0% found this document useful (0 votes)
18 views16 pages

Presentation (4) Cyber

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views16 pages

Presentation (4) Cyber

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Techno india university

Entrepreneurship skill development


team no : 2024292
jury panel : jrp3
semester : 1
domain : Security , safety & surveillance
OUR CREATIVE MEMBER

Soumyadip
Auric Dutt Trinankur Guha Reya Datta Ankur Haldar Mriganka Ghosh
Karan

F3 F6 F5 F8 F9
B.TECH CSE B.TECH CSBS B.TECH ECE I1
B.TECH CSE B.TECH CSE_AI 231001020004 DIPLOMA
231001001005 231003003152 231001001450 231001002010
231001201033
TEAM MEMBER’S
PROFILES
TEAM MEMBER’S NAME STRENGTH WEAKNESS JOB ROLE

AURIC DUTT My skills lie in building my team's


confidence and implementing
impatient LEADER +
efficient ways to complete the given RESEARCHER
project within the stipulated time .

TRINANKUR GUHA My expertise lies in inspiring and


guiding others toward shared goals
Overlooking small details RESEARCHER
with effective communication and
strategic decision-making

ANKUR HALDAR Data collection Self doubt


RESEARCHER

REYA DATTA RESEARCHER


decision making
impatient

SOUMYADIP KARAN Multi tasking Introvert


EDITOR + PPT
MAKER
Good at making presentation Self criticism
MRIGANKA GHOSH PPT MAKER
milestone

SEMESTER 1 :
We made our new group and select SEMESTER 2 : SEMESTER 3
a topic .Then we research our topic No achievement No achievement
and ready our presentation .

SEMESTER 4 SEMESTER 5 SEMESTER 6


No achievement No achievement No achievement
Semester achievements & challenges
MONTH 1 : No achievement

MONTH 2 : No achievement

MONTH 3 : No achievement

MONTH 4 : No achievement

MONTH 5 : We made our new group and select a topic .Then we research our topic

and ready our presentation .


Identifying the problem

DATA BREACH
A data breach is a security violation that
occurs when sensitive, protected, or
confidential data is accessed or disclosed by
an unauthorized individual.
Our goal

In an era dominated by digital interactions, ensuring data privacy


and safety has become our paramount importance. Our goal is to
explore and implement robust strategies to safeguard sensitive
information, mitigating the risks associated with data breaches and
unauthorized access.
Security , safety & surveillance
OBSERVATION ABOUT THIS SIGNIFICANTS
DOMAIN IN DAILY LIFE Security , safety and surveillance are
- Cyber security practices crucial for crime prevention , public
safety , emergency response, asset
- Online privacy measures
protection , personal well-being and
- Secure communication more in our daily life.
- Personal protection
- National security
RESEARCH ON
DOMAIN
• IMPORTANCE OF DATA PRIVACY
• Data Privacy is important because it safeguards personal integrity, promotes trust in digital
interactions, and upholds the fundamental rights of individuals in an increasingly data-driven
world.
• Individual data privacy helps both businesses and consumers. For businesses, it means a distinct
advantage in terms of trust and brand recognition. And for consumers, it's the safety of being
protected from data breaches, fraud, and financial loss.

• Data privacy practices also protect against data breaches that can devastate a business. Strong
data privacy practices help businesses protect their customers' personal information from being
compromised.

• Encryption is a crucial component of data security that involves the use of algorithms to
transform readable information into an unreadable and unintelligible format.
4 COMMON TYPES OF DATA BREACHES

Ransomware : Phishing : It occurs when


Ransomware is the name
Malware : someone or something mimics
Denial-of-Service (DoS):A
Malware is any software designed a trusted, reputable entity denial-of-service
for malicious software (DoS) breach essentially takes
which gains access and to harm computer files or systems. in order to collect sensitive data
away access
Ironically, malware often (often banking or highly personal
locks down access to vital to websites and webpages.
data (i.e., files, systems). masquerades as a warning against details When this
These attacks most malicious software in an attempt to These attacks are not exclusive to happens at large scale, it’s
the Internet. Common methods
commonly target convince users to download the very known
for phishing scams can include:
businesses. Files and types of software mentioned in 1. A pop-up on your browser
as a distributed denial-of-
the “warning” message. service (DDoS).
systems are locked down 2. An email with a link
These large-scale attacks can
and a certain fee is 3. A person on the phone claiming to
disrupt a
demanded (most often in be a representative of a
large portion of sites online in
reputable company.
the form of Bitcoin or other certain areas.
cryptocurrencies).
DATA SAFETY VS DATA PRIVACY
ASPECT DATA SAFETY DATA PRIVACY
Confidentiality of Personal
Primary Focus Integrity and Availability of Data
Information

Protecting against loss, Respecting individual privacy


Key Emphasis
corruption, and damage rights

Ensuring data is accurate, Preventing unauthorized access


Goal
available, and secure and disclosure

Anonymization, encryption,
Technological Focus Cybersecurity measures
consent management

Focus on data integrity and Focus on personal control,


Individual Rights
system availability consent, and trust
PAST DATA BREACH
Yahoo! HISTORY
Date: 2013-2016
Impact: Over 3 billion user accounts exposed.
The data breach of Yahoo is one of the worst and most infamous cases of a known
cyberattack and currently holds the record for the most people affected.
The first attack occurred in 2013, and many more would continue over the next three years.
Facebook
Date: April 2021
Impact: 530 million users exposed
Although one of the world’s largest companies, Facebook is no stranger to data leaks and controversy.
The social media giant has constantly dealt with security breaches of user data since the company went public in 2012.
The company’s massive data breach in April 2021 was one of its largest, leaking names,
phone numbers, account names, and passwords of over 530 million people to the public.

Microsoft
Date: January 2021
Impact: 30,000 US companies (60,000 companies worldwide).
In one of the largest cyberattacks in US history, over 30,000 US businesses were affected by a sweeping attack on
the Microsoft Exchange email servers, one of the largest email servers in the world.
The hackers were able to exploit four different zero-day vulnerabilities that allowed
them to gain unauthorized access to emails from small businesses to local governments.
TOOLS FOR INCREASING DATA
SAFETY
BaseCrack [Cryptography]
BaseCrack is a Python tool that can decode all alphanumeric base encoding schemes. It can be
used for cryptography, CTFs, and bug bounty hunting.
Enforced Encryption
Enforced Encryption is a feature that allows IT administrators to automatically encrypt confidential data that is
transferred to USB storage devices. It can be used on both Windows and macOS computers

• eDiscovery
Electronic discovery (eDiscovery) is the process of finding and collecting electronically
stored information (ESI). It's typically used for lawsuits, investigations, or legal
purposes.
ANNEXUR
E
• https://securdi.com/cyber-security/an-introduction-to-data-privacy-a
nd-data-security/
• https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-priv
acy/
• https://www.upguard.com/blog/biggest-data-breaches-us
• https://www.digitalguardian.com/blog/history-data-breaches
• https://www.enzuzo.com/blog/data-privacy-benefits#:~:text=Individu
al%20data%20privacy%20helps%20both,%2C%20fraud%2C%20and%
20financial%20loss
.
• https://www.integrate.io/blog/what-is-data-privacy-why-is-it-importa
nt/
Thank you

You might also like