2
Most read
3
Most read
8
Most read
INTRODUCTION TO CYBER SECURITY
Submitted to
Mr Rohit Kumar Roy
Submitted By
Shivang Dhoundiyal
ID-21451068
B.Sc Animation and Gaming
Section-B
Contents Covered In This Presentation
•Introduction
•Cyber Security definition
•Cyber Security elements
•Why is cyber security important
•Cyber threats
•Cyber threats methods
•Tips on building your cyber security
•conclusion
Introduction
• Since the 1970s, computer usage starts to grow and reaches every
aspect commercially and personally.
• Despite their handiness, computers are also prone to several threats.
• IBM and other early computer companies have already provided
security software products since the seventies.
• As the computer and digital media development, the threats also get
developed.
• To counteract them, people nowadays are creating protection called
Cyber Security.
• The term refers to a protection system for computers and networks
from theft, damage, disruption, illegal changing, or information
disclosure taken from the electronic data, software, or hardware.
• The definition might seem simple, but in reality, the varied and
enhanced technologies like smartphones, websites, televisions,
Internet of Things (IoT) require a complicated cyber security system.
CYBER SECURITY DEFINITION
Cyber Security’s elements
• Based on the function and media, cyber security system covers these types
of security:
Data security:
In every single network, hardware, and software, there must be data provided by the
owners, clients, or even the third party. Data security protects by giving limited access
only to the authorized ones to prevent any data theft.
Application security:
This type of security should be developed from the design stage of the program.
Continuous updates of the apps should include the security system, so new threats
could be detected early.
Mobile security:
Mobiles including tablets and cell phones are also prone to threats that could come
from wire/devices like USB and wireless like Bluetooth and the internet.
Network security:
By connecting people, networks have a bigger possibility of getting intrusion and
attacks. The admin/host is also a part of the security system.
Why is Cyber Security important?
• As mentioned before, cyber threats could bring any damages to the data,
hardware/software, and reputation. Further problems such as data abuse and
data leaking are likely to happen. On the contrary, all types of data including
intellectual property, non-public personal information (NPI), and non-public
corporate information are sensitive information that must be protected.
• There have been creative ways of stealing sensitive information and simple
protections like anti-virus app is not enough to prevent the threats. Hence
governments in several countries participate in making regulations related to
cyber security. An example is General Data Protection Regulation (GDPR) in
European Union. Many other countries are also taking legal stances regarding
cyber matters.
• Unfortunately, some cases of data leaking also come from the governmental
body. Hence, the stakeholders and individuals need to be wise in managing the
data. Especially the institutions, the cyber security system must be designed
carefully to prevent any threats including data leaking intentionally or
unintentionally.
Cyber Threats
• Digital threats are categorized into three types that are
cybercrime, cyber-attack, and cyber-terrorism.
Cybercrime is organized by a person or a group targeting
financial profit or disruption. Cyber-attack is mostly
driven by political motives and cyber terrorism is mostly
done in massive act to cause certain fear. To make those
threats happen, cybercriminals usually use these
methods. Some of these threats are given in the next
slide.
Cyber Threats Methods
• Phishing: the most frequent threat might be phishing. It is an illegal act to steal one’s private data
by sending them a link that redirects to fake sites or forms requiring users’ personal information.
• Malware: acronym of Malicious Software, Malware enables attackers or hackers to have access to
the installed device.
• SQL Injection: it stands for Structured Query Language. Just like its name, SQL is a code injected
into an entry field that exploits the security vulnerability.
• Backdoor: similar to the name, the backdoor is a technique to access a program by passing the
‘main’ normal authentication. It is usually inserted by program developers or hackers, and it is hard
to detect.
• Denial-of-service attack: this attack employs ‘denial’ by the system by submitting the wrong
password or overloading a network/machine’s capabilities to make the service unavailable.
Another example is zombie computers.
• Direct-access attack: contrary to a denial-of-service attack, the direct-access attack is done by
installing keyloggers, worms, a wireless mic, or covert listening devices to make operating system
modifications for direct access to the original one.
• Spoofing: it is a masquerade act that comes from data falsification. Examples include biometric
spoofing, IP address spoofing, and email spoofing.
Tips on building your Cyber Security
• Avoid any suspicious emails, chats, texts, or links from unknown senders.
Especially if they ask you to input your particular data.
• Regularly update pins or passwords with unique and strong ones. This could
block access to the hackers that are currently logging into your account.
• Never use public and unsecured Wi-Fi. People could break into your device using
a wireless connection.
• Have a secure backup.
• Use cyber security technologies such as Identity and Access Management (IAM),
Security information and event management (SIEM), and data security platform.
• Educate and check the staff to minimize the insider threat.
• Try Third-Party Risk Management (TRPM).
• Employ IT professionals that could detect any possible threats or protect from
any hackers’ attacks.
CONCLUSION
• We are living in digital era and digital technology has
transformed our lives promoting the need for Cyber Security.
• Cyber Security is a very important concern today due to
digitization and Information exchange.
• Cyber Attacks have started affecting most of the systems today
because of the dependency on technology.
• Cyber Attacks are on the rise, because there are various
ways and means through which a system can be
compromised.
• It is absolutely necessary to understand the technical
functioning of the Cyber Attacks to prevent and handle them
better.
Thank You!

