0% found this document useful (0 votes)
15 views5 pages

Cyber Security

Uploaded by

shivamrawat88393
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

Cyber Security

Uploaded by

shivamrawat88393
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber security

Shivam Rawat
Cyber security
* Protect digital assets: Safeguard computer systems,
networks, and data.

introduction * Prevent cyberattacks: Defend against threats like


hacking, malware, and phishing.

* Ensure data security: Maintain confidentiality,


integrity, and availability of information.

* Implement strong security measures: Use


passwords, firewalls, antivirus, and encryption.

* Stay informed and adapt: Keep up with evolving


threats and update security practices.
Cyber threats
Here are 5 common types of cyber threats:

* Malware: Malicious software like viruses, worms, and


ransomware designed to harm computer systems.

* Phishing: Deceptive tactics to trick individuals into


revealing sensitive information through emails, messages,
or websites.

* Hacking: Unauthorized access to computer systems or


networks to steal data, disrupt operations, or cause
damage.

* Denial-of-Service (DoS) Attacks: Overwhelming a system


or network with traffic to make it inaccessible to legitimate
users.

* Social Engineering: Manipulating people to gain


unauthorized access to sensitive information or systems.
Principle for cyber
* Confidentiality: Protect sensitive information from
unauthorized access.

security * Integrity: Ensure data accuracy and prevent


unauthorized modification.

* Availability: Guarantee system and data accessibility


to authorized users.

* Accountability: Establish clear responsibilities for


security measures.

* Continuous Improvement: Regularly assess and


update security practices.
Practicing cyber
* Strong Passwords: Create complex, unique
passwords for each account.

security * Software Updates: Regularly install security patches


to protect against vulnerabilities.

* Beware of Phishing: Be cautious of suspicious


emails and links to avoid data breaches.

* Secure Wi-Fi: Use strong passwords for Wi-Fi


networks and avoid public Wi-Fi for sensitive activities.

* Backup Data: Regularly back up important data to


prevent loss in case of cyberattacks.

You might also like