SlideShare a Scribd company logo
Ch.1
Introduction to Cyber Security
Presented By
Miss Khade P. D
Introduction
The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
What is the
meaning of
the word
CYBER
What are the
security
problems in
Cyber field
What is the need
of Cyber Security
How to
implement and
maintain
Security of a
Cyber field
around us.
Meaning of the Word CYBER
It is a combining form relating to information
technology, the Internet, and virtual reality.
Need of cyber security
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems
Virus
Hacker
Malware
Trojan horses
Password cracking
A
Viruses and Worms
Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Solution
Install a security suite that protects the computer
against threats such as viruses and worms.
Cybersecurity 140713064844-phpapp01 (1)-converted
Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
Download an anti-malware
program that also
helps prevent infections.
Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
Use always Strong password.
Never use same password for two different sites.
Cyber Security Is Everyone’s Responsibility
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
India stands 10th in the cyber
crime in the world
Cybersecurity 140713064844-phpapp01 (1)-converted
Conclusion
I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
helps to spread awareness among normal
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.
Cybersecurity 140713064844-phpapp01 (1)-converted
QUERIES?
REFERENCES
www.wikipedia.org
owww.avtest.org
owww.billmullins.blogspot.com
owww.digit/forum.com
owww.antivirusnews.com

More Related Content

PPTX
CYBER SECURITY
PPTX
Cyber security system presentation
PDF
Cyber Security Awareness
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Cyber security ppt
PPTX
Cybersecurity
PPTX
Cyber security Information security
PPTX
Introduction to cyber security
CYBER SECURITY
Cyber security system presentation
Cyber Security Awareness
Cyber Security Presentation "It Will Never Happen To Me"
Cyber security ppt
Cybersecurity
Cyber security Information security
Introduction to cyber security

What's hot (20)

PPTX
Ppt on cyber security
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cybercrime and Security
PPTX
cyber security,need,security problem and types of cyber security
PPT
Cyber Crime and Security
PPTX
Types of Cyber Attacks
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber crime and security
PPTX
Cyber crime and security
PPTX
Cyber security
PPTX
CyberSecurity
PDF
Information Security Awareness for everyone
PPTX
Cyber security
PPTX
Ppt growing need of cyber security
PPTX
Cyber security
PDF
Basics of Cyber Security
PDF
1. introduction to cyber security
PPTX
Cyber security
Ppt on cyber security
Cyber security
Cyber security
Cybercrime and Security
cyber security,need,security problem and types of cyber security
Cyber Crime and Security
Types of Cyber Attacks
Cyber security
Cyber security
Cyber crime and security
Cyber crime and security
Cyber security
CyberSecurity
Information Security Awareness for everyone
Cyber security
Ppt growing need of cyber security
Cyber security
Basics of Cyber Security
1. introduction to cyber security
Cyber security
Ad

Similar to Cybersecurity 140713064844-phpapp01 (1)-converted (20)

PPTX
Cyber security
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Art integrated project of computer science class 12
PPTX
SAHITHI.PPT.pptx
PPTX
cybersec sumit (1).pptx
PDF
cyber security.pdf
PPTX
cybersecurity.pptx
PPTX
Cyber security
PDF
cybersecurity-210715084148.pdf
PPTX
Introduction to cyber security
PPTX
Cyber security
PPTX
Cyber security(2018 updated)
PPTX
Cyber security by Anushka Jha
PPTX
cyber security.pptx
PPTX
Cyber security (daffodil international university)
PPTX
Cyber Security Presentation By(Aashish Tanania)
PPTX
cyber security PPT
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PPTX
Cyber Security A Challenges For Mankind
Cyber security
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
Art integrated project of computer science class 12
SAHITHI.PPT.pptx
cybersec sumit (1).pptx
cyber security.pdf
cybersecurity.pptx
Cyber security
cybersecurity-210715084148.pdf
Introduction to cyber security
Cyber security
Cyber security(2018 updated)
Cyber security by Anushka Jha
cyber security.pptx
Cyber security (daffodil international university)
Cyber Security Presentation By(Aashish Tanania)
cyber security PPT
4247174743543535355-Cyber-Security-Ppt.pptx
Cyber Security A Challenges For Mankind
Ad

More from Prof .Pragati Khade (11)

PDF
ch 2. Python module
PDF
Ooad with uml
PPTX
Chapter 1 big data
PPTX
Ds chapter 2
PPTX
Ch 2 Apraoaches Of Software Testing
PPTX
Software Testing
PDF
Share and mutual funds converted (1)
PPTX
Ch 3 . intrerest and annutiy
PPTX
Ch 2 profit and loss
PPTX
Ch1 ratio and proportion
PPTX
Polymorphism
ch 2. Python module
Ooad with uml
Chapter 1 big data
Ds chapter 2
Ch 2 Apraoaches Of Software Testing
Software Testing
Share and mutual funds converted (1)
Ch 3 . intrerest and annutiy
Ch 2 profit and loss
Ch1 ratio and proportion
Polymorphism

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Business Ethics Teaching Materials for college
TR - Agricultural Crops Production NC III.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPH.pptx obstetrics and gynecology in nursing
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
Renaissance Architecture: A Journey from Faith to Humanism
Module 4: Burden of Disease Tutorial Slides S2 2025
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Business Ethics Teaching Materials for college

Cybersecurity 140713064844-phpapp01 (1)-converted

  • 1. Ch.1 Introduction to Cyber Security Presented By Miss Khade P. D
  • 2. Introduction The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 3. What is the meaning of the word CYBER What are the security problems in Cyber field What is the need of Cyber Security How to implement and maintain Security of a Cyber field around us.
  • 4. Meaning of the Word CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 5. Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. A Viruses and Worms Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 8. Solution Install a security suite that protects the computer against threats such as viruses and worms.
  • 10. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  • 12. How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 13. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 14. To Stop Malware Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus.
  • 15. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 16. How to Avoid Trojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 17. Password Cracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 18. Securing Password Use always Strong password. Never use same password for two different sites.
  • 19. Cyber Security Is Everyone’s Responsibility
  • 20. Cyber Security Strategy – India • Security Policy, Legal Framework – IT Act, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  • 21. India stands 10th in the cyber crime in the world
  • 23. Conclusion I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection.