphones, using a combination of sophisticated
techniques. This includes phishing attacks, malicious SMS
messages, and exploitation of undisclosed software
vulnerabilities. Once installed on a target device, it gains full
control, allowing for activities such as eavesdropping, tracking,
and data extraction.
Consequences and Impact: The use of Pegasus has led to significant
consequences, with concerns revolving around privacy, security, and
human rights violations. Targeted individuals have faced threats to their
personal safety, exposure of sensitive data, and surveillance without their
knowledge or consent.
Legal and Ethical Dilemmas: Pegasus raises complex legal and ethical
questions. The surveillance often occurs without proper legal
authorization, and governments and organizations have been criticized
for their involvement in deploying the spyware. This highlights the tension
between national security and individual rights.
Conclusion:
The Pegasus case study underscores the critical importance of
cybersecurity, the protection of privacy, and the need to protect
individuals from unwarranted surveillance. It serves as a reminder of
the ongoing struggle faced by governments, cybersecurity experts, and
advocates for digital rights in an increasingly connected and complex
digital landscape.
THANK YOU

More Related Content

PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Introduction to Cyber Security, understanding concepts
PPTX
Introduction to Cyber Security, understanding concepts
PPTX
Introduction to Cyber Security and its importance
PPTX
Introduction to Cyber Security and its importance
PPTX
An An Exploration Into the Cyber Security
PPTX
An An Exploration Into the Cyber Security
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
Introduction to Cyber Security, understanding concepts
Introduction to Cyber Security, understanding concepts
Introduction to Cyber Security and its importance
Introduction to Cyber Security and its importance
An An Exploration Into the Cyber Security
An An Exploration Into the Cyber Security

Similar to Cyber security presentation for practical (20)

PPTX
Cyber security
PPTX
Cyber security
PDF
Cyber+Security+Fundamentals.pdf.....network security
PDF
Cyber+Security+Fundamentals.pdf.....network security
PPTX
Cyberfort syllabus & career
PPTX
Cyberfort syllabus & career
PPTX
Cyberfort syllabus & career
PPTX
Cyberfort syllabus & career
PPTX
ppt on cybersecurity and why its necessary
PPTX
ppt on cybersecurity and why its necessary
PPTX
seminar ppt.pptx
PPTX
seminar ppt.pptx
PPTX
cybersecurity and its importance in digital era
PPTX
cybersecurity and its importance in digital era
PPTX
cybersecurityandthe importance of the that
PPTX
cybersecurityandthe importance of the that
PDF
Cyber Security Course & Guide. X.GI. pdf
PDF
Cyber Security Course & Guide. X.GI. pdf
PDF
COMP 424 Computer System Security Fall 2016
PDF
COMP 424 Computer System Security Fall 2016
Cyber security
Cyber security
Cyber+Security+Fundamentals.pdf.....network security
Cyber+Security+Fundamentals.pdf.....network security
Cyberfort syllabus & career
Cyberfort syllabus & career
Cyberfort syllabus & career
Cyberfort syllabus & career
ppt on cybersecurity and why its necessary
ppt on cybersecurity and why its necessary
seminar ppt.pptx
seminar ppt.pptx
cybersecurity and its importance in digital era
cybersecurity and its importance in digital era
cybersecurityandthe importance of the that
cybersecurityandthe importance of the that
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
COMP 424 Computer System Security Fall 2016
COMP 424 Computer System Security Fall 2016
Ad

Recently uploaded (20)

PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Trump Administration's workforce development strategy
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
advance database management system book.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Lesson notes of climatology university.
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Introduction to Building Materials
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Weekly quiz Compilation Jan -July 25.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Trump Administration's workforce development strategy
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Final Presentation General Medicine 03-08-2024.pptx
advance database management system book.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
LDMMIA Reiki Yoga Finals Review Spring Summer
Lesson notes of climatology university.
Complications of Minimal Access Surgery at WLH
Orientation - ARALprogram of Deped to the Parents.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
Introduction to Building Materials
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Cell Types and Its function , kingdom of life
202450812 BayCHI UCSC-SV 20250812 v17.pptx
History, Philosophy and sociology of education (1).pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Ad

Cyber security presentation for practical

  • 1. CYBER SECURITY PPT PRESENTATION FOR COMMUNICATION SKILL IN ENGLISH SUBMITTED TO:- Dr. Arun Malik Dr. Shahida SUMITTED BY:- Lakshay Jain M&C (A-01) 123110004 DEPARTMENT OF HUMANITES NATIONAL INSTITUTE OF KURUKSHETRA
  • 3. WHAT IS CYBER SECURITY ? Cybersecurity, is the practice of protecting computer systems, networks, and digital data from theft, damage, unauthorized access, and other forms of cyberattacks. It encompasses a wide range of technologies, processes, and practices designed to safeguard the confidentiality, integrity, and availability of information in the digital realm. Cybersecurity is crucial in our increasingly connected world, where we rely on digital technology for communication, commerce, and many aspects of our daily lives.
  • 4. Why Cyber Security matters?  Protection of sensitive information  Preventing financial loss  Ensuring national security  Maintaining trust in digital world  Preventing data loss  Preventing personal harm
  • 5. CYBER THREATS  Malware  Phishing  DDoS attacks  Ransomeware  MITM attacks  SQL injection  IoT vulnerabilities
  • 6. WHAT IS HACKING? Hacking is the act of gaining unauthorized access to computer systems, networks, or digital devices, often with the intent of altering, stealing, or manipulating data, or disrupting the normal functioning of the target system. Hacking can take various forms, from ethical hacking, where individuals or cybersecurity professionals legally assess systems for vulnerabilities, to malicious hacking, where unauthorized access is used for personal gain, damage, or other illicit purposes.
  • 8. Ethical Hackers  Ethical hackers, also known as "white hat hackers," are cybersecurity professionals or individuals who use their skills and knowledge to protect computer systems, networks, and digital information.  Their primary objective is to identify security vulnerabilities and weaknesses in systems and applications.  They act in a legal and authorized capacity, often with the explicit consent of the system owners or organizations.
  • 9. Career Opportunities Career opportunities in cybersecurity are diverse and promising, given the ever-increasing importance of cybersecurity in today's digital world. Here are some of the many career paths available in the field of cybersecurity:  Security analysts  Security Cousultant  Incident responser  Threat Intelligence analyst  Security Architect  Penetration tester
  • 10. Case Study : Pegasus spyware Pegasus is a highly advanced and controversial spyware created by the Israeli cybersecurity firm, NSO Group. This case study delves into its use and implications in various high-profile incidents. infection Mechanism: Pegasus infiltrates mobile devices, especially smartphones, using a combination of sophisticated techniques. This includes phishing attacks, malicious SMS messages, and exploitation of undisclosed software vulnerabilities. Once installed on a target device, it gains full control, allowing for activities such as eavesdropping, tracking, and data extraction.
  • 11. Consequences and Impact: The use of Pegasus has led to significant consequences, with concerns revolving around privacy, security, and human rights violations. Targeted individuals have faced threats to their personal safety, exposure of sensitive data, and surveillance without their knowledge or consent. Legal and Ethical Dilemmas: Pegasus raises complex legal and ethical questions. The surveillance often occurs without proper legal authorization, and governments and organizations have been criticized for their involvement in deploying the spyware. This highlights the tension between national security and individual rights.
  • 12. Conclusion: The Pegasus case study underscores the critical importance of cybersecurity, the protection of privacy, and the need to protect individuals from unwarranted surveillance. It serves as a reminder of the ongoing struggle faced by governments, cybersecurity experts, and advocates for digital rights in an increasingly connected and complex digital landscape.