Professional Documents
Culture Documents
17 Cs 39
17 Cs 39
17 Cs 39
Submitted By
Saurabh Chaturvedi
(9409020894)
Under Supervision of
Dr. Vinay Rishiwal
1
Candidate’s Declaration
I Hereby declared that seminar report titled “Cyber security”, is prepared by me based on available
literature and I have not submitted it anywhere else for the award of any other degree
2
Certificate From Suprevisor
I certify that the above statement made by the candidate is true to the best my
knowledge
3
ABSTRACT
4
ACKNOWLEDGEMENT
I would like to greatefully acknowledge the enthusiastic suprervision of
Dr.Vinay rishiwal (Prof. CSIT, MJPRU Bareilly) during seminar. He inspired me
greatly and his willingness to motivate me contributed tremendously to my
seminar.without his encouredgement and guidance this seminar wuld not have
motorized.
I am also greatful to Prof.S.S.Bedi(HOD,Computer Science & Information
Technology,MJPRU,Bareilly)for completing this.
I would also like to thank all the teaching and non- teaching faculty members
and friends,who have a great help through their analytical comment and
reviews.
The guidance and support received from all the and help.
members wh contributed to this seminar, was vital for the success for this
presentation . I am greatful for their constant support
5
TABLE OF CONTENTS
Cover Page…………………………………………………1
Candidate’s Declaration……………………………..2
Certificate From supervisor……………………….3
Abstract……………………………………………………..4
Acknowledgement……………………………………..5
Introduction to Cyber Security……………………7
Cyber Crime………………………………………………..8
Challenges of Cyber Security……………………….9-10
Cyber Threat………………………………………………..10-12
How to Avoid cyber Attack………………………….12
Antivirus and Firewalls…………………………………12-14
Advantages and Disadvantages…………………….15
Conclusion…………………………………………………….16
REFERENCES……………………………..17
6
INTRODUCTION TO CYBER SECURITY
7
Cyber Crime
Categories of Cybercrime:
We can categorize cyber crime into two ways:
• The computer as a target: Using a computer to attack other computers
e.g. Hacking, Virus/Worms attack, Dos attack etc.
8
CHALLENGES OF CYBER SECURITY
9
with wireless computing. Mobile security is also known as
wireless security.
END-USER SECURITY: The end-user is usually the weakest link
when it comes to cybersecurity and that is what attackers are countin on.
This is why phishing is such a popular technique for spreading
ransomware.
CYBER THREATS
• Update regularly
• Passwords: don’t re-use them
• Download from authorised sources
• 'Administrator' shouldn't be your default setting
• Turn off when you’re done
• Encrypt to keep your stuff unreadable
11
malware variants, all with the intent of causing the most disruption and
damage as possible.
12
software from your computer such as viruses, worms and Trojan horses. It may
also prevent or remove unwanted spyware and adware in addition to other
types of malicious programs. The first versions of antivirus software can be
traced as far back as the 1980s.
Packet filtering
13
The most basic form of firewall software uses pre-determined security rules to
create filters – if an incoming packet of information (small chunk of data) is
flagged by the filters, it is not allowed through. Packets that make it through the
filters are sent to the requesting system and all others are discarded.
Proxy service
A firewall proxy server is an application that acts as an intermediary between
systems. Information from the internet is retrieved by the firewall and then sent
to the requesting system and vice versa. Firewall proxy servers operate at the
application layer of the firewall, where both ends of a connection are forced to
conduct the session through the proxy. They operate by creating and running a
process on the firewall that mirrors a service as if it were running on the end
host, and thus centralise all information transfer for an activity to the firewall
for scanning.
Stateful inspection
The most modern method of firewall scanning, that doesn't rely on the memory-
intensive examination of all information packets is ‘stateful inspection’. A
‘stateful’ firewall holds significant attributes of each connection in a database of
trusted information, for the duration of the session. These attributes, which are
collectively known as the ‘state’ of the connection, may include such details as
the IP addresses and ports involved in the connection and the sequence being
transferred. The firewall compares information being transferred to the copy
relevant to that transfer held in the database – if the comparison yields a
positive match the information is allowed through, otherwise it is
denied.numbers of the packets
14
ADVANTAGES AND DISADVANTAGES
DISADVANTAGES:
1) Firewalls can be difficult to configure correctly.
15
CONCLUSION
we can say that Cyber the Security is one of government most of India took a
major step and introduced an act in the year 2000 which is called as (IT act 2000)
which states that it is the primary law in India dealing with cybercrime and
electronic commerce. The Act providesa legal framework for electronic
governance by giving recognition to electronic records and digital signatures. It
also defines cyber crimes and prescribes penalties for them.
Cybersecurity is a never-ending battle. A permanently decisive solution to the
problem will not be found in the foreseeable future,even Mark Zukerberg the
creator of one of the most used social networking sites Facebook important
issues that we have faced with the increase in technological advancements,
anything and everything that exists on the internet isn't completely safe. With
the increase in Cyber crimes in India the
is seen covering his laptop's front camera with a duct tape so that the camera
might not be accessed by anyone else then what else can we expect from our
security.
So, be littie cautious and attentive while using/working on the internet because
the safety is in your hands only.
16
REFERENCES
1. https://www.udemy.com/course/the-complete-
internet-security-privacy-course-volume-1/
2. https://www.geeksforgeeks.org/cyber-system-
security/
5. https://en.wikipedia.org/wiki/Cybercrime
17