6
Most read
7
Most read
9
Most read
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
Malware protection:
To analyze attack codes malware protection
program is established.
Internet gateway and firewalls:
It watch out all the network entrance. All the
malicious software trying to enter to secure
network are drained to block and detect the
malware activities web filtering, firewall
policies and content checking are used.
Secure configuration: Hardware devices,
operating system are designed with low
security
Patch management: In software program it is
the latest version to prevent infected software
programs.
User access control: Normal user’s privileges
are limited by providing access control policy.
Techniques
used in
Cyber
security
Malicious attacks:
This is used by cyber criminals to delete, modify and alter a secure
data which is known as malwares. E.g. of malwares are:
Spyware:
Overall computer control are taken down in which personal
information are collected without users knowledge.
Viruses:
Files or computer information are corrupted or modified. By a single
software program the virus enter to the system. From one computer
to the other the virus spread by attacking the files in the computer.
Password attacks:
On cracking user’s password the attacks are focused. By following
alphanumeric procedure the user must protect the password.
APPLICATIONS OF CYBER SECURITY PROJECT
CYBER SECURITY
Types of cyber Attack
• Cyber war: Cyber wars are carried out by nation for the
purpose of disturbing and hacking data’s of
neighbouring countries. Advanced persistent threats are
used for extracting the countries data.
• Cybercrime: Group of members or individuals are
attempt cyber crime with an attitude to extract money.
In place of credit & debit card hacking or the crack
online password cyber crime occurs.
• Cyber threats: For illegal activities criminals, spies and
terrorists use cyber based technology as to manipulate
the data, to deny the distributed services or attack a
systems security.
9 D’s Concepts in Cyber
Security
• Cyber security projects use 9D’s concept to avoid
DDoS attack problems. 9D’s are
• Deter attacks,
• Detect attacks,
• Drive up difficulty,
• Differentiate protections,
• Dig beneath the threat,
• Diffuse protection throughout the payload,
• Distract with decoys,
• Divert attackers to other targets,
• Depth of defence.
Pranavi verma-cyber-security-ppt

More Related Content

PDF
1. introduction to cyber security
PDF
Cyber Security Vulnerabilities
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Introduction to cyber security amos
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
1. introduction to cyber security
Cyber Security Vulnerabilities
Cyber security system presentation
Cyber security
Cyber security presentation
Cyber security
Introduction to cyber security amos
Cybersecurity Attack Vectors: How to Protect Your Organization

What's hot (20)

PPTX
Cyber crime and security
PPTX
Cyber Crime And Security
PPT
CYBER CRIME AND SECURITY
PDF
Combating Cyber Security Using Artificial Intelligence
PPTX
Cyber security
PPTX
Introduction to cyber security
PPTX
CYBER SECURITY
PPTX
Social engineering
PPTX
Introduction to cyber security
PPTX
Cyber Crime - What is Cyber Crime
PPTX
Cybersecurity
PPT
Cyber security standards
PPTX
Cybersecurity
PPTX
Cyber Crime
PDF
Introduction-to-Cyber-Security presentation.pdf
PPTX
Cyber Security A Challenges For Mankind
PPTX
CYBER SECURITY
PPT
Introduction to Cyber Security
PPTX
cyber security
PPTX
Cyber security
Cyber crime and security
Cyber Crime And Security
CYBER CRIME AND SECURITY
Combating Cyber Security Using Artificial Intelligence
Cyber security
Introduction to cyber security
CYBER SECURITY
Social engineering
Introduction to cyber security
Cyber Crime - What is Cyber Crime
Cybersecurity
Cyber security standards
Cybersecurity
Cyber Crime
Introduction-to-Cyber-Security presentation.pdf
Cyber Security A Challenges For Mankind
CYBER SECURITY
Introduction to Cyber Security
cyber security
Cyber security
Ad

Similar to Pranavi verma-cyber-security-ppt (20)

PPTX
Presentation on Cyber Security
PPTX
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PPTX
Cyber Security awareness of cyber security
PPTX
Cybersecurity Course in Hyderabad – Learn to Protect Digital Assets
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPT
cscnapd.ppt
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
What is Cyber & information security.pptx
PPTX
IBM2202E_Network Security_Group Work_General Security.pptx
PPTX
SECURITY AND ETHICS.pptx
PDF
Chapter 2 konsep dasar keamanan
PDF
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
PDF
Computer security
ODP
Security In Internet Banking
PDF
module 1 Cyber Security Concepts
PDF
Types-of-Cyber-Attacks-E-book.pdf
PPTX
chapitre 1 introduction to ethical hakcing.pptx
Presentation on Cyber Security
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
Cyber Security awareness of cyber security
Cybersecurity Course in Hyderabad – Learn to Protect Digital Assets
Cyber Security and Data Privacy in Information Systems.pptx
cscnapd.ppt
Cyber security.pptxelectronic systems, networks, and data from malicious
What is Cyber & information security.pptx
IBM2202E_Network Security_Group Work_General Security.pptx
SECURITY AND ETHICS.pptx
Chapter 2 konsep dasar keamanan
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Computer security
Security In Internet Banking
module 1 Cyber Security Concepts
Types-of-Cyber-Attacks-E-book.pdf
chapitre 1 introduction to ethical hakcing.pptx
Ad