More Related Content

PPTX
Cyber Security PPT.pptx
PPTX
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PPTX
Cyber Security PPT.pptx
PPTX
Cyber Security PPT.pptx
PPTX
Cysec.pptx
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
PPTX
Cyber Security PPT.pptx
PPTX
Cysecc.pptx
Cyber Security PPT.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
Cyber Security PPT.pptx
Cyber Security PPT.pptx
Cysec.pptx
hgfhvgggggggggggggggggggggggpresent.pptx
Cyber Security PPT.pptx
Cysecc.pptx

Similar to Introduction Of Cyber Security in 2024.pptx (20)

PPTX
Rishabhcyber security.pptx
PPTX
Cyber Security PPT.pptx
PPTX
Cybersecurity All information and topic wise
PDF
Presentation 10 (1).pdf
PPTX
The Importance OF Cybersecurity and trends
PPTX
CyberSecurityPPT presentation _V3_1.pptx
PPTX
Cyber security and its controls.pptx
PPTX
CYBER SECURITY and to protect our selves
PPTX
Cyber Security awareness of cyber security
PPTX
Cyber Security: A Hands on review
PPTX
CyberSecurity topics with challenges.pptx
PPTX
CyberSecurityPPT_V3_1.pptx CyberSecurityPPT_V3_1.pptx
PDF
Cyber security
PPTX
What is Cyber & information security.pptx
PPTX
Cyberattacks.pptx
PPTX
Computing Security In CloudComputing.pptx
PPTX
cyber threats and attacks.pptx
PPTX
CyberSecurity Presentation on Cyber security practicies
PPTX
CyberSecurityPPT_V3_1.pptx Awerness cyber
PPTX
IT Security and Wire Fraud Awareness Slide Deck
Rishabhcyber security.pptx
Cyber Security PPT.pptx
Cybersecurity All information and topic wise
Presentation 10 (1).pdf
The Importance OF Cybersecurity and trends
CyberSecurityPPT presentation _V3_1.pptx
Cyber security and its controls.pptx
CYBER SECURITY and to protect our selves
Cyber Security awareness of cyber security
Cyber Security: A Hands on review
CyberSecurity topics with challenges.pptx
CyberSecurityPPT_V3_1.pptx CyberSecurityPPT_V3_1.pptx
Cyber security
What is Cyber & information security.pptx
Cyberattacks.pptx
Computing Security In CloudComputing.pptx
cyber threats and attacks.pptx
CyberSecurity Presentation on Cyber security practicies
CyberSecurityPPT_V3_1.pptx Awerness cyber
IT Security and Wire Fraud Awareness Slide Deck
Ad

Recently uploaded (20)

PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
Climate Change and Its Global Impact.pptx
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
Chevening Scholarship Application and Interview Preparation Guide
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Health aspects of bilberry: A review on its general benefits
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PPTX
Thinking Routines and Learning Engagements.pptx
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PDF
Hospital Case Study .architecture design
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Physical education and sports and CWSN notes
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Diabetes Mellitus , types , clinical picture, investigation and managment
FYJC - Chemistry textbook - standard 11.
Climate Change and Its Global Impact.pptx
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
Chevening Scholarship Application and Interview Preparation Guide
ACFE CERTIFICATION TRAINING ON LAW.pptx
Journal of Dental Science - UDMY (2022).pdf
0520_Scheme_of_Work_(for_examination_from_2021).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Health aspects of bilberry: A review on its general benefits
faiz-khans about Radiotherapy Physics-02.pdf
Thinking Routines and Learning Engagements.pptx
Laparoscopic Colorectal Surgery at WLH Hospital
Power Point PR B.Inggris 12 Ed. 2019.pptx
Hospital Case Study .architecture design
PLASMA AND ITS CONSTITUENTS 123.pptx
Physical education and sports and CWSN notes
Journal of Dental Science - UDMY (2020).pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Ad

