Cyber Security
Cyber Security
simple notes and an outline for a cybersecurity presentation with real-world examples:
Cybersecurity is the practice of protecting computer systems, networks, programs, and data from
unauthorized access, damage, or theft. It encompasses a wide range of techniques, technologies, and practices
to safeguard digital assets and ensure the integrity, confidentiality, and availability of information.
This includes preventing malware, hacking, phishing, and other malicious activities that could compromise
systems or data.
Data security:
Network security:
Protecting the infrastructure that connects devices and systems, including firewalls, intrusion detection systems,
and other security measures.
Application security:
Securing software and applications to prevent vulnerabilities that could be exploited by attackers.
Physical security:
Protecting physical devices and infrastructure, such as servers and data centers, from unauthorized access or
damage.
End-user education:
Training individuals to recognize and avoid common cyber threats, such as phishing scams and social
engineering.
Incident response:
Developing plans and procedures for responding to and mitigating cyber incidents.
Adhering to industry standards and legal requirements related to data protection and security.
In essence, cybersecurity is a multi-faceted discipline that requires a combination of technical expertise, security
awareness, and proactive measures to stay ahead of evolving threats. It's a continuous process that involves
monitoring systems, detecting threats, and responding to incidents to protect digital assets and ensure business
continuity
📘 Cybersecurity Notes
1. What is Cybersecurity?
Cybersecurity means protecting computers, phones, and the internet from bad people (hackers).
Just like you lock your house to stay safe, cybersecurity locks your digital life.
🔐 Real-Life Examples
1. Instagram Hack
o Clicked a fake link, and his mom's card got charged ₹5000!
o Example: MyDogIs@Max2025
o Example: School@2025!
Use a password manager like Bitwarden or use the browser’s secure password storage.
o Windows
Use Windows Defender (built into Windows 10/11) or a trusted antivirus like:
o Avast (free)
o Bitdefender
o Kaspersky
✅ Use Google Chrome or Microsoft Edge with Safe Browsing features on.
Look out for spelling errors, weird links, or pressure like “Do this NOW!”
o Gmail/Outlook
o Facebook, Instagram
o Microsoft Account
Follow basic cybersecurity news via YouTube, school tech sessions, or news apps.
💬 Final Tip for Class 10 Students:
"Just like you wouldn't leave your school bag open in a public place, don't leave your PC open to hackers. Lock it,
clean it, and update it!"
Here's a real, simple example of Two-Factor Authentication (2FA) using something your students will recognize
— logging into Instagram:
Username: @coolgamer123
Password: MyCat@2025
“We sent a 6-digit code to your phone number ending in 98. Enter it to continue.”
The student checks their phone and gets a code via SMS (or app like Google Authenticator).
If a hacker guesses or steals your password, they still can't log in without the second code — which is sent only
to your phone.
A type of malicious software that Like a biological virus, it replicates itself and can damage
Virus attaches to programs or files and files, slow down your PC, or crash systems. Needs user
spreads. action (e.g., opening infected file).
Malware that locks or encrypts your Example: You open a bad attachment, and suddenly your
Ransomware data and demands payment to files are encrypted. A message appears demanding money
unlock it. (ransom) to get your files back.
A security system that monitors and Acts like a gatekeeper: blocks unauthorized access while
Firewall controls network traffic based on allowing safe communication. Can be software (on PC) or
rules. hardware (in routers).
Virtual Private Network – encrypts Protects your identity online and lets you browse safely,
VPN your internet connection and hides especially on public Wi-Fi. Can also bypass geographic
your IP. restrictions.
A network device that connects Think of it like a smart connector – it sends data only to the
Switch multiple devices in a local area device it’s meant for, improving speed and security within a
network (LAN). network.
A device that routes data between Connects your LAN to the internet and assigns IP addresses
Router your home or office network and the to devices. Usually includes a firewall and sometimes Wi-Fi
internet. capabilities.
A device that connects your home or Converts digital data into a signal that can be sent over
Modem office to your Internet Service telephone or cable lines and vice versa. Often combined
Provider (ISP). with routers in home setups.
🔒 Cybersecurity & Networking Terms – Trilingual Table (English | Hindi | Gujarati)
વાયરસ: નુકસાનકારક
Malicious software that वायरस: एक हानिकारक
સોફ્ટવેર જે ફાઈલો અથવા
Virus spreads by attaching to सॉफ्टवेयर जो फाइलों या
કાર્યક્રમો સાથે જોડાય
files/programs. प्रोग्राम से फैलता है।
છે.
