SlideShare a Scribd company logo
CyberSecurity.pptx
Cyber + Security ?
 “Cyber” denotes a relationship with information Technology(IT),i.e., computers. It
can relate to all aspects of computing, including storing, protecting, accesing,
protecting, linking of data.
 “Security” means safety as well as the measure taken to be safe or protected.
 So, we conclude both keyword “CyberSecurity is the practice of defending
computers, server, mobile devices, network, and data from malicious attacks.
History
 The first recorded cyber crime was in the year 1820.
 The first spam email took place in 1978 when it was
sent over the Arpanet.
 The first Virus was installed on an Apple Computer in 1982.
Why do we need cybersecurity
In 2021, cybercrime cost the world $6 trillion. By 2025, there cost will
increase to $10.5 trillion. Cybercrime is an increasingly serious problem, and
to address it, strong cybersecurity is critical.
Cyber security is necessary since it helps in securing data from threats or
misuse, also safeguard your system from virus
Our dependency on the internet has become immense. And that provides
enough opportunities to the hackers to dupe you of your money or other
crucial data if you are not cautious.
Statistics….
 Hackers attack people worldwide roughly every half a minute. This translates to a
cybercrime being commited on an average of 2,244 times per day. [Source:
Cisco]
 Worldwide spending on cybersecurity is forecast to reach $133.7 billion in 2022.
 Only 5% of company folders are properly protected.
 In 2020, the average business cost of a cyberattack is $3.86 million and it takes
over 200 days to detect the breach. (Source: IBM)
 Malicious email attacks are up 600% this year, fueled by the pandemic. (Source:
ABC News)
…..
 India is one of the top 5 targeted countries for Cyberattacks in the APAC
region.(Source: Kaspersky)
Successfull Hacking Attack..
 The latest case of the OnePlus smartphone manufacturer shows the potential
consequences misuses of stolen corporate data, in this way attackers managed to
steal about 40,000 credit card payment details.
 In 1999, NASA suffered a data breach when a 15-year-old hacker exploited a
router vulnerability and stole source code. The breach caused 21 day of downtime
and cost NASA $41,000.
 Sony’s most popular product “Playstation Gaming Station”, unfortunately In 2011,
77million playstation user account hacked. After that sony invested $170 million
to improve network security.
 In 2014, Home Depot was the victim of cyberattacks, 56 million payment cards
were compromised, along with his e-mail address.
Habits to Stay Cyber-Safe
 Think twice before clicking on links or opening attachment.
 Verify request for private information.
 Never reveal your password to anyone.
 Protect your stuff.
 Keep your devices, browsers, and apps up to date.
 Back up critical files.
 Delete sensitive information when it is no longer needed.
 If it’s suspicious, report it!
Types Of Cyber Attacks
 Denial-of-service(DoS) and distributed denial-of-srvice(DDoS) attacks.
 Man-in-the-middle(MitM) attack.
 Phishing and spear phishing attacks.
 Drive-by attack.
 Password attack.
 SQL injection attack.
 Cross-site scripting(XSS) attack.
 Eavesdropping attack.
Key Elements of Cyber Security
Key Elements of
Cyber
Security
Application
Security
Information
Security
Network
Security
Disaster
Recover
Operational
Security
End user
Education
Tools used for Cyber Security
Passwords
Firewalls
Anti-virus/ Anti-malware
software
Encryption
Authentication
Conclusion…
 We are living in digital era and digital technology has transformed our lives
promoting the needs of cyber security.

More Related Content

PPTX
Cyber security system presentation
PPTX
cyber security presentation.pptx
PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Cyber Terrorism
PPTX
Wannacry
PPTX
Network Security and Firewall
PPTX
OpenVAS
Cyber security system presentation
cyber security presentation.pptx
Cyber security presentation
Cyber security
Cyber Terrorism
Wannacry
Network Security and Firewall
OpenVAS

What's hot (20)

PPTX
CYBERSECURITY WEYAI.pptx
PPTX
Understanding NMAP
PPTX
cyber crime
PPTX
Different types of attacks in internet
PPTX
Mobile Application Security
PPTX
Introduction to cyber security amos
PPTX
DOC
Cybersecurity
PPTX
Ransomware
PPT
Cyber Terrorism Presentation
PPT
PPTX
CYBER SAFETY PPT
PDF
Ransomware: History, Analysis, & Mitigation - PDF
ODP
Side channel attacks
PPTX
Cyber Crime And Security
PPTX
Intrusion prevention system(ips)
PPTX
Cyber security
PPT
DDoS Attack PPT by Nitin Bisht
PPTX
CYBERSECURITY WEYAI.pptx
Understanding NMAP
cyber crime
Different types of attacks in internet
Mobile Application Security
Introduction to cyber security amos
Cybersecurity
Ransomware
Cyber Terrorism Presentation
CYBER SAFETY PPT
Ransomware: History, Analysis, & Mitigation - PDF
Side channel attacks
Cyber Crime And Security
Intrusion prevention system(ips)
Cyber security
DDoS Attack PPT by Nitin Bisht
Ad

