SlideShare a Scribd company logo
Presented by :
Prof. F .R. Gosai
Subject code:
3150741
Course
Unit 1: Systems Vulnerability Scanning
Unit 2: Network Defence tools
Unit 3: Web Application Tools
Unit 4: Introduction to Cyber Crime and law
Unit 5: Introduction to Cyber Crime Investigation
The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
Introduction
What is the
meaning of
the word
CYBER
What is the need
of Cyber Security
What are the
security
problems in
Cyber field
How to
implement and
maintain
Security of a
Cyber field
around us.
It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Need of cyber security
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses and Worms
AVirus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Solution
Install a security suite that protects the computer
against threats such as viruses and worms.
Cybersecurity
Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
To Stop Malware
Download an anti-malware
program thatalso
helps prevent infections.
Activate Network Threat
Protection,
Firewall, Antivirus.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
Use always Strong password.
Never use same password for two different sites.
CyberSecurity Is Everyone’s Responsibility
Cyber crime growth by year
Cyber Security Strategy – India
• Security Policy, Legal Framework
– ITAct, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
Biggest Cyber Attack in 2020
Magellan Health
Marriott
Software AG Ransomware Attack
Twitter
Zoom
Types of Attack.
 Malware
 Phishing
 Salami Attack
 SQL Injection Attack
 Cross-Site Scripting (XSS)
 Denial of Service (DoS)
 Session Hijacking and Man-in-the-Middle Attacks
 Credential Reuse
 Nigerian Scam
 Dumpster diving
 War driving
 Ransomware
Cybersecurity
Cybersecurity

More Related Content

PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
Cyber security
PPTX
cyber security
PPTX
Cyber security
PPTX
CYBER SECURITY
Cyber security
Cyber security
Cyber security system presentation
Cyber security
Cyber security
cyber security
Cyber security
CYBER SECURITY

What's hot (20)

PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cybercrime and Security
PPTX
Cyber security
PDF
Cyber security
PPT
Cyber Crime and Security
PPTX
Cyber crime and security
PPTX
Cyber security ppt
PPTX
Cyber security
PPTX
Cyber Security
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PDF
Cyber Security Awareness
PPTX
CYBER SECURITY
PPTX
Cyber security
PPTX
Cyber Security Presentation
PPTX
Cyber Crime and Security
PPTX
Cyber Security 03
PPTX
Introduction to cyber security
PDF
Cyber Security
PPTX
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cybercrime and Security
Cyber security
Cyber security
Cyber Crime and Security
Cyber crime and security
Cyber security ppt
Cyber security
Cyber Security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cyber Security Awareness
CYBER SECURITY
Cyber security
Cyber Security Presentation
Cyber Crime and Security
Cyber Security 03
Introduction to cyber security
Cyber Security
Cybersecurity
Ad

Similar to Cybersecurity (20)

PPTX
SAHITHI.PPT.pptx
PPTX
Cyber security
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security by Anushka Jha
PDF
cyber security.pdf
PPTX
cybersec sumit (1).pptx
PPTX
cybersecurity.pptx
PPTX
Introduction to cyber security
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Art integrated project of computer science class 12
PPTX
Cyber Security A Challenges For Mankind
PPTX
Cyber security (daffodil international university)
PPTX
cyber security.pptx
PPTX
Cyber security
PPTX
cyber security PPT
PPTX
Cyber security
PPTX
Cyber security(2018 updated)
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PPTX
CYBER SECURITY
SAHITHI.PPT.pptx
Cyber security
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
Cyber security by Anushka Jha
cyber security.pdf
cybersec sumit (1).pptx
cybersecurity.pptx
Introduction to cyber security
Cybersecurity 140713064844-phpapp01 (1)-converted
Art integrated project of computer science class 12
Cyber Security A Challenges For Mankind
Cyber security (daffodil international university)
cyber security.pptx
Cyber security
cyber security PPT
Cyber security
Cyber security(2018 updated)
4247174743543535355-Cyber-Security-Ppt.pptx
CYBER SECURITY
Ad

Recently uploaded (20)

PDF
Well-logging-methods_new................
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
web development for engineering and engineering
DOCX
573137875-Attendance-Management-System-original
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Welding lecture in detail for understanding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
Well-logging-methods_new................
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
web development for engineering and engineering
573137875-Attendance-Management-System-original
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
additive manufacturing of ss316l using mig welding
CH1 Production IntroductoryConcepts.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mechanical Engineering MATERIALS Selection
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Welding lecture in detail for understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Lecture Notes Electrical Wiring System Components
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Digital Logic Computer Design lecture notes
Structs to JSON How Go Powers REST APIs.pdf
bas. eng. economics group 4 presentation 1.pptx

Cybersecurity

  • 1. Presented by : Prof. F .R. Gosai Subject code: 3150741
  • 2. Course Unit 1: Systems Vulnerability Scanning Unit 2: Network Defence tools Unit 3: Web Application Tools Unit 4: Introduction to Cyber Crime and law Unit 5: Introduction to Cyber Crime Investigation
  • 3. The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Introduction
  • 4. What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 5. It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 6. Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 8. Viruses and Worms AVirus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 9. Solution Install a security suite that protects the computer against threats such as viruses and worms.
  • 11. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 12. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  • 13. How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 14. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 15. To Stop Malware Download an anti-malware program thatalso helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus.
  • 16. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 17. How to Avoid Trojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 18. Password Cracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 19. Securing Password Use always Strong password. Never use same password for two different sites.
  • 22. Cyber Security Strategy – India • Security Policy, Legal Framework – ITAct, 2000 – IT (Amendment) Bill, 2006 – Data Protection & Computer crimes • Capacity building – Skill & Competence development • Research and Development – Cyber Monitoring – Network Security • International Collaboration
  • 23. Biggest Cyber Attack in 2020 Magellan Health
  • 27. Zoom
  • 28. Types of Attack.  Malware  Phishing  Salami Attack  SQL Injection Attack  Cross-Site Scripting (XSS)  Denial of Service (DoS)  Session Hijacking and Man-in-the-Middle Attacks  Credential Reuse  Nigerian Scam  Dumpster diving  War driving  Ransomware