SlideShare a Scribd company logo
5
Most read
6
Most read
10
Most read
Introduction to
Cyber Security
Introduction to Cyber Security
• Cyber space:Virtual space created by computer networks in which
people can
communicate
• Cyber security:Technologies and processes used to protect computers,
data and
networks from unauthorised access of data
• Cyber crime:Any crime carried out by using computers or the
internet
• Cyber attack:Unauthorised access of private or confidential information
contained on computer network or system
• Cyber forensics:The application of scientifically proven methods to
collect,interprets,process and uses digital evidences to provide a conclusive
description of cyber crime activities
• Cyber law:Cyber law or IT law is referred to as “LAW OF THE INTERNET”.It
is a legal system designed to deal with internet-related legal issues.
CYBER+SECURITY
Protecting systems,networks,applications and information
Technology that includes networks and data
Why is Cyber Security important?
• Safety of data and information
• Data breaching
• Saves networks from intruders
• Prevent damages and threats to businesses
Objectives of cyber security
1. Protect confidentiality of data
2. Preserve the integrity of data
3. Promote the availability of data to authorised users
CIA Model:
I
C
A
1.Confidentiality
• Cryptography
• Two factor authentication
• Biometric verification
• Security token(portable devices)
2.Integrity:
Refers to protecting data from being modified by
unauthorized parties.
If occured recover quickly from such event
3.Availability:
Ensures availability to authorised persons
Types of Cyber Security
• Network security
• Application security
• Information or data security
• Mobile security
• Cloud Security
• Operational security
• Identity management
Cyber security vs information security
• Cyber security is often confused with information security.
• Cyber security focuses on protecting computer systems
from unauthorised access or being otherwise damaged or
made inaccessible.
• Information security is a broader category that protects all
information assets, whether in hard copy or digital form.
Internet Governance
• Internet governance refers to the rules, policies,
standards and practices that coordinate and shape global
cyberspace.
• The Internet is a vast network of independently-managed
networks, woven together by globally standardized data
communication protocols (primarily, Internet Protocol,
TCP, UDP, DNS and BGP).
The challenges of Internet governance
• Cyber Threats
• Cyberwarfare
Cyber threats
• A cyber or cyber security threat is a malicious act that
seeks to damage data, steal data, or disrupt digital life in
general.
• Cyber threats include computer viruses, data breaches,
Denial of Service (DoS) attacks, and other attack vectors.
Cyberwarfare
• Cyberwarfare is the use of cyber attacks against a nation-
state, causing it significant harm, up to and including
physical warfare, disruption of vital computer systems and
loss of life.
Types of cyberwarfare attacks
Destabilization
• In recent years, cybercriminals have been attacking governments
through critical infrastructure, including such entities as transportation
systems, banking systems, power grids, water supplies, dams and
hospitals. The adoption of the internet of things makes the
manufacturing industry increasingly susceptible to outside threats.
• From a national security perspective, destabilizing critical digital
infrastructure inflicts damage on vital modern services or processes.
• For example, an attack on the energy grid could have massive
consequences for the industrial, commercial and private sectors.
Sabotage
• Cyber attacks that sabotage government computer
systems can be used to support conventional warfare
efforts. Such attacks can block official government
communications, contaminate digital systems, enable the
theft of vital intelligence and threaten national security.
State-sponsored or military-sponsored attacks,
• for example, may target military databases to get
information on troop locations, weapons and equipment
being used.
Data theft
• Cybercriminals hack computer systems to steal data that
can be used for intelligence, held for ransom, sold, used
to incite scandals and chaos, or even destroyed.
Cyber Crime
• The crime that involves and uses computer devices and
Internet, is known as cybercrime. Cybercrime can be
committed against an individual or a group; it can also be
committed against government and private organizations.
It may be intended to harm someone‘s reputation,
physical harm, or even mental harm.
• Cybercrime can cause direct harm or indirect harm to
whoever the victim is. However, the largest threat of
cybercrime is on the financial security of an individual as
well as the government.
Types of Cybercrime
Hacking
• It is an illegal practice by which a hacker breaches the
computer‘s security system of someone for personal
interest.
Unwarranted mass-surveillance
• Mass surveillance means surveillance of a substantial
fraction of a group of people by the authority especially for
the security purpose, but if someone does it for personal
interest, it is considered as cybercrime.
Child grooming
• It is the practice of establishing an emotional connection
with a child especially for the purpose of child-trafficking
and child prostitution.
Copyright infringement
• If someone infringes someone‘s protected copyright
without permission and publishes that with his own name,
is known as copyright infringement.
Money laundering
Illegal possession of money by an individual or an
organization is known as money laundering. It typically
involves transfers of money through foreign banks and/or
legitimate business. In other words, it is the practice of
transforming illegitimately earned money into the legitimate
financial system.
Cyber terrorism
• Cyber terrorism can be explained as internet terrorism. With the advent
of the internet, individuals and groups are misusing the anonymity to
threaten individuals, certain groups,religions, ethnicities or beliefs.
• Cyberterrorism can be broadly categorized under three major
categories:
• Simple: This consists of basic attacks including the hacking of an
individual system.
• Advanced: These are more sophisticated attacks and can involve
hacking multiple systems and/or networks.
• Complex: These are coordinated attacks that can have a large-scale
impact and make use of sophisticated tools.

