0% found this document useful (0 votes)
12 views19 pages

Cyber Security

Uploaded by

karthika59.gist
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views19 pages

Cyber Security

Uploaded by

karthika59.gist
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Device

Security

CCTV

CYBER Secure

SECURIT
Payment

Computer Fingerprint
Security

Y Global
Security
Device
Security

CCTV

CYBER Secure

SECURIT
Payment

Computer Fingerprint
Security

Y Global
Security
Cybersecurity
Cybersecurity is a set of standards and
practices organizations use to protect
their applications, data, programs,
networks, and systems from
cyberattacks and unauthorized access.
Types of cyber attacks

Phishing Attacks: Malware Attacks: Man-in-the-Middle


(MitM) Attack:
These attacks involve tricking Malicious software, such as viruses,
individuals into providing their worms, Trojans, or ransomware, is
personal information such as deployed onto a victim's device to The attacker intercepts and relays
passwords or credit card details by disrupt or gain unauthorized access communication between two
posing as a trustworthy entity. to data. parties to eavesdrop, modify, or
inject malicious content without
the knowledge of the
communicating parties.
Types of cyber attacks

Phishing Attacks: Malware Attacks: Man-in-the-Middle


(MitM) Attack:
These attacks involve tricking Malicious software, such as viruses,
individuals into providing their worms, Trojans, or ransomware, is
personal information such as deployed onto a victim's device to The attacker intercepts and relays
passwords or credit card details by disrupt or gain unauthorized access communication between two
posing as a trustworthy entity. to data. parties to eavesdrop, modify, or
inject malicious content without
the knowledge of the
communicating parties.
Types of cyber attacks

Phishing Attacks: Malware Attacks: Man-in-the-Middle


(MitM) Attack:
These attacks involve tricking Malicious software, such as viruses,
individuals into providing their worms, Trojans, or ransomware, is
personal information such as deployed onto a victim's device to The attacker intercepts and relays
passwords or credit card details by disrupt or gain unauthorized access communication between two
posing as a trustworthy entity. to data. parties to eavesdrop, modify, or
inject malicious content without
the knowledge of the
communicating parties.
Goals of Cyber Security
Confidentiality

Confidentiality involves the


efforts of an organization to
make sure data is kept secret or
private. To accomplish this,
access to information must be
controlled to prevent the
unauthorized sharing of data—
whether intentional or
accidental. A key component of
maintaining confidentiality is
making sure that people
without proper authorization
are prevented from accessing
assets important to your
business
Confidentiality Integrity Availability
Even if data is kept
Confidentiality involves the confidential and its integrity
efforts of an organization to Integrity involves maintained, it is often
make sure data is kept secret or making sure your data is useless unless it is available
private. To accomplish this, trustworthy and free to those in the organization
access to information must be from tampering. The and the customers they
controlled to prevent the serve individuals with
unauthorized sharing of data—
integrity of your data is access to specific
whether intentional or maintained only if the information must be able to
accidental. A key component of data is authentic, consume it when they need
maintaining confidentiality is accurate, and reliable. to, and getting to the data
making sure that people should not take an
without proper authorization inordinate amount of time.
are prevented from accessing
assets important to your
business
How does cybersecurity work?

2 way Authentication Secure passwords Regular updates

Antivirus Firewalls
STATISTICS AND
FACTS ON
CYBERSECURITY
Number of cyber crimes reported across India from 2012 to 2022

 Karnataka and Telangana accounted


for the highest share during the
measured time period.
 Uttar Pradesh leads the way
In 2021 1,885 cases were
recorded alone in Andhra
Pradesh.

In 2022, number of cyber


crimes for Andhra Pradesh
was 2,341.
Apps that are installed to protect the data
Ways to Report Cyber Crime

A cybercrime incident A cybercrime helpline


via the National Cyber Crime number has been issued
can either be reported in a Reporting Portal
police station – Section for the victims of Cyber

03
(cybercrime.gov.in).

01 02
154 of the Code of crimes in India.It is 1930.
Criminal Procedure Anyone who wants to
makes it mandatory for a report a case can dial to it
police officer to record and report the issue.
Ways to Report Cyber Crime
A cybercrime incident
can either be reported in a
police station – Section
154 of the Code of
Criminal Procedure
makes it mandatory for a
police officer to record
the complaint.

A cybercrime helpline
via the National Cyber Crime number has been issued
Reporting Portal
for the victims of Cyber

03
(cybercrime.gov.in).

01 02
crimes in India.It is 1930.
Anyone who wants to
report a case can dial to it
and report the issue.
Ways to Report Cyber Crime

via the National Cyber


Crime Reporting Portal
(cybercrime.gov.in).

A cybercrime incident A cybercrime helpline


can either be reported in a number has been issued
police station – Section for the victims of Cyber

01 02 03
154 of the Code of crimes in India.It is 1930.
Criminal Procedure Anyone who wants to
makes it mandatory for a report a case can dial to it
police officer to record and report the issue.
Ways to Report Cyber Crime
A cybercrime helpline
number has been issued
for the victims of Cyber
crimes in India.It is 1930.
Anyone who wants to
report a case can dial to it
and report the issue.

A cybercrime incident
via the National Cyber Crime
can either be reported in a Reporting Portal
police station – Section

03
(cybercrime.gov.in).

01
154 of the Code of
Criminal Procedure
makes it mandatory for a
police officer to record
02
“CYBERSECURITY IS A SHARED
RESPONSIBILITY,AND IT BOILS
DOWN TO THIS:
IN CYBERSECURITY,THE MORE
SYSTEMS WE SECURE,THE
MORE SECURE WE ALL ARE.”
Thank you

You might also like