SlideShare a Scribd company logo
Introduction to
Cyber Security
Introduction to Cyber Security
• Cyber space:Virtual space created by computer networks in which
people can
communicate
• Cyber security:Technologies and processes used to protect computers,
data and
networks from unauthorised access of data
• Cyber crime:Any crime carried out by using computers or the
internet
• Cyber attack:Unauthorised access of private or confidential information
contained on computer network or system
• Cyber forensics:The application of scientifically proven methods to
collect,interprets,process and uses digital evidences to provide a conclusive
description of cyber crime activities
• Cyber law:Cyber law or IT law is referred to as “LAW OF THE INTERNET”.It
is a legal system designed to deal with internet-related legal issues.
CYBER+SECURITY
Protecting systems,networks,applications and information
Technology that includes networks and data
Why is Cyber Security important?
• Safety of data and information
• Data breaching
• Saves networks from intruders
• Prevent damages and threats to businesses
Objectives of cyber security
1. Protect confidentiality of data
2. Preserve the integrity of data
3. Promote the availability of data to authorised users
CIA Model:
I
C
A
1.Confidentiality
• Cryptography
• Two factor authentication
• Biometric verification
• Security token(portable devices)
2.Integrity:
Refers to protecting data from being modified by
unauthorized parties.
If occured recover quickly from such event
3.Availability:
Ensures availability to authorised persons
Types of Cyber Security
• Network security
• Application security
• Information or data security
• Mobile security
• Cloud Security
• Operational security
• Identity management
Cyber security vs information security
• Cyber security is often confused with information security.
• Cyber security focuses on protecting computer systems
from unauthorised access or being otherwise damaged or
made inaccessible.
• Information security is a broader category that protects all
information assets, whether in hard copy or digital form.
Internet Governance
• Internet governance refers to the rules, policies,
standards and practices that coordinate and shape global
cyberspace.
• The Internet is a vast network of independently-managed
networks, woven together by globally standardized data
communication protocols (primarily, Internet Protocol,
TCP, UDP, DNS and BGP).
The challenges of Internet governance
• Cyber Threats
• Cyberwarfare
Cyber threats
• A cyber or cyber security threat is a malicious act that
seeks to damage data, steal data, or disrupt digital life in
general.
• Cyber threats include computer viruses, data breaches,
Denial of Service (DoS) attacks, and other attack vectors.
Cyberwarfare
• Cyberwarfare is the use of cyber attacks against a nation-
state, causing it significant harm, up to and including
physical warfare, disruption of vital computer systems and
loss of life.
Types of cyberwarfare attacks
Destabilization
• In recent years, cybercriminals have been attacking governments
through critical infrastructure, including such entities as transportation
systems, banking systems, power grids, water supplies, dams and
hospitals. The adoption of the internet of things makes the
manufacturing industry increasingly susceptible to outside threats.
• From a national security perspective, destabilizing critical digital
infrastructure inflicts damage on vital modern services or processes.
• For example, an attack on the energy grid could have massive
consequences for the industrial, commercial and private sectors.
Sabotage
• Cyber attacks that sabotage government computer
systems can be used to support conventional warfare
efforts. Such attacks can block official government
communications, contaminate digital systems, enable the
theft of vital intelligence and threaten national security.
State-sponsored or military-sponsored attacks,
• for example, may target military databases to get
information on troop locations, weapons and equipment
being used.
Data theft
• Cybercriminals hack computer systems to steal data that
can be used for intelligence, held for ransom, sold, used
to incite scandals and chaos, or even destroyed.
Cyber Crime
• The crime that involves and uses computer devices and
Internet, is known as cybercrime. Cybercrime can be
committed against an individual or a group; it can also be
committed against government and private organizations.
It may be intended to harm someone‘s reputation,
physical harm, or even mental harm.
• Cybercrime can cause direct harm or indirect harm to
whoever the victim is. However, the largest threat of
cybercrime is on the financial security of an individual as
well as the government.
Types of Cybercrime
Hacking
• It is an illegal practice by which a hacker breaches the
computer‘s security system of someone for personal
interest.
Unwarranted mass-surveillance
• Mass surveillance means surveillance of a substantial
fraction of a group of people by the authority especially for
the security purpose, but if someone does it for personal
interest, it is considered as cybercrime.
Child grooming
• It is the practice of establishing an emotional connection
with a child especially for the purpose of child-trafficking
and child prostitution.
Copyright infringement
• If someone infringes someone‘s protected copyright
without permission and publishes that with his own name,
is known as copyright infringement.
Money laundering
Illegal possession of money by an individual or an
organization is known as money laundering. It typically
involves transfers of money through foreign banks and/or
legitimate business. In other words, it is the practice of
transforming illegitimately earned money into the legitimate
financial system.
Cyber terrorism
• Cyber terrorism can be explained as internet terrorism. With the advent
of the internet, individuals and groups are misusing the anonymity to
threaten individuals, certain groups,religions, ethnicities or beliefs.
• Cyberterrorism can be broadly categorized under three major
categories:
• Simple: This consists of basic attacks including the hacking of an
individual system.
• Advanced: These are more sophisticated attacks and can involve
hacking multiple systems and/or networks.
• Complex: These are coordinated attacks that can have a large-scale
impact and make use of sophisticated tools.