Introduction Of Cyber Security in 2024.pptx

  • 1. INTRODUCTION TO CYBER SECURITY Submitted to Mr Rohit Kumar Roy Submitted By Shivang Dhoundiyal ID-21451068 B.Sc Animation and Gaming Section-B
  • 2. Contents Covered In This Presentation •Introduction •Cyber Security definition •Cyber Security elements •Why is cyber security important •Cyber threats •Cyber threats methods •Tips on building your cyber security •conclusion
  • 3. Introduction • Since the 1970s, computer usage starts to grow and reaches every aspect commercially and personally. • Despite their handiness, computers are also prone to several threats. • IBM and other early computer companies have already provided security software products since the seventies. • As the computer and digital media development, the threats also get developed. • To counteract them, people nowadays are creating protection called Cyber Security.
  • 4. • The term refers to a protection system for computers and networks from theft, damage, disruption, illegal changing, or information disclosure taken from the electronic data, software, or hardware. • The definition might seem simple, but in reality, the varied and enhanced technologies like smartphones, websites, televisions, Internet of Things (IoT) require a complicated cyber security system. CYBER SECURITY DEFINITION
  • 5. Cyber Security’s elements • Based on the function and media, cyber security system covers these types of security: Data security: In every single network, hardware, and software, there must be data provided by the owners, clients, or even the third party. Data security protects by giving limited access only to the authorized ones to prevent any data theft. Application security: This type of security should be developed from the design stage of the program. Continuous updates of the apps should include the security system, so new threats could be detected early. Mobile security: Mobiles including tablets and cell phones are also prone to threats that could come from wire/devices like USB and wireless like Bluetooth and the internet. Network security: By connecting people, networks have a bigger possibility of getting intrusion and attacks. The admin/host is also a part of the security system.
  • 6. Why is Cyber Security important? • As mentioned before, cyber threats could bring any damages to the data, hardware/software, and reputation. Further problems such as data abuse and data leaking are likely to happen. On the contrary, all types of data including intellectual property, non-public personal information (NPI), and non-public corporate information are sensitive information that must be protected. • There have been creative ways of stealing sensitive information and simple protections like anti-virus app is not enough to prevent the threats. Hence governments in several countries participate in making regulations related to cyber security. An example is General Data Protection Regulation (GDPR) in European Union. Many other countries are also taking legal stances regarding cyber matters. • Unfortunately, some cases of data leaking also come from the governmental body. Hence, the stakeholders and individuals need to be wise in managing the data. Especially the institutions, the cyber security system must be designed carefully to prevent any threats including data leaking intentionally or unintentionally.
  • 7. Cyber Threats • Digital threats are categorized into three types that are cybercrime, cyber-attack, and cyber-terrorism. Cybercrime is organized by a person or a group targeting financial profit or disruption. Cyber-attack is mostly driven by political motives and cyber terrorism is mostly done in massive act to cause certain fear. To make those threats happen, cybercriminals usually use these methods. Some of these threats are given in the next slide.
  • 8. Cyber Threats Methods • Phishing: the most frequent threat might be phishing. It is an illegal act to steal one’s private data by sending them a link that redirects to fake sites or forms requiring users’ personal information. • Malware: acronym of Malicious Software, Malware enables attackers or hackers to have access to the installed device. • SQL Injection: it stands for Structured Query Language. Just like its name, SQL is a code injected into an entry field that exploits the security vulnerability. • Backdoor: similar to the name, the backdoor is a technique to access a program by passing the ‘main’ normal authentication. It is usually inserted by program developers or hackers, and it is hard to detect. • Denial-of-service attack: this attack employs ‘denial’ by the system by submitting the wrong password or overloading a network/machine’s capabilities to make the service unavailable. Another example is zombie computers. • Direct-access attack: contrary to a denial-of-service attack, the direct-access attack is done by installing keyloggers, worms, a wireless mic, or covert listening devices to make operating system modifications for direct access to the original one. • Spoofing: it is a masquerade act that comes from data falsification. Examples include biometric spoofing, IP address spoofing, and email spoofing.
  • 9. Tips on building your Cyber Security • Avoid any suspicious emails, chats, texts, or links from unknown senders. Especially if they ask you to input your particular data. • Regularly update pins or passwords with unique and strong ones. This could block access to the hackers that are currently logging into your account. • Never use public and unsecured Wi-Fi. People could break into your device using a wireless connection. • Have a secure backup. • Use cyber security technologies such as Identity and Access Management (IAM), Security information and event management (SIEM), and data security platform. • Educate and check the staff to minimize the insider threat. • Try Third-Party Risk Management (TRPM). • Employ IT professionals that could detect any possible threats or protect from any hackers’ attacks.
  • 10. CONCLUSION • We are living in digital era and digital technology has transformed our lives promoting the need for Cyber Security. • Cyber Security is a very important concern today due to digitization and Information exchange. • Cyber Attacks have started affecting most of the systems today because of the dependency on technology. • Cyber Attacks are on the rise, because there are various ways and means through which a system can be compromised. • It is absolutely necessary to understand the technical functioning of the Cyber Attacks to prevent and handle them better.