Malware that locks your data रैनसमवेयर: डेटा को लॉक कर રેન્સમવેર: તમારું ડેટા
Ransomware and demands payment to पैसे की मांग करने वाला લોક કરીને પૈસા માગતો
unlock it. मालवेयर। માલવેર.
સ્વીચ: સ્થાનિક
Connects devices in a local स्विच: लोकल नेटवर्क में
નેટવર્કમાં ડિવાઈસને
Switch network and sends data डिवाइसेज़ को जोड़ता है
જોડે છે અને માહિતી યોગ્ય
efficiently. और डेटा सही जगह भेजता है।
રીતે મોકલે છે.
Routes data between your राउटर: लोकल नेटवर्क और રાઉટર: સ્થાનિક નેટવર્ક
Router local network and the इंटरनेट के बीच डेटा અને ઇન્ટરનેટ વચ્ચે
internet. भेजता है। માહિતી મોકલે છે.
તમે સ્માર્ટફોન, ગેમ્સ, Instagram, YouTube જેવા પ્લેટફોર્મ ઉપયોગ કરો છો – બધું
ઓનલાઈન છે.
1. Instagram હેક
તેનું Instagram એકાઉન્ટ હેક થયું અને અન્ય લોકોને ઠગવા માટે વપરાયું.
તે ફેક લિંક પર ક્લિક કર્યો અને તેની મમ્મીનું કાર્ડ ₹5000 થી ચાર્જ થઈ ગયું!
હેકરે તેનું પાસવર્ડ ચોરી લીધું અને Gmail માં પ્રવેશ મેળવી લીધો.
o ઉદાહરણ: MyDogIs@Max2025
2. વ્યક્તિગત માહિતી શેર ન કરો
o તમારા શાળાનું નામ, ફોન નંબર કે સરનામું અજાણ્યા સાથે શેર ન કરો.
તમે કોડ દાખલ કરો. હવે તમે લોગિન કરી શકો છો!
જો કોઈને તમારું પાસવર્ડ મળી જાય, તો પણ તેમને તમારું ફોન જોઈએ લોગિન કરવા માટે.
Title: Staying Safe in the Digital World: A Simple Guide to Cyber Security
Visuals:
o Background Image: A diverse group of friendly, smiling people (various ages, ethnicities) happily
using modern digital devices (smartphones, laptops, tablets) in everyday settings (park, home,
cafe). The background should be clean and bright.
o Overlay Icon: A subtle, transparent cyber security shield or padlock icon subtly superimposed
over the digital devices, suggesting protection.
Visuals:
Laptop: With an online shopping cart, email envelope, and banking app icon.
Content/Talking Points:
o "Think about your day: You check messages, shop online, pay bills, watch videos, or connect
with friends."
o "But, just like the real world, the digital world has its own dangers."
Visuals:
Content/Talking Points:
o "Cyber security is like building a strong fort around your digital life."
o "It's about keeping your personal information, photos, money, and identity safe from bad
people online."
Key Message: There are different ways people try to harm you online.
Visuals: Four distinct sections, each with a clear icon and a brief description.
Description: "Nasty software (viruses) that can harm your device or steal your data
without you knowing."
o Section 3: Scammers (Icon: A 'speak no evil' emoji or a person with a cunning smile)
Description: "People who try to trick you into giving them money or information
through lies and false promises."
o Section 4: Hacking (Icon: A masked figure with digital code or a broken padlock)
o "They often try to trick you, scare you, or secretly infect your devices."
Visuals:
o Image: A screenshot of a fake SMS message on a phone screen: "Dear customer, your bank
account will be suspended due to suspicious activity. Click here to verify: [fake link]"
Content/Talking Points:
o What happened: "If you click the link, it goes to a fake website that looks like your bank. When
you enter your username and password, the criminals steal them."
Real-Life Connection (India): "Many people in India have fallen for these 'KYC update' or 'account
blocked' SMS scams."
Key Message: Don't trust messages that create urgency or seem too good to be true.
Visuals:
o Image: A hand pointing at a phone screen showing a suspicious SMS, with a magnifying glass
hovering over it, implying careful examination.
o Flowchart/Diagram:
Option A: "CALL THE OFFICIAL CUSTOMER SERVICE NUMBER (from their official
website or bill, NOT the message)."
Option B: "Visit the official website (type the address yourself, don't click links)."
Content/Talking Points:
o "Always call the company directly using a number you know is real, or visit their official
website."
o "Your bank will never ask for your passwords or PINs over SMS/Email/Call."
Visuals:
o Image: A login screen with a password field showing "123456" or "password" with a red "Wrong
Password" error.
