Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Cyber Security & its threats

By PARVATHI S J
Assistant Professor

[email protected]
+919901048278
2 Introduction

 The term cyber security is used to refer to the security


offered through on-line services to protect your
information.
 With an increasing amount of people getting connected
to Internet, the security threats that cause massive
harm are increasing also.

Sunday, June 27, 20


21
3

Dr Meenakshi Malhotra Sunday, June 27, 20


21
4

Sunday, June 27, 20


21
Need of cyber security
5  Cyber security is necessary since it helps in
 securing data from threats such as data theft or
 misuse, also safeguards your system from viruses.

Sunday, June 27, 20


21
6
CATEGORIES OF CYBER CRIME
 We can categorize cyber crime in two ways.
 The computer as a target :- using a computer to attacks
other computer, e.g. Hacking, virus/worms attacks, Dos
attack etc.
 The computer as a weapon :- using a computer to commit
real world crime e.g. cyber terrorism, credit card fraud and
pornography etc.

Sunday, June 27, 20


21
7 Major security problems
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
 DOS
 Phishing
 SQL Injection

Sunday, June 27, 20


21
8 Viruses and Worms
 A Virus is a “program that is loaded onto your computer without your knowledge and
runs against your wishes

Sunday, June 27, 20


21
9

Sunday, June 27, 20


21
10

Sunday, June 27, 20


21
Hackers
11  In common a hacker is a person who breaks into computers, usually by gaining access
to administrative controls.

Sunday, June 27, 20


21
12
How To prevent hacking
 It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.

Sunday, June 27, 20


21
13

Sunday, June 27, 20


21
14

Sunday, June 27, 20


21
15

Sunday, June 27, 20


21
16

Sunday, June 27, 20


21
17

Sunday, June 27, 20


21
DENIAL OF SERVICE ATTACKS
18
This is an act by the criminals who floods the bandwidth of the victims
network or fills his E-mail box with spam mail depriving him of the
service he is entitled to access or provide. Many DOS attacks, such as
the ping of death and Tear drop attacks

Sunday, June 27, 20


21
Phishing
19 Phishing is a cybercrime in which a target or targets are contacted by
email, telephone or text message by someone posing as a legitimate
institution to lure individuals into providing sensitive data such as
personally identifiable information, banking and credit card details,
and passwords.

Sunday, June 27, 20


21
20

Sunday, June 27, 20


21
21

Sunday, June 27, 20


21
22 Conclusion
I hope that my presentation will be helpful for my
audience to improve their knowledge about cyber
security and to overcome several security loopholes on
their computer operation. Also it helps to spread
awareness among normal people about emerging security
threats. Simple and practical prevention methods are
explained in the Seminar to prevent PCs from infection.

Sunday, June 27, 20


21
THANK YOU
Every ENDING is really Just a NEW BEGINNING……
23

Sunday, June 27, 20


21

You might also like