Similar to CyberSecurity.pptx (20)

PPTX
220715_Cybersecurity: What's at stake?
PPT
Cyber crime and forensic
PPTX
PPTX
Cyber security
PPTX
Cyber Crime
PPTX
Cyber crime
PDF
2024 Cyber Threats: What's New and What You Should Keep an Eye On!
DOCX
Cyber security and threats
DOCX
The evolution and growth of cybersecurity.docx
PDF
[Infographic] 7 Cyber attacks that shook the world
PDF
Cyber Security Vulnerabilities
PPTX
Cyber Crime and Security
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PDF
Cyber Security Notes Unit 2 for Engineering
PPTX
Cyber crime
PPTX
Cyber crime
PDF
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PDF
cybersecurityawareness-presentation-170627121043.pdf
PPTX
Cyber Security Concepts, layers of security,
PPSX
Cyber security awareness presentation
220715_Cybersecurity: What's at stake?
Cyber crime and forensic
Cyber security
Cyber Crime
Cyber crime
2024 Cyber Threats: What's New and What You Should Keep an Eye On!
Cyber security and threats
The evolution and growth of cybersecurity.docx
[Infographic] 7 Cyber attacks that shook the world
Cyber Security Vulnerabilities
Cyber Crime and Security
ccs12-18022310494mghmgmyy3 (1).pdf
Cyber Security Notes Unit 2 for Engineering
Cyber crime
Cyber crime
Top Positive and Negative Impacts of AI & ML on Cybersecurity
cybersecurityawareness-presentation-170627121043.pdf
Cyber Security Concepts, layers of security,
Cyber security awareness presentation
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Review of recent advances in non-invasive hemoglobin estimation
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

CyberSecurity.pptx

  • 2. Cyber + Security ?  “Cyber” denotes a relationship with information Technology(IT),i.e., computers. It can relate to all aspects of computing, including storing, protecting, accesing, protecting, linking of data.  “Security” means safety as well as the measure taken to be safe or protected.  So, we conclude both keyword “CyberSecurity is the practice of defending computers, server, mobile devices, network, and data from malicious attacks.
  • 3. History  The first recorded cyber crime was in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.
  • 4. Why do we need cybersecurity In 2021, cybercrime cost the world $6 trillion. By 2025, there cost will increase to $10.5 trillion. Cybercrime is an increasingly serious problem, and to address it, strong cybersecurity is critical. Cyber security is necessary since it helps in securing data from threats or misuse, also safeguard your system from virus Our dependency on the internet has become immense. And that provides enough opportunities to the hackers to dupe you of your money or other crucial data if you are not cautious.
  • 5. Statistics….  Hackers attack people worldwide roughly every half a minute. This translates to a cybercrime being commited on an average of 2,244 times per day. [Source: Cisco]  Worldwide spending on cybersecurity is forecast to reach $133.7 billion in 2022.  Only 5% of company folders are properly protected.  In 2020, the average business cost of a cyberattack is $3.86 million and it takes over 200 days to detect the breach. (Source: IBM)  Malicious email attacks are up 600% this year, fueled by the pandemic. (Source: ABC News)
  • 6. …..  India is one of the top 5 targeted countries for Cyberattacks in the APAC region.(Source: Kaspersky)
  • 7. Successfull Hacking Attack..  The latest case of the OnePlus smartphone manufacturer shows the potential consequences misuses of stolen corporate data, in this way attackers managed to steal about 40,000 credit card payment details.  In 1999, NASA suffered a data breach when a 15-year-old hacker exploited a router vulnerability and stole source code. The breach caused 21 day of downtime and cost NASA $41,000.  Sony’s most popular product “Playstation Gaming Station”, unfortunately In 2011, 77million playstation user account hacked. After that sony invested $170 million to improve network security.  In 2014, Home Depot was the victim of cyberattacks, 56 million payment cards were compromised, along with his e-mail address.
  • 8. Habits to Stay Cyber-Safe  Think twice before clicking on links or opening attachment.  Verify request for private information.  Never reveal your password to anyone.  Protect your stuff.  Keep your devices, browsers, and apps up to date.  Back up critical files.  Delete sensitive information when it is no longer needed.  If it’s suspicious, report it!
  • 9. Types Of Cyber Attacks  Denial-of-service(DoS) and distributed denial-of-srvice(DDoS) attacks.  Man-in-the-middle(MitM) attack.  Phishing and spear phishing attacks.  Drive-by attack.  Password attack.  SQL injection attack.  Cross-site scripting(XSS) attack.  Eavesdropping attack.
  • 10. Key Elements of Cyber Security Key Elements of Cyber Security Application Security Information Security Network Security Disaster Recover Operational Security End user Education
  • 11. Tools used for Cyber Security Passwords Firewalls Anti-virus/ Anti-malware software Encryption Authentication
  • 12. Conclusion…  We are living in digital era and digital technology has transformed our lives promoting the needs of cyber security.