Content/Talking Points:
o "Many people use simple passwords like '123456', 'password', or their birthdate."
o What happened: "Hackers use special programs to quickly guess these common passwords,
gaining access to your emails, social media, or even bank accounts."
o Real-Life Connection: "Think about the social media accounts you've heard about being hacked –
often, weak passwords are to blame."
Key Message: Make your passwords long, complex, and different for each account.
Visuals:
o Image: A combination lock with various symbols (letters, numbers, special characters) visible on
its dials.
o Checklist/Infographic:
Numbers (1, 2, 3)
Symbols (!@#$)
Tip: Consider a password manager app to remember them all! (Icon: A small key vault)
Content/Talking Points:
o "Think of a password as a strong, unique lock for each of your online doors."
o "The longer and more complex it is, the harder it is for anyone to break."
Visuals:
o Image: People sitting in a coffee shop or airport, happily using their devices. An overlayed
diagram shows data flowing from their devices unencrypted to a public Wi-Fi router, with a
shadowy figure intercepting it.
Content/Talking Points:
o What happened: "On unsecured public Wi-Fi, criminals can easily 'eavesdrop' on your internet
connection. They can see what you're doing, like logging into your bank or checking emails."
o Real-Life Connection: "Stories of credit card details being stolen while shopping online on public
Wi-Fi are sadly common."
Visuals:
o Image: A smartphone or laptop with a "VPN On" status or a tunnel icon representing a secure
connection.
o Split Diagram:
Left (Red X): Public Wi-Fi symbol with a crossed-out bank icon and shopping cart icon.
Right (Green Check): Mobile data symbol or a VPN icon with a bank icon and shopping
cart.
Content/Talking Points:
o "Avoid: Don't do online banking, shopping, or access sensitive accounts on public Wi-Fi."
o "Use: Prefer your mobile data for sensitive tasks, or wait until you are on your secure home Wi-
Fi."
o "Consider: A VPN (Virtual Private Network) encrypts your connection and is like a private tunnel
for your data, even on public Wi-Fi."
Key Message: Old software is like an unlocked door for cyber threats.
Visuals:
o Image: A smartphone or laptop screen showing an old software version (e.g., "Software Update
Available: Install Now?" with a 'Remind Me Later' button heavily highlighted).
o Illustration: A house with clearly visible cracks in its walls or a door left ajar, representing
vulnerabilities.
Content/Talking Points:
o "Your phone, computer, and apps regularly ask you to update them."
o What happened: "These updates aren't just for new features. They often include critical 'security
patches' that fix weaknesses. Ignoring them leaves open doors for viruses and hackers."
o Real-Life Connection: "Major cyberattacks in the past have exploited known weaknesses in
outdated software that people failed to update."
Key Message: Always update your devices and apps as soon as new versions are available.
Visuals:
o Image: A progress bar or a loading screen indicating an update, with a 'Success!' message and a
checkmark.
o Icons: A collection of common app icons (WhatsApp, Chrome, Banking App) and operating
system logos (Android, iOS, Windows) with a green checkmark over each.
Content/Talking Points:
o "Updates are like vaccines for your digital devices – they protect you from new threats."
o "Enable automatic updates whenever possible, or make it a habit to check for them weekly."
Slide 13: Real-Life Example 5: The Oversharing on Social Media
Key Message: What you share publicly can be used against you.
Visuals:
o Image: A social media post showing someone's boarding pass, vacation photos from a remote
location, or a child's school uniform with their name visible.
o Illustration: A shadowy figure observing someone's social media feed, taking notes.
Content/Talking Points:
o What happened: "Criminals actively check social media. Posting your vacation dates tells them
your home is empty. Sharing too much personal info (birthdate, pet's name) can help them
guess your passwords or answer security questions."
o Real-Life Connection: "There have been cases of burglaries after people posted their travel plans
online, or identity theft using publicly available information."
Visuals:
o Image: A person holding a smartphone, with a thought bubble above their head showing a 'No
Entry' sign or a question mark over certain types of information (e.g., flight tickets, home
address).
o Infographic:
DO:
Content/Talking Points:
o "Only share personal details with trusted websites or people you know offline."
o Icon 1: Question Mark / Magnifying Glass: "1. Be Suspicious: Verify before you click."
o Icon 2: Strong Lock / Key: "2. Strong Passwords: Make them long and unique."
o Icon 3: Shield / VPN Tunnel: "3. Secure Your Connection: Be careful on public Wi-Fi."
o Icon 4: Up Arrow / Refresh Symbol: "4. Keep Updated: Install software updates."
o Icon 5: Lock over a Person / Private Eye: "5. Guard Your Info: Think before you share online."
Content/Talking Points:
o "Following these simple rules can protect you from most cyber threats."