More Related Content

PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
cs computer notes of studies in education
PDF
Module 1 Introduction to cryptography...
PPTX
Cyber Terrorism
PPTX
Presentation (11).pptx
PPTX
Presentation (11).pptx
PPTX
Cyber Space
Cyber security.pptxelectronic systems, networks, and data from malicious
cs computer notes of studies in education
Module 1 Introduction to cryptography...
Cyber Terrorism
Presentation (11).pptx
Presentation (11).pptx
Cyber Space

Similar to Introduction to Cyber security presentation (20)

PDF
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
PPTX
unit -ii security1.pptx for Information system management
PDF
Why Cyber Security Is Needed.pdf
PPTX
Cyber terrorism
PPTX
Cyber Security and data Security for all.pptx
PPTX
Cyber security
PPTX
Cyber Security PPT.pptx
PPT
Cyber Security and Cyber Awareness
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
PPTX
Module 1- Introduction to Cybercrime.pptx
PDF
Presentation 10 (1).pdf
PPTX
Cysec.pptx
PPTX
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PPTX
Changing Landscape in Cyberspace and Cyber Laws.pptx
PPTX
Cyber security by Gaurav Singh
PPTX
Cyber Security PPT.pptx
PPT
Cyberterrorism
PDF
Cyber Security - ICCT Colleges
PPTX
Cyber Security PPT.pptx
PDF
Types of Cybercrime and Its Impact on Society
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
unit -ii security1.pptx for Information system management
Why Cyber Security Is Needed.pdf
Cyber terrorism
Cyber Security and data Security for all.pptx
Cyber security
Cyber Security PPT.pptx
Cyber Security and Cyber Awareness
hgfhvgggggggggggggggggggggggpresent.pptx
Module 1- Introduction to Cybercrime.pptx
Presentation 10 (1).pdf
Cysec.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
Changing Landscape in Cyberspace and Cyber Laws.pptx
Cyber security by Gaurav Singh
Cyber Security PPT.pptx
Cyberterrorism
Cyber Security - ICCT Colleges
Cyber Security PPT.pptx
Types of Cybercrime and Its Impact on Society
Ad

More from krishkiran2408 (15)

PPTX
Introduction to Network Security presentation
PPTX
Introduction to Information security ppt
PPTX
Introduction to Information security ppt
PPTX
Introduction to cyber security presentation
PPTX
Introduction to datastructures presentation
PPTX
Introduction to cyber security presentation
PPTX
State and private sectors in cyberspace ppt
PPTX
International law of cybersecurity presentation
PPTX
State and private sectors in cyberspaces
PPTX
International law on cyber security presentation
PPTX
State and Private sectors in cyberspaces
PPTX
International law of cyber security presentation
PPTX
Introduction to cyber security presentation
PDF
WebTechnology Powerpointpresentation.pdf
PPTX
Advanced relationships.Object oriented analysis&Designpptx
Introduction to Network Security presentation
Introduction to Information security ppt
Introduction to Information security ppt
Introduction to cyber security presentation
Introduction to datastructures presentation
Introduction to cyber security presentation
State and private sectors in cyberspace ppt
International law of cybersecurity presentation
State and private sectors in cyberspaces
International law on cyber security presentation
State and Private sectors in cyberspaces
International law of cyber security presentation
Introduction to cyber security presentation
WebTechnology Powerpointpresentation.pdf
Advanced relationships.Object oriented analysis&Designpptx
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Introduction to Cyber security presentation

