0% found this document useful (0 votes)
145 views10 pages

Kendriya Vidyalaya Rajkot: Name-Class - Roll-No - Subject - Topic

This document discusses cyber security and provides an introduction, need for cyber security, what it includes, facts and statistics about cyber attacks, how to avoid cyber attacks, benefits of managing cyber security, and India's cyber security strategy. It defines cyber security as protecting networks, programs and data from attacks or unauthorized access. The main things cyber security aims to control are unauthorized access, deletion and modification, which relate to the CIA triad of confidentiality, integrity and availability.

Uploaded by

iiidddkkk 230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views10 pages

Kendriya Vidyalaya Rajkot: Name-Class - Roll-No - Subject - Topic

This document discusses cyber security and provides an introduction, need for cyber security, what it includes, facts and statistics about cyber attacks, how to avoid cyber attacks, benefits of managing cyber security, and India's cyber security strategy. It defines cyber security as protecting networks, programs and data from attacks or unauthorized access. The main things cyber security aims to control are unauthorized access, deletion and modification, which relate to the CIA triad of confidentiality, integrity and availability.

Uploaded by

iiidddkkk 230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Kendriya Vidyalaya Rajkot

• NAME- SAHIL GAJERA


• CLASS- XII-C
• ROLL-NO -12308
• SUBJECT- IMFORMATICS PRACTICES
• TOPIC- CYBER SECURITIES

--{2020-2021}--
INTRODUCTION

* Cyber security refers to a set of techniques So when talking about cyber security, one might
used to protect the integrity of networks, wonder “What are we trying to protect ourselves
programs and data from attack, damage or against?” Well, there are three main aspects we are
unauthorized access. trying to control, name:
From a computing point of view, security
comprises cyber security and physical security • Unauthorized Access
— both are used by enterprises to protect • Unauthorized Deletion
against unauthorized access to data centers and • Unauthorized Modification
other computerized systems. Information
security, which is designed to maintain the  These three terms are synonymous with the very
confidentiality, integrity, and availability of commonly known CIA triad which stands for
data, is a subset of cyber security. The use of Confidentiality, Integrity, and Availability. The CIA
cyber security can help prevent cyber attacks, triad is also commonly referred to as the three pillars
data breaches, and identity theft and can aid in of security and most of the security policies of an
risk management. organization are built on these three principles. 
NEED OF CYBER SECURITY

 Keep Your Software Up to Date. ...


 Use Anti-Virus Protection & Firewall. ...
 Use Strong Passwords & Use a Password Management Tool. ...
 Use Two-Factor or Multi-Factor Authentication. ...
 Learn about Phishing Scams – be very suspicious of emails, phone
calls, and flyers.
  Protect Your Sensitive Personal Identifiable Information (PII)
 Use Your Mobile Devices Securely
  Backup Your Data Regularly
 Don’t Use Public Wi-Fi
 Review Your Online Accounts & Credit Reports Regularly for
Changes
WHAT IT INCLUDES?
• Illegal interception, access.
• System, Data interference.
• Misuse of devices.
FACTS
* There is hacker attack every in 39 seconds.
* 43% of cyber attacks focuses on small business.
* 95%of cyber security breaches are due to human error.
* Only 38% of global organizations'claim they are prepared
to handled cyber attack.
* USA has more number of cyber attack.
STATISTICS
TOP 10 COUNTRIES AFFECTED ATTACKS
(2015-17) TARGRT AFFECTED
S.N0 COUNTRY ATTACKS
(%)
1 USA 38
SOUTH
TAI KOREA
2 INDIA 17 WAN
3 JAPAN 11 JAPA
N USA
4 TAIWAN 7

5 SOUTH 6
KOREA

IN-
DIA
HOW TO AVOID CYBER ATTACK ?
 Train employees about cyber security principles.
Install, use and regularly update antivirus and antispyware
software on every computer used in your business.
Use a firewall for your internet connection .
Download and install software updates for your operating
system and applications as they become available.
Make backup copies of important business data and
information's
Benefits of managing cyber security ?
• Protect networks and data from unauthorized access.
• Improved information security and business continuity management.
• Improved stakeholder confidence in your information security
arrangements.
• Improved company credentials with the correct security controls in
place.
• Faster recovery times in the event of a breach.
CYBER SECURITY STRATEGY -INDIA
IT ACT – 2000
SECTION - 43 (DATA WITHOUT PERMISSON)
SECTION - 65 (TAMPERING)
SECTION - 66 (HACKING)
SECTION - 72 ( PRIVACY)
CONCLUTION
• Computer security attempts to ensure the
confidentiality, integrity, and availability of
computing systems and their components.
• Three principal parts of a computing system are
subject to attacks: hardware, software, and data.
• These three, and the communications among them,
are susceptible to computer security
vulnerabilities. In turn, those people and systems
interested in compromising a system can device
attacks that exploit the vulnerabilities.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy