0% found this document useful (0 votes)
615 views16 pages

Cyber Security

Uploaded by

nanditha0510
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
615 views16 pages

Cyber Security

Uploaded by

nanditha0510
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

CHRISTU JYOTHI

INSTITUTE OF TECHNOLOGY AND SCIENCE


CYBER SECURITY

DONE BY
Contents :
 Introduction
 What is cyber security
 Types of Cyber Security
 Importance of cyber security
 Advantages of cyber security
 And Disadvantages
 Types of Cyber Crime
 Safety Tips to Cyber Crime
 Benefits of managing cyber security
Introduction
 “CYBER SECURITY” is the protection of internet connected
system including hardware , software and program or data
from of cyber attacks .
 The internet in India is growing rapidly . There are two sides
to a coin. Internet also has it’s own disadvantages in cyber
crime-illegal activity committed on the internet.
 Cyber security refers to the technologies and processes
designed to protect computers , networks and data from
unauthorized access and attacks delivered via the internet by
cyber Criminals. Through , cyber security is important for
the network ,data and applications security.
 The objective of cyber security is to establish rules and
measure to use against attacks over the internet.
 Crime committed using a computer and the internet to steal
a person’s identity or illegal imports or malicious programs.
cyber crime is an activity done using computers and the
internet.
~ WHAT IS CYBER SECURITY ?

o Cyber security , or information technology


security is the protection of computer system
and networks from the theft of or damage to
their hardware ,software or electronic data as
well as from the disruption or misdirection of
the services they provide.
~TYPES OF CYBER
SECURITY
 Cyber security can be categorized
into five distinct types:
 Application Security
 Network Security
 Infrastructure Security
 Internet of Things{IOT}
 Cloud security
# Importance of cyber security

 It is important because
government ,military ,corporate ,fin
ancial and medical organizations
collect ,process and store
unprecedented amount of data on
computers and other devices
# Advantages of cyber security
 Internet security process all the incoming
and outgoing data on our computer.
 The security developers will update their
database every week once. Hence the
new virus also detected.
 It will defend us from hacks and virus. It
helps us to browse the safe website.
 The applications of cyber security used in
our PC needs update every week.
 The cyber security will defend us from
critical attacks.
#
DISADVANTAGES
 Cyber security can be too expensive
for businesses.
 Cyber security can be too
complicated for businesses.
 Cyber security requires constant
monitoring.
 Cyber security is not one-time thing
 Cyber security can be too risky for
businesses.
#Types of cyber crime

 Hacking
 Spam Email
 Denial of Services
 Phishing
 Ransom ware
 Spyware , Adware
 Malware(Trojan ,Virus , worms etc.)
 ATM skimming and point of scale crimes
#hacking
 Hacking in simple terms mean an illegal
intrusion into a computer system and/or
network.
 It is also known as cracking.
Government websites are the hot
targets of the hackers du to the press
coverage , it receives.
# Spam
 Email email
spam is the electronic version
of junk mail. It involves sending
unwanted messages, often
unsolicited advertising, to a large
number of recipients . Spam is a
serious security concern as it can be
used to deliver Trojan horses,
viruses, worms, spyware, and
targeted phishing attacks.
# Safety tips to cyber crime

 Use antivirus software.


 Insert firewalls.
 Uninstall unnecessary software.
 Maintain backup.
 Checks security settings.
 Never give your full name or address to
strangers.
 Learn more about the internet privacy.
# Benefits of managing cyber security
 Protect networks and data from unauthorized
access.
 Improved information security and business
continuity management.
 Improved stakeholder
confidence in your
information security
arrangements.
 Improved company
credentials with the
correct security
controls in place.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy