0% found this document useful (0 votes)
33 views21 pages

Cyber Security Webinar

The document outlines key concepts in cyber security, including definitions of cyber space, cyber crime, and the importance of protecting data and networks. It discusses various types of cyber security, security threats, and solutions such as firewalls and intrusion detection systems. Additionally, it highlights India's cyber security strategy and its ranking in global cyber crime incidents.

Uploaded by

krishkiran2408
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views21 pages

Cyber Security Webinar

The document outlines key concepts in cyber security, including definitions of cyber space, cyber crime, and the importance of protecting data and networks. It discusses various types of cyber security, security threats, and solutions such as firewalls and intrusion detection systems. Additionally, it highlights India's cyber security strategy and its ranking in global cyber crime incidents.

Uploaded by

krishkiran2408
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

A Webinar on

Cyber Security
By G.Krishna Kumari
● Cyber space:Virtual space created by computer
networks in which people can communicate
● Cyber security:Technologies and processes used to
protect computers, data and networks from
unauthorised access of data
● Cyber crime:Any crime carried out by using computers
or the internet
● Cyber attack:Unauthorised access of private or
confi dential information contained on computer
network or system
Cyber security
● Technologies and processes used to protect
computers, data and networks from unauthorised
access of data
● Cyber forensics:The application of scientifi cally proven
methods to collect,interprets,process and uses
digital evidences to provide a conclusive description
of cyber crime activities
● Cyber law:Cyber law or IT law is referred to as “LAW
OF THE INTERNET”.It is a legal system designed to
deal with internet-related legal issues.
Why is Cyber Security important?
● Safety of data and information
● Data breaching
● Saves networks from intruders
● Prevent damages and threats
to businesses
Objectives of cyber security
1. Protect confi dentiality of data
2. Preserve the integrity of data
3. Promote the availability of data to authorised users
Types of Cyber Security
● Network security
● Application security
● Information or data security
● Mobile security
● Cloud Security
● Operational security
● Identity management
Security threats
 Virus

 Worms

 Malware

 Trojan horses

 Password cracking
Virus and Worms
● A Virus is a “program that is loaded onto your
computer without your knowledge and runs against
your wishes
Solutions
● Install a security suite that protects the computer
against threats such as viruses and worms.
Hackers
● In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
Types of Hackers
 White Hat Hacker

 Grey Hat Hacker

 Black Hat Hacker


Cryptography

Cryptography is the process of hiding or coding


information so that only the person a message was
intended for can read it.
The art of cryptography has been used to code messages
for thousands of years and continues to be used in bank
cards, computer passwords, and ecommerce.
Intrusion Detection System (IDS)
● Intrusion is when an attacker gets unauthorized
access to a device, network, or system. Cyber
criminals use advanced techniques to sneak into
organizations without being detected.
● Intrusion Detection System (IDS) observes network
traffi c for malicious transactions and sends immediate
alerts when it is observed. It is software that checks a
network or system for malicious activities or policy
violations. Each illegal activity or violation is often
recorded either centrally using an SIEM system or
notifi ed to an administration.
Firewalls
● A fi rewall is a network security device that separates a
trusted internal network from an external network deemed
untrustworthy, such as the internet. It regulates incoming
and outgoing network traffi c based on preset security rules.
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer
crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
India stands 10th in the cyber crime in the world
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy