SlideShare a Scribd company logo
6
Most read
7
Most read
9
Most read
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Malware protection:
To analyze attack codes malware protection
program is established.
Internet gateway and firewalls:
It watch out all the network entrance. All the
malicious software trying to enter to secure
network are drained to block and detect the
malware activities web filtering, firewall
policies and content checking are used.
Secure configuration: Hardware devices,
operating system are designed with low
security
Patch management: In software program it is
the latest version to prevent infected software
programs.
User access control: Normal user’s privileges
are limited by providing access control policy.
Techniques
used in
Cyber
security
Malicious attacks:
This is used by cyber criminals to delete, modify and alter a secure
data which is known as malwares. E.g. of malwares are:
Spyware:
Overall computer control are taken down in which personal
information are collected without users knowledge.
Viruses:
Files or computer information are corrupted or modified. By a single
software program the virus enter to the system. From one computer
to the other the virus spread by attacking the files in the computer.
Password attacks:
On cracking user’s password the attacks are focused. By following
alphanumeric procedure the user must protect the password.
APPLICATIONS OF CYBER SECURITY PROJECT
CYBER SECURITY
Types of cyber Attack
• Cyber war: Cyber wars are carried out by nation for the
purpose of disturbing and hacking data’s of
neighbouring countries. Advanced persistent threats are
used for extracting the countries data.
• Cybercrime: Group of members or individuals are
attempt cyber crime with an attitude to extract money.
In place of credit & debit card hacking or the crack
online password cyber crime occurs.
• Cyber threats: For illegal activities criminals, spies and
terrorists use cyber based technology as to manipulate
the data, to deny the distributed services or attack a
systems security.
9 D’s Concepts in Cyber
Security
• Cyber security projects use 9D’s concept to avoid
DDoS attack problems. 9D’s are
• Deter attacks,
• Detect attacks,
• Drive up difficulty,
• Differentiate protections,
• Dig beneath the threat,
• Diffuse protection throughout the payload,
• Distract with decoys,
• Divert attackers to other targets,
• Depth of defence.
Pranavi verma-cyber-security-ppt

More Related Content

PPTX
Cyber security
PPTX
Cyber security
PPTX
cyber security
PPTX
Cyber security
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
CYBER SECURITY
PPTX
Cyber security presentation
Cyber security
Cyber security
cyber security
Cyber security
Cyber security system presentation
Cyber security
CYBER SECURITY
Cyber security presentation

What's hot (20)

PDF
1. introduction to cyber security
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Cyber Security A Challenges For Mankind
PPT
Information security management
PPTX
Ransomware
PPTX
Cyber Security Introduction.pptx
PPT
Information security in todays world
PPTX
Introduction to cyber security amos
PPTX
PPTX
Cybersecurity 2 cyber attacks
PPTX
Cyber security
PPTX
Types of cyber attacks
PPTX
Cyber security
PPTX
Cyber Security in Society
PPTX
CYBER SECURITY
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Cyber Security
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cybercrime and Security
1. introduction to cyber security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cyber Security A Challenges For Mankind
Information security management
Ransomware
Cyber Security Introduction.pptx
Information security in todays world
Introduction to cyber security amos
Cybersecurity 2 cyber attacks
Cyber security
Types of cyber attacks
Cyber security
Cyber Security in Society
CYBER SECURITY
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security
Cyber security
Cyber security
Cybercrime and Security
Ad

Similar to Pranavi verma-cyber-security-ppt (20)

PDF
Cyber Security Matters a book by Hama David Bundo
PPT
cyber terrorism
PPT
cyber terrorism
PPTX
module 3 of cybersecurity of first year students
PPTX
Data security
PPTX
What is Cyber & information security.pptx
PPTX
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
PPTX
Orientation 28 sep education purpose only.pptx
PPTX
Computer security concepts
PPTX
Ppt on cyber security
PPTX
Hacker risks presentation to ACFE PR Chapter
PPTX
Cysec.pptx
PDF
Different Types Of Cyber Security Threats
DOCX
Cyber Security.docx
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PPTX
Cyber Security Fundamentals and Ethical hackingpptx
PPTX
Cyber Security PPT.pptx
PPTX
Cyber Security PPT.pptx
Cyber Security Matters a book by Hama David Bundo
cyber terrorism
cyber terrorism
module 3 of cybersecurity of first year students
Data security
What is Cyber & information security.pptx
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Orientation 28 sep education purpose only.pptx
Computer security concepts
Ppt on cyber security
Hacker risks presentation to ACFE PR Chapter
Cysec.pptx
Different Types Of Cyber Security Threats
Cyber Security.docx
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Cyber Security Fundamentals and Ethical hackingpptx
Cyber Security PPT.pptx
Cyber Security PPT.pptx
Ad

