0% found this document useful (0 votes)
201 views14 pages

Cyber Security

Uploaded by

Sahil Suvagiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
201 views14 pages

Cyber Security

Uploaded by

Sahil Suvagiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

WELCOME

CYBER
SECURITY PRESNATION
Introduction:

 The term cyber security is used to refer to the


security offered through on-line services to protect
your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
To Undrstand:

 What is meaning of the word CYBER


 What is the need of Cyber Security
 What are the security problems in Cyber field
 How to implement and maintain Security of a
Cyber field around us.
Meaning of the word CYBER:

 It is a combining form relating to information


technology, the Internet, and virtual reality.
Need of cyber security:

 Cyber security is necessary since it helps in


securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems:

 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and Worms:

 A Virus is a “program that is loaded onto your


computer without your knowledge and runs
against your wishes
Hackers:

 In common a hacker is person who breaks into


computers, usually by gaining access to
administrative controls.
Malware:

 The word “malwarer” comes from the term “MALicious


softWARE.”
 Malware is any software that infects and damages a
computer system without the owner’s knowledge or
permission.
Trojan Horses:

 Trojan horses are email viruses that can duplicate


themselves, steal information, or harm the computer
system.
 These viruses are the most serious threats to compuers.

 How to Avoid Trojans


 Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses.
Password Cracking:

 Password attacks are attacks by hackers that are


able to determine passwords or find passwords to
different protected electronic areas and social
network sites.
Securing Password
 Use always Strong password
 Never use same password for two different sites.
Cuber Security Strategy - India:

 Security Policy, Legal Framework


-It Act, 2000
-It (Amendment) bill, 2006 – Data Protection and Computer crimes
o Capacity building
-skill and Competence development
Research and Development
-Cyber Monitoring
-Network Security
International Collaboration
THANK YOU

You might also like