More Related Content

PDF
Module 1 Introduction to cryptography...
PPTX
Cyber crime ppt
PPTX
introduction of Cyber securit
PPTX
Cyber Security in internet and computer science.pptx
PPTX
cs computer notes of studies in education
PPTX
Cyber crime perspective, definition types, various forms of cyber crime
PPTX
ICT RISK Analysis for Begginer Student in ICT
PPTX
Information Communication Technology Risk
Module 1 Introduction to cryptography...
Cyber crime ppt
introduction of Cyber securit
Cyber Security in internet and computer science.pptx
cs computer notes of studies in education
Cyber crime perspective, definition types, various forms of cyber crime
ICT RISK Analysis for Begginer Student in ICT
Information Communication Technology Risk

Similar to Introduction to cyber security presentation (20)

PPTX
Cyber Security Concepts, layers of security,
PPT
CYBER CRIME AND SECURITY
PPTX
Cyber security
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Cyber-crime and cyber security PPT.pptx
PPTX
PPTX
Cyber crime-140128140443-phpapp02 (1)
PDF
Cyber Crime and Security ppt by Neeraj Ahirwar
PPTX
CLE-Cyber crimes.pptx
PPTX
Cyber Crime and Security (Ways to protect yourself on the internet)
PPSX
Unit 1
PDF
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
PPTX
Cyber crimes and its security
PPTX
Cyber crimes and its security
PPTX
Cybersecurity2021
PPTX
Cyber_Security_Updated_Presentation.pptx
PPTX
Module 1- Introduction to Cybercrime.pptx
PPTX
Information Security
PDF
Cyber Security Intelligence
PPT
Cyber Security and Cyber Awareness
Cyber Security Concepts, layers of security,
CYBER CRIME AND SECURITY
Cyber security
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber-crime and cyber security PPT.pptx
Cyber crime-140128140443-phpapp02 (1)
Cyber Crime and Security ppt by Neeraj Ahirwar
CLE-Cyber crimes.pptx
Cyber Crime and Security (Ways to protect yourself on the internet)
Unit 1
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
Cyber crimes and its security
Cyber crimes and its security
Cybersecurity2021
Cyber_Security_Updated_Presentation.pptx
Module 1- Introduction to Cybercrime.pptx
Information Security
Cyber Security Intelligence
Cyber Security and Cyber Awareness
Ad

More from krishkiran2408 (15)

PPTX
Introduction to Network Security presentation
PPTX
Introduction to Information security ppt
PPTX
Introduction to Information security ppt
PPTX
Introduction to datastructures presentation
PPTX
Introduction to cyber security presentation
PPTX
State and private sectors in cyberspace ppt
PPTX
International law of cybersecurity presentation
PPTX
Introduction to Cyber security presentation
PPTX
State and private sectors in cyberspaces
PPTX
International law on cyber security presentation
PPTX
State and Private sectors in cyberspaces
PPTX
International law of cyber security presentation
PPTX
Introduction to cyber security presentation
PDF
WebTechnology Powerpointpresentation.pdf
PPTX
Advanced relationships.Object oriented analysis&Designpptx
Introduction to Network Security presentation
Introduction to Information security ppt
Introduction to Information security ppt
Introduction to datastructures presentation
Introduction to cyber security presentation
State and private sectors in cyberspace ppt
International law of cybersecurity presentation
Introduction to Cyber security presentation
State and private sectors in cyberspaces
International law on cyber security presentation
State and Private sectors in cyberspaces
International law of cyber security presentation
Introduction to cyber security presentation
WebTechnology Powerpointpresentation.pdf
Advanced relationships.Object oriented analysis&Designpptx
Ad

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Institutional Correction lecture only . . .
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Basic Mud Logging Guide for educational purpose
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Renaissance Architecture: A Journey from Faith to Humanism
Microbial disease of the cardiovascular and lymphatic systems
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
RMMM.pdf make it easy to upload and study

