Cyber security
P R E S E N T E D B Y: -
BEAULA R
S O W M I YA N
III YEAR- ECE
D R S I VA N T H I A D I TA N A R C O L L E G E O F E N G I N E E R I N G
TIRUCHENDUR
OBJECTIVES
Introduction
Categories of Cyber Crime
Types of Cyber Crime
Advantages of Cyber Security
Safety tips to Cyber Crime
Case Study
INTRODUCTION
Cybersecurity refers to the protection of internet-connected systems
such as hardware, software, and data from unauthorized access, theft,
damage, or disruption. It involves implementing measures and
practices to safeguard against cyber threats and vulnerabilities.
Cybersecurity includes various domains such as network security,
application security, endpoint security, and cloud security. Effective
cybersecurity measures aim to prevent, detect, and respond to cyber
attacks and data breaches. In today's interconnected world,
cybersecurity is critical for businesses, governments, and individuals
to protect sensitive information and maintain trust.
Inbox
WHAT IS CYBER SECURITY?
Cyber Security is a process that's designed to protect networks and
devices from external threats. Businesses typically employ Cyber Security professionals
to protect their confidential information, maintain employee productivity, and enhance
customer confidence in products and services.
Cyber Security also known as information technology (IT) security,
cybersecurity measures are designed to combat threats against networked systems and
applications, whether those threats originate from inside or outside of an organization
Categories of Cyber Crime
We can categorize cyber crime in two ways:-
The computer as a target : Using a computer to attacks other computer
(e.g.) Hacking, Virus/Worms attacks, Dos attack etc.
The computer as a weapon : Using a computer to commit real world crime
(e.g.) Credit card fraud etc.
TYPES OF CYBER CRIME
Spam Email
Security Hacker
Malware
Spyware
Identity Theft
Spam Email
Spam emails are sent out in mass quantities by spammers and cybercriminals that
are looking to do one or more of the following: Make money from the small
percentage of recipients that actually respond to the message. Run phishing scams
in order to obtain passwords, credit card numbers, bank account details and more.
Security Hacker
A security hacker is someone who explores methods for breaching defenses and
exploiting weaknesses in a computer system or network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, information gathering,
challenge, recreation , or evaluation of a system weaknesses to assist in formulating
defenses against potential hackers.
Malware
Malware is a catch-all term for any type of malicious software designed to harm or
exploit any programmable device, service or network. Cybercriminals typically use
it to extract data that they can leverage over victims for financial gain.
Spyware
Spyware is malicious software that enters a user’s computer, gathers data from the
device and user, and sends it to third parties without their consent. A commonly
accepted spyware definition is a strand of malware designed to access and damage
a device without the user’s consent.
Identify Theft
Identity theft can also result from rudimentary tactics with
criminals stealing mail, digging through dumpsters, and listening
in on phone conversations in public places. The ultimate goal of
many cyber attacks is to steal enough information about a victim
to assume their identity to commit fraudulent activity.
Advantages of Cyber Security
It will defend us from hacks and virus. It helps us to browse the safe website.
Internet Security process all the incoming and outgoing data on our computers.
The Cyber Security will defend us from critical attacks.
The application of cyber security used in our PC needs update every week.
The security developers will update their database every week once. Hence the new virus also detected.
Safety Tips of Cyber Crime
Use Antivirus Software.
Insert Firewalls.
Uninstall unnecessary Software.
Maintain backup.
Check security settings.
Never give your full name or address to strangers.
Learn more about the Internet privacy.
Case Study
One simple example of a case study in cyber security is the phishing attack that occurred at a small business. Phishing is a
common cyber attack where attackers send fraudulent emails or messages that appear to be from a trusted source, in order
to trick recipients into divulging sensitive information or downloading malware.
In this case, the small business received an email that appeared to be from a vendor they regularly worked with. The email
requested that the business update their payment information, and provided a link to a website where they could do so.
The website looked legitimate, but in reality, it was a fake website created by the attacker .When the business owner
entered their payment information on the fake website, the attacker was able to steal their information and use it to make
fraudulent purchases. The business owner didn't realize they had been tricked until they received their next credit card
statement.
This case study highlights the need for awareness and training around phishing attacks. It's important for individuals and
organizations to be able to recognize the signs of a phishing email, such as misspelled words or suspicious links, and to
verify the authenticity of emails before responding or clicking on links. It also underscores the importance of keeping
systems and software up to date with the latest security patches to prevent attackers from exploiting known vulnerabilitieses.
THANK YOU
HAVE A SECURED WORLD