  • 2. Introduction to Cyber Security • Cyber space:Virtual space created by computer networks in which people can communicate • Cyber security:Technologies and processes used to protect computers, data and networks from unauthorised access of data • Cyber crime:Any crime carried out by using computers or the internet • Cyber attack:Unauthorised access of private or confidential information contained on computer network or system
  • 3. • Cyber forensics:The application of scientifically proven methods to collect,interprets,process and uses digital evidences to provide a conclusive description of cyber crime activities • Cyber law:Cyber law or IT law is referred to as “LAW OF THE INTERNET”.It is a legal system designed to deal with internet-related legal issues.
  • 4. CYBER+SECURITY Protecting systems,networks,applications and information Technology that includes networks and data
  • 5. Why is Cyber Security important? • Safety of data and information • Data breaching • Saves networks from intruders • Prevent damages and threats to businesses
  • 6. Objectives of cyber security 1. Protect confidentiality of data 2. Preserve the integrity of data 3. Promote the availability of data to authorised users CIA Model: I C A
  • 7. 1.Confidentiality • Cryptography • Two factor authentication • Biometric verification • Security token(portable devices)
  • 8. 2.Integrity: Refers to protecting data from being modified by unauthorized parties. If occured recover quickly from such event 3.Availability: Ensures availability to authorised persons
  • 9. Types of Cyber Security • Network security • Application security • Information or data security • Mobile security • Cloud Security • Operational security • Identity management
  • 10. Cyber security vs information security • Cyber security is often confused with information security. • Cyber security focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible. • Information security is a broader category that protects all information assets, whether in hard copy or digital form.
  • 11. Internet Governance • Internet governance refers to the rules, policies, standards and practices that coordinate and shape global cyberspace. • The Internet is a vast network of independently-managed networks, woven together by globally standardized data communication protocols (primarily, Internet Protocol, TCP, UDP, DNS and BGP).
  • 12. The challenges of Internet governance • Cyber Threats • Cyberwarfare
  • 13. Cyber threats • A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. • Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack vectors.
  • 14. Cyberwarfare • Cyberwarfare is the use of cyber attacks against a nation- state, causing it significant harm, up to and including physical warfare, disruption of vital computer systems and loss of life.
  • 15. Types of cyberwarfare attacks Destabilization • In recent years, cybercriminals have been attacking governments through critical infrastructure, including such entities as transportation systems, banking systems, power grids, water supplies, dams and hospitals. The adoption of the internet of things makes the manufacturing industry increasingly susceptible to outside threats. • From a national security perspective, destabilizing critical digital infrastructure inflicts damage on vital modern services or processes. • For example, an attack on the energy grid could have massive consequences for the industrial, commercial and private sectors.
  • 16. Sabotage • Cyber attacks that sabotage government computer systems can be used to support conventional warfare efforts. Such attacks can block official government communications, contaminate digital systems, enable the theft of vital intelligence and threaten national security. State-sponsored or military-sponsored attacks, • for example, may target military databases to get information on troop locations, weapons and equipment being used.
  • 17. Data theft • Cybercriminals hack computer systems to steal data that can be used for intelligence, held for ransom, sold, used to incite scandals and chaos, or even destroyed.
  • 18. Cyber Crime • The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone‘s reputation, physical harm, or even mental harm. • Cybercrime can cause direct harm or indirect harm to whoever the victim is. However, the largest threat of cybercrime is on the financial security of an individual as well as the government.
  • 19. Types of Cybercrime Hacking • It is an illegal practice by which a hacker breaches the computer‘s security system of someone for personal interest. Unwarranted mass-surveillance • Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime.
  • 20. Child grooming • It is the practice of establishing an emotional connection with a child especially for the purpose of child-trafficking and child prostitution. Copyright infringement • If someone infringes someone‘s protected copyright without permission and publishes that with his own name, is known as copyright infringement.
  • 21. Money laundering Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system.
  • 22. Cyber terrorism • Cyber terrorism can be explained as internet terrorism. With the advent of the internet, individuals and groups are misusing the anonymity to threaten individuals, certain groups,religions, ethnicities or beliefs. • Cyberterrorism can be broadly categorized under three major categories: • Simple: This consists of basic attacks including the hacking of an individual system. • Advanced: These are more sophisticated attacks and can involve hacking multiple systems and/or networks. • Complex: These are coordinated attacks that can have a large-scale impact and make use of sophisticated tools.