Cyber security
Shivam Rawat
Cyber security
* Protect digital assets: Safeguard computer systems,
networks, and data.
introduction * Prevent cyberattacks: Defend against threats like
hacking, malware, and phishing.
* Ensure data security: Maintain confidentiality,
integrity, and availability of information.
* Implement strong security measures: Use
passwords, firewalls, antivirus, and encryption.
* Stay informed and adapt: Keep up with evolving
threats and update security practices.
Cyber threats
Here are 5 common types of cyber threats:
* Malware: Malicious software like viruses, worms, and
ransomware designed to harm computer systems.
* Phishing: Deceptive tactics to trick individuals into
revealing sensitive information through emails, messages,
or websites.
* Hacking: Unauthorized access to computer systems or
networks to steal data, disrupt operations, or cause
damage.
* Denial-of-Service (DoS) Attacks: Overwhelming a system
or network with traffic to make it inaccessible to legitimate
users.
* Social Engineering: Manipulating people to gain
unauthorized access to sensitive information or systems.
Principle for cyber
* Confidentiality: Protect sensitive information from
unauthorized access.
security * Integrity: Ensure data accuracy and prevent
unauthorized modification.
* Availability: Guarantee system and data accessibility
to authorized users.
* Accountability: Establish clear responsibilities for
security measures.
* Continuous Improvement: Regularly assess and
update security practices.
Practicing cyber
* Strong Passwords: Create complex, unique
passwords for each account.
security * Software Updates: Regularly install security patches
to protect against vulnerabilities.
* Beware of Phishing: Be cautious of suspicious
emails and links to avoid data breaches.
* Secure Wi-Fi: Use strong passwords for Wi-Fi
networks and avoid public Wi-Fi for sensitive activities.
* Backup Data: Regularly back up important data to
prevent loss in case of cyberattacks.