Visuals:
o Image: A friendly group of people discussing, or a stylized icon of a person asking a question.
o QR Code (Optional): Link to a reliable cyber security resource (e.g., CERT-In or NPCI's cyber
safety tips).
Content/Talking Points:
One of the main goals of cyber security is to protect sensitive information. This includes personal information
and other financial data, as well as confidential business information such as trade secrets and intellectual
property. Ensuring the integrity, availability, and confidentiality of this information is crucial for the protection of
individuals, businesses, and national security.
Another important aspect of cyber security is protecting the availability of computer systems and networks.
Downtime due to cyber-attacks can result in lost productivity and revenue for businesses, and can even cause
critical infrastructure to fail. This highlights the importance of organizations having proper incident response
plans and back up and disaster recovery measures in place to minimize the impact of a successful cyber-attack.
In addition to protecting against cyber threats, cyber security also involves compliance with legal and regulatory
requirements. For example, companies handling personal and financial data are typically required to comply
with industry-specific regulations.
1. Network security: This type of cyber security focuses on protecting an organisation’s network infrastructure,
including routers, switches, and servers. Firewalls, intrusion detection and prevention systems (IDPS), and virtual
private networks (VPNs) are common network security solutions.
2. Endpoint security: Here the focus is on protecting the devices used throughout the organisation and the
data stored on them. This includes laptops, desktops, smartphones, and servers. Anti-virus and anti-malware
software, encryption, and two-factor authentication (2FA) are common endpoint security measures. You can
also use specialized applications that are dedicated to securing endpoint devices and protect against attacks
such as keylogging and screen-capture.
3. Application security: This type of cyber security focuses on protecting an organisation’s software
applications from vulnerabilities and attacks. This includes web applications, mobile applications, and cloud-
based services. Secure coding, penetration testing, and runtime application self-protection (RASP) are common
application security solutions.
4. Cloud security: As more and more organisations move their workloads to the cloud, this type of cyber
security is becoming increasingly important. Cloud security solutions include encryption, key management,
identity, and access management (IAM) and other security controls.
5. Information security: The aim is to protect an organisation’s sensitive information, including personal and
financial data. This includes data classification, data loss prevention, and security information and event
management (SIEM).
6. Identity and Access Management (IAM): This type of cyber security focuses on the management and
protection of digital identities. It allows organisations to control access to resources, ensuring that only
authorised users can access sensitive information.
7. Disaster recovery and business continuity planning: It’s critical that your organisation is able to prepare and
recover in case of cyber-attacks, power failures, and other disruptions.
DOWNLOAD HERE
Most of us know of the obvious ones like hackers or phishing but there are several other types of cyber security
threats that you need to be aware of such as malware, ransomware, distributed denial of service (DDoS) attacks,
Advanced persistent threats (APTs), social engineering and insider threats.
It’s worth noting that new types of threats are emerging continually as technology advances, and new ways to
exploit them are found. So, it’s important for organizations to be vigilant and stay informed about the latest
cyber threats and vulnerabilities.
Luckily there are many types of cyber security tools to help keep your system secure. Here are some common
types of cybersecurity tools:
Firewalls: Network security systems that control incoming and outgoing network traffic.
Anti-virus/anti-malware software: Programs that detect and remove computer viruses, worms, and other
malicious software.
Intrusion detection and prevention systems (IDPS): Solutions that detect and prevent unauthorized access to a
computer or network.
Encryption: Tools that protect sensitive information from unauthorized access by converting plain text into
code.
Virtual private networks (VPNs): Secure networks that allow remote users to securely connect to a private
network.
Two-factor authentication (2FA): An additional layer of security that requires users to provide two forms of
identification.
Security information and event management (SIEM): Tools that collect and analyze security-related data from
multiple sources to identify potential threats.
Identity and access management (IAM): A measure to manage and protect digital identities, and control access
to resources.
Penetration testing: Simulate an attack on a computer system or network to identify possible vulnerabilities.
Disaster recovery and business continuity planning: Prepare for and recover from cyber-attacks and other
disruptions with good planning.
Web Application Firewall (WAF): These protect web applications from various types of attacks like SQL
injection, cross-site scripting, and other threats.
Cloud security tools: Protect cloud-based data and applications from unauthorized access, configuration errors,
and other threats.
Network monitoring and analysis tools: These tools continuously monitor network traffic and identify any
suspicious activities, anomalies or intrusions.
Data Loss Prevention (DLP): Monitor data and endpoints, identify sensitive data, and prevent them from being
leaked.
These are just a few examples of the many different types of cybersecurity tools available. It’s important for
organisations to evaluate their specific security needs and choose the tools that best meet those needs.