CYBER SECURITY AND
ATTACKS
PRESENTED BY:
Fatima Noor Malik
Rana Shehriyar
Muhammad Tayyab Farooq
INTRODUCTION
 the term cyber security is used to refer to the security
offered through online services to protect your online
information
 With an increasing amount of people getting connected to
internet, the security threats that cause massive harm are
increasing also
HISTORY
 The first cyber crime was
recorded in the year 1820.
 The first spam email took place
in 1978 when it was sent over
the Arpanet.
 The first Virus was installed on
an Apple Computer in 1982
What is the
meaning of the
word cyber
What is the need of
cyber security
What are the
security
problems in
cyber field
How to implement
and maintain
security of a cyber
field around us.
TO UNDERSTAND
Meaning of the word CYBER
It is a combining form relating to information
technology, the internet and virtual reality
Need of cyber security
Cyber security is
necessary since it helps
in securing data from
threats such as data
theft and misuse, also
safeguards your system
from viruses
Types of ATTACKS
 MAN IN THE MIDDLE ATTACK
 D-DOS ATTACK
 DOS ATTACK
 SQL INJECTON
 XSS ATTACK
 SOCIAL ENGINEERING
 PHISHING
CYBER SECURITY
CYBER SECURITY
CYBER SECURITY
CYBER SECURITY
CYBER SECURITY
Major security problems
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses and Worms
A Virus is a "program that
is loaded into your
computer without your
knowledge and runs
against your wishes
SOLUTION
Install a security
suite that protects
the computer
against threats such
as viruses and
worms.
Hackers
In common a hacker is
a person who breaks
into computers,
usually by gaining
access to
administrative
controls.
Types of Hackers
White Hat Hacker
Grey Hat Hacker
Black Hat Hacker
How To prevent hacking
It may be impossible to
prevent computer
hacking, however
effective security
controls including
strong passwords, and
the use of firewalls can
helps.
Malware
 The word "malware"
comes from the term
"MALicious softWARE "
 Malware is any software
that infects and damages a
computer system without
the owner's knowledge or
permission
To Stop Malware
Download an anti-malware
program that also helps
prevent infections.
Activate Network Threat
Protection, Firewall,
Antivirus
Trojan Horses
Trojan horses are email
viruses that can duplicate
themselves, steal
information, or harm the
computer system.
These viruses are the most
serious threats to computers
How to Avoid Trojan
Security suites, such as
Avast Internet Security, will
prevent you from
downloading Trojan Horses
Password Cracking
Password attacks are
attacks by hackers that are
able to determine
passwords or find
passwords to different
protected electronic areas
and social network sites.
Securing Password
 Use always Strong password.
 Never use same password for two different sites
PREVENTIVE/SECURE MEASURES
 Use antivirus software.
 Turn on the firewalls.
 Uninstall unnecessary software.
 Using the SSL certificates installed
on the server.
 Using servers -SSH (secure
method).
 Updating software updates.
 Avoid spyware/malware.
ADVANTAGES OF CYBER SECURITY
Protects the computers against virus,
worms and malware.
Protects against the data from theft
Increase in cyber defense
Increases the security
We can browse the safe website
Increase in cyber speed
Protects networks and resources
DISADVANTAGES OF CRIMES SECURITY
 Makes the system slower than before.
 Firewalls would be difficult to configure correctly.
 Huge amount of loss in money for the banks,
companies etc
 Huge amount of data loss occurs in the database
 Access to different accounts with gained
information
Facts about cyber crime
 Cyber crime has become an increasingly
severe problem in Pakistan in recent
years. Financial fraud is the most
common type reported; in 2020, of
84,764 total complaints, 20,218
Pakistanis reported falling victim to
financial fraud-related online crimes.
This is ahead of hacking (7966), cyber
harassment (6023) and cyber defamation
(6004).
 An increasing number of Pakistanis
have experienced cyber crime through
social media. Between 2018-2021,
financial fraud through social media
increased by 83%. Of 102,356 complaints
received in 2021, 23% of cyber crimes
CONCLUSION
 Cyber security and
cyber crimes are two
sides of the coin
 Cyber crimes are the
ones which cannot be
completely eradicated
but can be prevented
using the cyber
Security
CYBER SECURITY
CYBER SECURITY

More Related Content

PPTX
Social engineering
PPTX
Cyber security by Anushka Jha
PPTX
Cyber security
PPTX
PPTX
Social engineering
PPTX
Cyber security system presentation
PPT
Cybercrime and security
PPTX
Cybersecurity 1. intro to cybersecurity
Social engineering
Cyber security by Anushka Jha
Cyber security
Social engineering
Cyber security system presentation
Cybercrime and security
Cybersecurity 1. intro to cybersecurity

What's hot (20)

PPTX
Cyber security
PPTX
Phising a Threat to Network Security
PDF
Cyber security awareness presentation nepal
PDF
What is malware
PPTX
Cyber crime and Security
PPTX
Cybersecurity Awareness
PPTX
Cyber threats
PPTX
Cyber Crime and Cyber Security
PPTX
Ppt growing need of cyber security
PPT
Trojan horse
PPTX
PPTX
Cyber security
PPT
TYPES OF HACKING
PPTX
Information & Cyber Security Risk
PPTX
Cyber Security PPT.pptx
PPTX
Cyber security
PPTX
Network Security ppt
PPT
Internet Security
PDF
Cyber Security Awareness
PPTX
Social engineering
Cyber security
Phising a Threat to Network Security
Cyber security awareness presentation nepal
What is malware
Cyber crime and Security
Cybersecurity Awareness
Cyber threats
Cyber Crime and Cyber Security
Ppt growing need of cyber security
Trojan horse
Cyber security
TYPES OF HACKING
Information & Cyber Security Risk
Cyber Security PPT.pptx
Cyber security
Network Security ppt
Internet Security
Cyber Security Awareness
Social engineering
Ad

Similar to CYBER SECURITY (20)

PPTX
cyber security,need,security problem and types of cyber security
PDF
Cyber Security
PDF
cyber security.pdf
PDF
cybersecurity-210715084148.pdf
PPTX
Cybersecurity
PPTX
cyber security PPT
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Introduction to cyber security
PPTX
cybersec sumit (1).pptx
PPTX
cybersecurity.pptx
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security (daffodil international university)
PPT
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
PPTX
SAHITHI.PPT.pptx
PPTX
Crimeer-Presentstio.pptx presentation on school
PPTX
4247174743543535355-Cyber-Security-Ppt.pptx
PPTX
Cyber Security 03
PPTX
Cyber Security A Challenges For Mankind
cyber security,need,security problem and types of cyber security
Cyber Security
cyber security.pdf
cybersecurity-210715084148.pdf
Cybersecurity
cyber security PPT
Cybersecurity 140713064844-phpapp01 (1)-converted
Introduction to cyber security
cybersec sumit (1).pptx
cybersecurity.pptx
cybersecurity-140713064844-phpapp01.pdf
Cyber security
cybersecurity-140713064844-phpapp01.pdf
Cyber security (daffodil international university)
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
SAHITHI.PPT.pptx
Crimeer-Presentstio.pptx presentation on school
4247174743543535355-Cyber-Security-Ppt.pptx
Cyber Security 03
Cyber Security A Challenges For Mankind
Ad

Recently uploaded (20)

PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
Health aspects of bilberry: A review on its general benefits
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
Chevening Scholarship Application and Interview Preparation Guide
PPTX
Climate Change and Its Global Impact.pptx
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PPT
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PPTX
IT infrastructure and emerging technologies
PDF
Laparoscopic Dissection Techniques at WLH
PDF
Compact First Student's Book Cambridge Official
PDF
Hospital Case Study .architecture design
PDF
Nurlina - Urban Planner Portfolio (english ver)
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPTX
Why I Am A Baptist, History of the Baptist, The Baptist Distinctives, 1st Bap...
Diploma pharmaceutics notes..helps diploma students
Health aspects of bilberry: A review on its general benefits
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Chevening Scholarship Application and Interview Preparation Guide
Climate Change and Its Global Impact.pptx
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
4. Diagnosis and treatment planning in RPD.pptx
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
UNIT_2-__LIPIDS[1].pptx.................
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
IT infrastructure and emerging technologies
Laparoscopic Dissection Techniques at WLH
Compact First Student's Book Cambridge Official
Hospital Case Study .architecture design
Nurlina - Urban Planner Portfolio (english ver)
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
Why I Am A Baptist, History of the Baptist, The Baptist Distinctives, 1st Bap...

CYBER SECURITY

  • 2. PRESENTED BY: Fatima Noor Malik Rana Shehriyar Muhammad Tayyab Farooq
  • 3. INTRODUCTION  the term cyber security is used to refer to the security offered through online services to protect your online information  With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also
  • 4. HISTORY  The first cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982
  • 5. What is the meaning of the word cyber What is the need of cyber security What are the security problems in cyber field How to implement and maintain security of a cyber field around us. TO UNDERSTAND
  • 6. Meaning of the word CYBER It is a combining form relating to information technology, the internet and virtual reality
  • 7. Need of cyber security Cyber security is necessary since it helps in securing data from threats such as data theft and misuse, also safeguards your system from viruses
  • 8. Types of ATTACKS  MAN IN THE MIDDLE ATTACK  D-DOS ATTACK  DOS ATTACK  SQL INJECTON  XSS ATTACK  SOCIAL ENGINEERING  PHISHING
  • 15. Viruses and Worms A Virus is a "program that is loaded into your computer without your knowledge and runs against your wishes
  • 16. SOLUTION Install a security suite that protects the computer against threats such as viruses and worms.
  • 17. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 18. Types of Hackers White Hat Hacker Grey Hat Hacker Black Hat Hacker
  • 19. How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 20. Malware  The word "malware" comes from the term "MALicious softWARE "  Malware is any software that infects and damages a computer system without the owner's knowledge or permission
  • 21. To Stop Malware Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus
  • 22. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 23. How to Avoid Trojan Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses
  • 24. Password Cracking Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 25. Securing Password  Use always Strong password.  Never use same password for two different sites
  • 26. PREVENTIVE/SECURE MEASURES  Use antivirus software.  Turn on the firewalls.  Uninstall unnecessary software.  Using the SSL certificates installed on the server.  Using servers -SSH (secure method).  Updating software updates.  Avoid spyware/malware.
  • 27. ADVANTAGES OF CYBER SECURITY Protects the computers against virus, worms and malware. Protects against the data from theft Increase in cyber defense Increases the security We can browse the safe website Increase in cyber speed Protects networks and resources
  • 28. DISADVANTAGES OF CRIMES SECURITY  Makes the system slower than before.  Firewalls would be difficult to configure correctly.  Huge amount of loss in money for the banks, companies etc  Huge amount of data loss occurs in the database  Access to different accounts with gained information
  • 29. Facts about cyber crime  Cyber crime has become an increasingly severe problem in Pakistan in recent years. Financial fraud is the most common type reported; in 2020, of 84,764 total complaints, 20,218 Pakistanis reported falling victim to financial fraud-related online crimes. This is ahead of hacking (7966), cyber harassment (6023) and cyber defamation (6004).  An increasing number of Pakistanis have experienced cyber crime through social media. Between 2018-2021, financial fraud through social media increased by 83%. Of 102,356 complaints received in 2021, 23% of cyber crimes
  • 30. CONCLUSION  Cyber security and cyber crimes are two sides of the coin  Cyber crimes are the ones which cannot be completely eradicated but can be prevented using the cyber Security