0% found this document useful (0 votes)
11 views17 pages

Aakashppt

Uploaded by

aryansaini6367
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views17 pages

Aakashppt

Uploaded by

aryansaini6367
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Cybersecurity Awareness

Aakash Saini
Section: 5ITA

Submitted To: Anjali Pandey

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 1 / 12
What is Cybersecurity?

Cybersecurity involves protecting systems and networks from digital


attacks.
Protects against identity theft, data breaches, and operational
disruptions.
Hackers can exploit vulnerabilities in systems to cause significant
harm.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 2 / 12
Causes of Concern:

Growing cybercrime with technological advancement.


Lack of awareness leads to:
▶ Identity theft.
▶ Financial loss.
▶ Legal consequences.
Cybercrime is massively underreported.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 3 / 12
Common Causes of Cyber Attacks:

Lack of Awareness.
Weak passwords and stolen credentials.
Unpatched vulnerabilities and no antivirus.
Misconfigured systems with open network ports.
Social engineering attacks like phishing.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 4 / 12
Types of Cyber Attacks:

Malware: Viruses, worms, and Trojans.


Phishing: Tricking users into revealing sensitive data.
Ransomware: Encrypts data and demands a ransom eg : WannaCry
ransomware.
Spoofing: Faking identity to gain unauthorized access.
Man-in-the-middle(MITM): Allows an attacker to eavesdrop on
data sent between two people, networks, or computers on wifi.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 5 / 12
OWASP Top 10(Open Web Application Security
Project)

figure:1 Owasp Top 10 Critical security risks to web applications.

▶ Includes injection attacks, weak authentication, and data exposure.


▶ Important for server hardening and reducing vulnerabilities.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 6 / 12
What is Cybercrime?

Cybercrime is criminal activity that either targets or uses a computer,


a computer network or a networked device.

Categories of cybercrime?

The computer as a target:: Using a computer to attacks other


computer e.g. Hacking, Virus/Worms attacks, DoS attack etc.
The computer as a weapon: Using a computer to commit real
world crime e.g. credit card fraud etc.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 7 / 12
Precautions for Cyber Crime:

Password Protection: Use complex passwords with a mix of letters,


numbers, and symbols.
System Protection: Install antivirus, enable firewalls, and keep
software up-to-date.
Data Protection: Backup important data regularly.
Update your software: Keep your operating system and applications
up to date, and turn on automatic updates if available.
Don’t share personal information: Don’t share passwords or OTPs
through email, chat, or other electronic communication.
Use official emails for communication: avoid personal emails for
sensitive data.
Clean Disk: Properly dispose of sensitive documents and files.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 8 / 12
Data Breach:

Big Basket: In November 2020, the Bangalore-based online grocer


BigBasket suffered a data breach that leaked the details of their over
2 crore (20 million) users, including email IDs, password hashes, PINs,
phone numbers, addresses, dates of birth, locations and IP addresses.
Twitter(X):This leaked database contains a massive amount of data,
totaling 9.4GB.
Angel One: the personal details of approximately 7.9 million
customers of Mumbai-based stock broking firm Angel One were
exposed in july 24.
boAt Lifestyle: The hacker shared files containing the personal
information of customers, totaling 7.5 million entries.
AIIMS hospital: In 2022, hackers targeted systems of AIIMS and
allegedly demanded around Rs 200 crore in cryptocurrency as ransom.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 9 / 12
Project : Pdf Virus Detector Tool

The ”PDF Virus Detection System” is a web-based tool developed to


detect potential viruses within PDF files using a predefined virus
signature database.
The goal of this project is to build a system that allows users to
upload PDF files and check for known virus signatures.
”Email is the most common method for cyber attacks, with 90–96%
of phishing attacks and malware delivered via email:
▶ Phishing attacks: 96% of phishing attacks are delivered via email.
▶ Malware: 94% of malware is delivered by email.
▶ Cyber attacks: 90% of cybersecurity attacks start with a simple email.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 10 / 12
figure:2 Web page of project

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 11 / 12
Technology Stack:

The following technologies were used to develop the system:


Backend: Python with Flask framework.
Frontend: HTML, CSS (with Bootstrap for styling).
Libraries: OS (for file handling), Flask (for web application
development).
Database: A static in-memory database (dictionary) holding virus
signatures.
IDE: VS Code.
Web Server: Flask’s built-in development server.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 11 / 12
figure 3: Flow chart of algorithm

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 11 / 12
figure 4: code

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 11 / 12
figure 5: code

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 12 / 12
Conclusion

Cybersecurity is vital for protecting sensitive information and systems.


Follow best practices to reduce vulnerabilities and avoid attacks.
Stay informed about the latest cybersecurity trends.

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 12 / 12
Referances:

Google: Google
OWASP Top 10: OWASP Top 10
Cloudflare: Cloudglare
Kaspersky: Kaspersky
Wikipedia: Data Breaches in India

Aakash Saini (Section: 5ITA) Cybersecurity Awareness Submitted To: Anjali Pandey 12 / 12

You might also like