Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Security TPP 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

(Action Against Cyber Crime)

CYBER SECURITY
 What is Cyber Security
Cyber Security standards enable organizations to practice safe security
techniques to minimize the number of successful cyber security attacks.

Cyber security refers to the technologies and processes designed to protect


computers, networks and data from unauthorized access, vulnerabilities and
attacks delivered via the Internet by cyber criminals.
 What is….?
Communication security - protecting organizations communication media,
technology, and content.

Network security - is the protection of networking components, connections


and content.

Information security - protection of information and its critical elements,


including the system and hardware that use, store or transit that information.
 What is Cyber Crime ?
The former descriptions were “computer crime”, “computer-related crime”, or
“crime by computer". With the pervasion of digital technology, some new
terms like “high-technology” or “information-age "crime were added to the
definition. Also, Internet brought other new terms, like “cyber crime” and “net
"crime.

Other forms include “digital”, “electronic”, “virtual”, “IT”, “high-tech” and


“technology- enabled” crime.
 History
The first recorded cyber crime was recorded in the year 1820.

The first spam email took place in 1978 when it was sent over the Arpanet.

The first Virus was installed on an Apple Computer in 1978.


 Cyber Crimes includes
Illegal access

Illegal Interception

System Interface

Data Interface

Misuse of devices

Fraud
 Why should we care ?

Criminal activity committed on the internet.

Cyber crime- where computer is either a tool or target or


both.
 How can we prevent cyber crime?
Read Privacy policy carefully when you submit the data
through internet.

Encryption : lots of websites uses SSL (secure socket layer)


to encrypt a data.

Disable remote connectivity.


 Advantages of cyber security

It will defend from hacks and virus.

The application of cyber security used in our PC needs


update every week.

The security developers will update their database every


week once. Hence the new virus also deleted.
 Safety Tips
 Use antivirus software.

 Insert firewalls, pop up blocker.

 Uninstall unnecessary software.

 Maintain backup.

 Check security settings.

 Use secure connection.

 Open attachments carefully.

 Use strong passwords, don’t give personal information unless required.


 Conclusion

The only system which is truly secure s one which is switched off
and unplugged.

So, only way to be safe is pay attention and Act smart.


 Acknowledgement
 It gives us immense pleasure for presenting this paper “A Study of Cyber Security
challenges, issues and its emerging trends on latest technologies”. We profoundly thank
our principal …………….. for giving us support throughout the course and thus made us
capable of being worthy of recognition and extended every facility to us for making and
completing this paper smoothly .

 We would like to express our sincere thanks to ………………. (Head of IF Department)


and …………….. (Head of CO Department ) for their constant encouragement and for
giving this golden opportunity to us .

-Thank You

You might also like