100% found this document useful (1 vote)
228 views20 pages

Seminar Cyber

The document summarizes a technical seminar on cyber security. It discusses the need for cyber security to protect online data from threats. It provides facts about common cyber attacks and hacking activities. Specific threats like ransomware and phishing are explained in detail. The document also offers advice on password security, public Wi-Fi usage, and how individuals and organizations can better protect themselves from cyber attacks. It concludes by emphasizing that cyber security requires awareness and vigilance from both technology and users.

Uploaded by

yasaswi sony
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
228 views20 pages

Seminar Cyber

The document summarizes a technical seminar on cyber security. It discusses the need for cyber security to protect online data from threats. It provides facts about common cyber attacks and hacking activities. Specific threats like ransomware and phishing are explained in detail. The document also offers advice on password security, public Wi-Fi usage, and how individuals and organizations can better protect themselves from cyber attacks. It concludes by emphasizing that cyber security requires awareness and vigilance from both technology and users.

Uploaded by

yasaswi sony
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

TECHNICAL

SEMINAR 

CYBER SECURITY

Presented by : Polasi Yasaswi 


                           18P71A04B0
Device
Security

CYBER
CCTV

Secure

SECURITY
Payment

Computer Fingerprint
Security

Global
Security
The word Cyber is combining form
relating to Information Technology, the
internet and virtual reality.

INTRODUCTION The term Cyber Security is that the


security offered through online services to
protect online information.
 It helps in securing in securing data from
threats like data theft or misuse.
It safeguards computer from viruses.
NEED OF It secures from Cyber Crime.
Government, corporate, medical, military
CYBER and financial organizations collect ,
SECURITY process and store unprecedented amount
of data on computers and other devices.
To protect systems, computers, and data
from attack, damage and/or unauthorized
access.
There is a hacker  attack every 39 seconds.
43 percent of cyber attacks the small
business.
95 percent of cyber security breaches are
due to the human errors.
Only 38% of global organizations claim
FACTS they are prepared to handle a sophisticated
cyber attack.
USA  has more number of cyber attacks.
Who is doing the hacking?
•Financial (theft, fraud, blackmail)
•Political /state (state level/ military)
•Fame/ kudos (fun/ status)
•Hacktivism (cause)
•Pen testers (legal hacking)
Hacking •Police
•Insider
•Business 
•Normally loaded onto a computer via a
download/attachment/link from an email or
website. 
•Will either lock the screen or encrypt your
data.
Common •Once Ransomware is uploaded on your
computer/tablet/phone it is very difficult to
threats - remove without removing all of the data
Ransomware •Wannacry attack 2017 - One of the biggest
cyber attacks to occur. 
•Is said to have hit 300,000 computers in
150 countries.
•Companies affected include; NHS, Renault,
FedEx, Spanish telecoms and gas
companies, German railways.
•Back up- Keep a backed up copy of your
data. Ensure its not permanently connected
to the network.
•Patch- Keep your software up to date.
Wannacry was successful as those affected
How to tackle computers hadn’t updated. The update
Ransomware  contained a fix for the problem.
•Attachments- Don’t click on links from
emails/SMS as this could easily be from an
untrusted source and contain malware like
Ransomware
Phishing
•Is the attempt to obtain sensitive information by deception.  
•They will be after your login credentials, payment card details or to upload
malware to your computer
•The email will normally impersonate a genuine company or person. 

How to tackle the problem?


•Don’t click any links on an email 
   unless you can guarantee who its from.
•Use a trusted method of contacting the
  company via a phone number, app or website.
•Mark the email as spam and contact the
  organisation.
•May not be trustworthy. They could share
your information to other companies who
operate in countries without any data
protection.
•You may not know who is watching you
whilst you’re online.

Public Wi-Fi What to do and not do to


•Don’t use online banking. Use your own
data.
•Don’t conduct any purchases 
•Use a virtual private network (VPN)
WHO’S IS
RESPONSIBLE FOR
THESE ATTACTS?
6%

China is responsible for the CHINA


highest share of coordinated 7%
21%
attacks, accounting for 21%, USA

followed by the United States BRAZIL


(11%), Brazil (7%), and the 11%
Russian Federation (6%) . RUSSIAN
FEDERAT
ION
Passwords Advice
•Use 1 password per account.
•Three random words is the
NCSC’s advice. Capitals, special
characters and numbers is your
own choice.
•If you follow this advice your
passwords security will be
significantly increased against a
brute force attack.
•Password managers can be
helpful to store your passwords.
HOW TO AVOID CYBER ATTACTS?

1 2 3 4 5

Train employees in cyber Install, use and regularly Use a firewall for your Download and install Make backup copies of
security principles. update antivirus and Internet connection. software updates for your important business data and
antispyware software on operating systems and information.
every computer used in your applications as they become
business. available.
Protects Personal Info
Protects Productivity 
Stop Your Website from Going Down
ADVANTAGES Protect your data
Protection for your customers
IT ACT 2000

CYBER SECTION 43 (Data without


SECURITY permission)

STRATEGY - SECTION  65 (Tampering)


INDIA
SECTION 66  (Hacking)

SECTION 72 (Privacy)
You are the best
defence!

•Technology is only a small part of


Cyber Defence
•You are the most important person
– protect yourself
•For businesses the most important
and best defence is Cyber Security
Aware employees – train your staff 

• Always be aware!
• Always be on your guard!
Reporting Cybercrime
•Online fraud is to be reported
to Action Fraud. They’re the
national reporting mechanism
for fraud. Via;
   www.actionfraud.police.uk 
       Or 0300 123 2040
•Can be reported 24/7 via the
website.
Computer security attempts to ensure
the confidentiality, integrity, and
availability of computing systems and
their components. 
Three principal parts of a computing
system are subject to attacks:
hardware, software, and data. 
CONCLUSION These three, and the communications
among them, are susceptible to
computer security vulnerabilities. In
turn, those people and systems
interested in compromising a system
can devise attacks that exploit the
vulnerabilities.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy