This document discusses cyber security and the need for protection from online threats. It defines cyber security as the security of online information and explains how threats are increasing as more people go online. It then covers various cyber security issues like viruses, hackers, malware, Trojan horses, and password cracking. For each issue, it provides definitions and solutions, such as using antivirus software, strong passwords, firewalls, and regular software updates to enhance cyber security.
2. INTRODUCTION
The term cyber security is used to refer to the security offered through on-
line services to protect your online information.
With an increasing amount of people getting connected to Internet, the
security threats that cause massive harm are increasing also.
3. ****TO UNDERSSTAND****
Meaning Of Cyber Security.
Need Of Cyber security.
Security Problems In Cyber Field and Its Solutions.
4. Meaning Of Cyber
It is a combining form relating to information technology, the Internet, and
virtual reality.
5. Need Of Cyber Security:
Cyber security is necessary since it helps in securing data from threats such as
data theft or misuse, also safeguards your system from viruses.
10. Hackers
A hacker is a person who breaks into computers, usually by gaining access to
administrative controls.
11. Types Of Hackers
White Hat Hacker
A computer security specialist who breaks into protected systems and networks to test and asses their security.
Grey Hat Hacker
violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
Black Hat Hacker
A hacker who violates computer security for personal gain.
12. How To Prevent Hacking
It may be impossible to prevent computer hacking, however effective security
controls including strong passwords, and the use of firewalls can helps.
13. Malware
The word "malware" comes from the term "MALicious softWARE."
Malware is any software that infects and damages a computer system without
the owner's knowledge or permission.
14. How to Stop malware
Download an anti-malware program that also helps prevent infections.
Activate Network Threat Protection , Firewall, Antivirus.
15. Trojan Horses
Trojan horses are email viruses that can duplicate them selves, steal
information, or harm the computer system.
16. How to Avoid Trojan Horses
Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses.
17. Password Cracking
Password attacks are attacks by hackers that are able to determine passwords or
find passwords to different protected electronic areas and social network sites.
18. Securing Password
Use always Strong password.
Never use same password for two different sites.