This document discusses cyber security threats and the need for protection. It defines cyber security as the security of online services and information. With more people online, security threats that can cause harm are increasing. Cyber security is necessary to secure data from theft or misuse and protect systems from viruses. Cyber crimes can involve using computers as the target (e.g. hacking) or weapon (e.g. credit card fraud). Major security problems discussed include viruses, hackers, malware, trojans, password cracking, denial of service attacks, and phishing. The document provides tips for preventing hacking such as strong passwords and firewalls.
This document discusses cyber security threats and the need for protection. It defines cyber security as the security of online services and information. With more people online, security threats that can cause harm are increasing. Cyber security is necessary to secure data from theft or misuse and protect systems from viruses. Cyber crimes can involve using computers as the target (e.g. hacking) or weapon (e.g. credit card fraud). Major security problems discussed include viruses, hackers, malware, trojans, password cracking, denial of service attacks, and phishing. The document provides tips for preventing hacking such as strong passwords and firewalls.
This document discusses cyber security threats and the need for protection. It defines cyber security as the security of online services and information. With more people online, security threats that can cause harm are increasing. Cyber security is necessary to secure data from theft or misuse and protect systems from viruses. Cyber crimes can involve using computers as the target (e.g. hacking) or weapon (e.g. credit card fraud). Major security problems discussed include viruses, hackers, malware, trojans, password cracking, denial of service attacks, and phishing. The document provides tips for preventing hacking such as strong passwords and firewalls.
This document discusses cyber security threats and the need for protection. It defines cyber security as the security of online services and information. With more people online, security threats that can cause harm are increasing. Cyber security is necessary to secure data from theft or misuse and protect systems from viruses. Cyber crimes can involve using computers as the target (e.g. hacking) or weapon (e.g. credit card fraud). Major security problems discussed include viruses, hackers, malware, trojans, password cracking, denial of service attacks, and phishing. The document provides tips for preventing hacking such as strong passwords and firewalls.
The term cyber security is used to refer to the security
offered through on-line services to protect your information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
Sunday, June 27, 20
21 3
Dr Meenakshi Malhotra Sunday, June 27, 20
21 4
Sunday, June 27, 20
21 Need of cyber security 5 Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
Sunday, June 27, 20
21 6 CATEGORIES OF CYBER CRIME We can categorize cyber crime in two ways. The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
21 8 Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
Sunday, June 27, 20
21 9
Sunday, June 27, 20
21 10
Sunday, June 27, 20
21 Hackers 11 In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
Sunday, June 27, 20
21 12 How To prevent hacking It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
Sunday, June 27, 20
21 13
Sunday, June 27, 20
21 14
Sunday, June 27, 20
21 15
Sunday, June 27, 20
21 16
Sunday, June 27, 20
21 17
Sunday, June 27, 20
21 DENIAL OF SERVICE ATTACKS 18 This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks
Sunday, June 27, 20
21 Phishing 19 Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Sunday, June 27, 20
21 20
Sunday, June 27, 20
21 21
Sunday, June 27, 20
21 22 Conclusion I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection.
Sunday, June 27, 20
21 THANK YOU Every ENDING is really Just a NEW BEGINNING…… 23