A Webinar on
Cyber Security
By [Link] Kumari
● Cyber space:Virtual space created by computer
networks in which people can communicate
● Cyber security:Technologies and processes used to
protect computers, data and networks from
unauthorised access of data
● Cyber crime:Any crime carried out by using computers
or the internet
● Cyber attack:Unauthorised access of private or
confi dential information contained on computer
network or system
Cyber security
● Technologies and processes used to protect
computers, data and networks from unauthorised
access of data
● Cyber forensics:The application of scientifi cally proven
methods to collect,interprets,process and uses
digital evidences to provide a conclusive description
of cyber crime activities
● Cyber law:Cyber law or IT law is referred to as “LAW
OF THE INTERNET”.It is a legal system designed to
deal with internet-related legal issues.
Why is Cyber Security important?
● Safety of data and information
● Data breaching
● Saves networks from intruders
● Prevent damages and threats
to businesses
Objectives of cyber security
1. Protect confi dentiality of data
2. Preserve the integrity of data
3. Promote the availability of data to authorised users
Types of Cyber Security
● Network security
● Application security
● Information or data security
● Mobile security
● Cloud Security
● Operational security
● Identity management
Security threats
Virus
Worms
Malware
Trojan horses
Password cracking
Virus and Worms
● A Virus is a “program that is loaded onto your
computer without your knowledge and runs against
your wishes
Solutions
● Install a security suite that protects the computer
against threats such as viruses and worms.
Hackers
● In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
Cryptography
Cryptography is the process of hiding or coding
information so that only the person a message was
intended for can read it.
The art of cryptography has been used to code messages
for thousands of years and continues to be used in bank
cards, computer passwords, and ecommerce.
Intrusion Detection System (IDS)
● Intrusion is when an attacker gets unauthorized
access to a device, network, or system. Cyber
criminals use advanced techniques to sneak into
organizations without being detected.
● Intrusion Detection System (IDS) observes network
traffi c for malicious transactions and sends immediate
alerts when it is observed. It is software that checks a
network or system for malicious activities or policy
violations. Each illegal activity or violation is often
recorded either centrally using an SIEM system or
notifi ed to an administration.
Firewalls
● A fi rewall is a network security device that separates a
trusted internal network from an external network deemed
untrustworthy, such as the internet. It regulates incoming
and outgoing network traffi c based on preset security rules.
Cyber Security Strategy – India
• Security Policy, Legal Framework
– IT Act, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer
crimes
• Capacity building
– Skill & Competence development
• Research and Development
– Cyber Monitoring
– Network Security
• International Collaboration
India stands 10th in the cyber crime in the world
THANK YOU