More from PranaviVerma (20)

PPT
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
PPTX
It(402) class ix projects solution 2-pranavi verma
PPTX
It(402) class ix projects solution 5 pranavi verma
PPTX
Pranavi verma 9a-9125-sst ppt
PPTX
Sst geo climate pranavi verma
PPTX
Enterpreneureurial skills class-9-pranavi-verma
PPTX
Ict basic-skills-pranavi-verma
PPTX
Pranavi verma-class-9-communication-skills
PPTX
Pranavi verma-class-9-digital-presentation
PPTX
Pranavi verma-class-9-email-messaging
PPTX
Pranavi verma-class-9-green skills(1)
PPTX
Pranavi verma-class-9-mastering-typing
PPTX
Pranavi verma-class-9-spreadsheet
PPTX
Pranavi verma-class-9-word-processing
PPTX
Pranavi verma-fundamental unit of computer
PPTX
Matter in our surroundigs-pranavi-verma
PPTX
Pranavi verma-it 402 class ix-unit 11_presentation
PPTX
Food Security in India class 9 CBSE
PPSX
Ncc notes and important topics
PPTX
Bond of love
Pranavi verma-sst-eco-ch 2-sector-of-indian-economy
It(402) class ix projects solution 2-pranavi verma
It(402) class ix projects solution 5 pranavi verma
Pranavi verma 9a-9125-sst ppt
Sst geo climate pranavi verma
Enterpreneureurial skills class-9-pranavi-verma
Ict basic-skills-pranavi-verma
Pranavi verma-class-9-communication-skills
Pranavi verma-class-9-digital-presentation
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-green skills(1)
Pranavi verma-class-9-mastering-typing
Pranavi verma-class-9-spreadsheet
Pranavi verma-class-9-word-processing
Pranavi verma-fundamental unit of computer
Matter in our surroundigs-pranavi-verma
Pranavi verma-it 402 class ix-unit 11_presentation
Food Security in India class 9 CBSE
Ncc notes and important topics
Bond of love

Recently uploaded (20)

PPTX
Climate Change and Its Global Impact.pptx
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
PUBH1000 - Module 6: Global Health Tute Slides
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PDF
Hospital Case Study .architecture design
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
PDF
The TKT Course. Modules 1, 2, 3.for self study
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
Climate Change and Its Global Impact.pptx
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
semiconductor packaging in vlsi design fab
Journal of Dental Science - UDMY (2022).pdf
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
M.Tech in Aerospace Engineering | BIT Mesra
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PUBH1000 - Module 6: Global Health Tute Slides
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Laparoscopic Colorectal Surgery at WLH Hospital
Hospital Case Study .architecture design
Disorder of Endocrine system (1).pdfyyhyyyy
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
The TKT Course. Modules 1, 2, 3.for self study
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
Journal of Dental Science - UDMY (2020).pdf
PLASMA AND ITS CONSTITUENTS 123.pptx

Pranavi verma-cyber-security-ppt

  • 7. Malware protection: To analyze attack codes malware protection program is established. Internet gateway and firewalls: It watch out all the network entrance. All the malicious software trying to enter to secure network are drained to block and detect the malware activities web filtering, firewall policies and content checking are used. Secure configuration: Hardware devices, operating system are designed with low security Patch management: In software program it is the latest version to prevent infected software programs. User access control: Normal user’s privileges are limited by providing access control policy. Techniques used in Cyber security
  • 8. Malicious attacks: This is used by cyber criminals to delete, modify and alter a secure data which is known as malwares. E.g. of malwares are: Spyware: Overall computer control are taken down in which personal information are collected without users knowledge. Viruses: Files or computer information are corrupted or modified. By a single software program the virus enter to the system. From one computer to the other the virus spread by attacking the files in the computer. Password attacks: On cracking user’s password the attacks are focused. By following alphanumeric procedure the user must protect the password.
  • 9. APPLICATIONS OF CYBER SECURITY PROJECT CYBER SECURITY
  • 10. Types of cyber Attack • Cyber war: Cyber wars are carried out by nation for the purpose of disturbing and hacking data’s of neighbouring countries. Advanced persistent threats are used for extracting the countries data. • Cybercrime: Group of members or individuals are attempt cyber crime with an attitude to extract money. In place of credit & debit card hacking or the crack online password cyber crime occurs. • Cyber threats: For illegal activities criminals, spies and terrorists use cyber based technology as to manipulate the data, to deny the distributed services or attack a systems security.
  • 11. 9 D’s Concepts in Cyber Security • Cyber security projects use 9D’s concept to avoid DDoS attack problems. 9D’s are • Deter attacks, • Detect attacks, • Drive up difficulty, • Differentiate protections, • Dig beneath the threat, • Diffuse protection throughout the payload, • Distract with decoys, • Divert attackers to other targets, • Depth of defence.