More from PranaviVerma (20)

PPT
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
PPTX
It(402) class ix projects solution 2-pranavi verma
PPTX
It(402) class ix projects solution 5 pranavi verma
PPTX
Pranavi verma 9a-9125-sst ppt
PPTX
Sst geo climate pranavi verma
PPTX
Enterpreneureurial skills class-9-pranavi-verma
PPTX
Ict basic-skills-pranavi-verma
PPTX
Pranavi verma-class-9-communication-skills
PPTX
Pranavi verma-class-9-digital-presentation
PPTX
Pranavi verma-class-9-email-messaging
PPTX
Pranavi verma-class-9-green skills(1)
PPTX
Pranavi verma-class-9-mastering-typing
PPTX
Pranavi verma-class-9-spreadsheet
PPTX
Pranavi verma-class-9-word-processing
PPTX
Pranavi verma-fundamental unit of computer
PPTX
Matter in our surroundigs-pranavi-verma
PPTX
Pranavi verma-it 402 class ix-unit 11_presentation
PPTX
Food Security in India class 9 CBSE
PPSX
Ncc notes and important topics
PPTX
Bond of love
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
It(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 5 pranavi verma
Pranavi verma 9a-9125-sst ppt
Sst geo climate pranavi verma
Enterpreneureurial skills class-9-pranavi-verma
Ict basic-skills-pranavi-verma
Pranavi verma-class-9-communication-skills
Pranavi verma-class-9-digital-presentation
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-mastering-typing
Pranavi verma-class-9-spreadsheet
Pranavi verma-class-9-word-processing
Pranavi verma-fundamental unit of computer
Matter in our surroundigs-pranavi-verma
Pranavi verma-it 402 class ix-unit 11_presentation
Food Security in India class 9 CBSE
Ncc notes and important topics
Bond of love

Recently uploaded (20)

PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Trump Administration's workforce development strategy
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
IGGE1 Understanding the Self1234567891011
PDF
Computing-Curriculum for Schools in Ghana
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
HVAC Specification 2024 according to central public works department
Indian roads congress 037 - 2012 Flexible pavement
FORM 1 BIOLOGY MIND MAPS and their schemes
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Computer Architecture Input Output Memory.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
Paper A Mock Exam 9_ Attempt review.pdf.
A powerpoint presentation on the Revised K-10 Science Shaping Paper
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Trump Administration's workforce development strategy
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
B.Sc. DS Unit 2 Software Engineering.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
IGGE1 Understanding the Self1234567891011
Computing-Curriculum for Schools in Ghana
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
HVAC Specification 2024 according to central public works department

Pranavi verma-cyber-security-ppt

  • 7. Malware protection: To analyze attack codes malware protection program is established. Internet gateway and firewalls: It watch out all the network entrance. All the malicious software trying to enter to secure network are drained to block and detect the malware activities web filtering, firewall policies and content checking are used. Secure configuration: Hardware devices, operating system are designed with low security Patch management: In software program it is the latest version to prevent infected software programs. User access control: Normal user’s privileges are limited by providing access control policy. Techniques used in Cyber security
  • 8. Malicious attacks: This is used by cyber criminals to delete, modify and alter a secure data which is known as malwares. E.g. of malwares are: Spyware: Overall computer control are taken down in which personal information are collected without users knowledge. Viruses: Files or computer information are corrupted or modified. By a single software program the virus enter to the system. From one computer to the other the virus spread by attacking the files in the computer. Password attacks: On cracking user’s password the attacks are focused. By following alphanumeric procedure the user must protect the password.
  • 9. APPLICATIONS OF CYBER SECURITY PROJECT CYBER SECURITY
  • 10. Types of cyber Attack • Cyber war: Cyber wars are carried out by nation for the purpose of disturbing and hacking data’s of neighbouring countries. Advanced persistent threats are used for extracting the countries data. • Cybercrime: Group of members or individuals are attempt cyber crime with an attitude to extract money. In place of credit & debit card hacking or the crack online password cyber crime occurs. • Cyber threats: For illegal activities criminals, spies and terrorists use cyber based technology as to manipulate the data, to deny the distributed services or attack a systems security.
  • 11. 9 D’s Concepts in Cyber Security • Cyber security projects use 9D’s concept to avoid DDoS attack problems. 9D’s are • Deter attacks, • Detect attacks, • Drive up difficulty, • Differentiate protections, • Dig beneath the threat, • Diffuse protection throughout the payload, • Distract with decoys, • Divert attackers to other targets, • Depth of defence.