Introduction to cyber security presentation

  • 2. Introduction to Cyber Security • Cyber space:Virtual space created by computer networks in which people can communicate • Cyber security:Technologies and processes used to protect computers, data and networks from unauthorised access of data • Cyber crime:Any crime carried out by using computers or the internet • Cyber attack:Unauthorised access of private or confidential information contained on computer network or system
  • 3. • Cyber forensics:The application of scientifically proven methods to collect,interprets,process and uses digital evidences to provide a conclusive description of cyber crime activities • Cyber law:Cyber law or IT law is referred to as “LAW OF THE INTERNET”.It is a legal system designed to deal with internet-related legal issues.
  • 4. CYBER+SECURITY Protecting systems,networks,applications and information Technology that includes networks and data
  • 5. Why is Cyber Security important? • Safety of data and information • Data breaching • Saves networks from intruders • Prevent damages and threats to businesses
  • 6. Objectives of cyber security 1. Protect confidentiality of data 2. Preserve the integrity of data 3. Promote the availability of data to authorised users CIA Model: I C A
  • 7. 1.Confidentiality • Cryptography • Two factor authentication • Biometric verification • Security token(portable devices)
  • 8. 2.Integrity: Refers to protecting data from being modified by unauthorized parties. If occured recover quickly from such event 3.Availability: Ensures availability to authorised persons
  • 9. Types of Cyber Security • Network security • Application security • Information or data security • Mobile security • Cloud Security • Operational security • Identity management
  • 10. Cyber security vs information security • Cyber security is often confused with information security. • Cyber security focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible. • Information security is a broader category that protects all information assets, whether in hard copy or digital form.
  • 11. Internet Governance • Internet governance refers to the rules, policies, standards and practices that coordinate and shape global cyberspace. • The Internet is a vast network of independently-managed networks, woven together by globally standardized data communication protocols (primarily, Internet Protocol, TCP, UDP, DNS and BGP).
  • 12. The challenges of Internet governance • Cyber Threats • Cyberwarfare
  • 13. Cyber threats • A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. • Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack vectors.
  • 14. Cyberwarfare • Cyberwarfare is the use of cyber attacks against a nation- state, causing it significant harm, up to and including physical warfare, disruption of vital computer systems and loss of life.
  • 15. Types of cyberwarfare attacks Destabilization • In recent years, cybercriminals have been attacking governments through critical infrastructure, including such entities as transportation systems, banking systems, power grids, water supplies, dams and hospitals. The adoption of the internet of things makes the manufacturing industry increasingly susceptible to outside threats. • From a national security perspective, destabilizing critical digital infrastructure inflicts damage on vital modern services or processes. • For example, an attack on the energy grid could have massive consequences for the industrial, commercial and private sectors.
  • 16. Sabotage • Cyber attacks that sabotage government computer systems can be used to support conventional warfare efforts. Such attacks can block official government communications, contaminate digital systems, enable the theft of vital intelligence and threaten national security. State-sponsored or military-sponsored attacks, • for example, may target military databases to get information on troop locations, weapons and equipment being used.
  • 17. Data theft • Cybercriminals hack computer systems to steal data that can be used for intelligence, held for ransom, sold, used to incite scandals and chaos, or even destroyed.
  • 18. Cyber Crime • The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone‘s reputation, physical harm, or even mental harm. • Cybercrime can cause direct harm or indirect harm to whoever the victim is. However, the largest threat of cybercrime is on the financial security of an individual as well as the government.
  • 19. Types of Cybercrime Hacking • It is an illegal practice by which a hacker breaches the computer‘s security system of someone for personal interest. Unwarranted mass-surveillance • Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime.
  • 20. Child grooming • It is the practice of establishing an emotional connection with a child especially for the purpose of child-trafficking and child prostitution. Copyright infringement • If someone infringes someone‘s protected copyright without permission and publishes that with his own name, is known as copyright infringement.
  • 21. Money laundering Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system.
  • 22. Cyber terrorism • Cyber terrorism can be explained as internet terrorism. With the advent of the internet, individuals and groups are misusing the anonymity to threaten individuals, certain groups,religions, ethnicities or beliefs. • Cyberterrorism can be broadly categorized under three major categories: • Simple: This consists of basic attacks including the hacking of an individual system. • Advanced: These are more sophisticated attacks and can involve hacking multiple systems and/or networks. • Complex: These are coordinated attacks that can have a large-scale impact and make use of sophisticated tools.