Professional Documents
Culture Documents
Cyber Security Awareness
Cyber Security Awareness
CYBERCRIME SECURITY
AWARENESS
Done by:
Navin.S
Sanjay.J
Solomonraja.S
Manisha.N
ABSTRACT:
Option Percentage
18-20 66.7
20-30 33.3
WHAT IS THE BEST WAY TO PROTECT
YOUR PERSONAL DATA?
Option Percentage
Use strong passwords 90.8
Share personal 9.2
information on social
media
WHAT IS PHISHING ATTACK?
Options Percentage
A fishing competition 37
A type of scam where 69
hackers steal your
information
HOW CAN YOU RECOGNISED A PHISHING EMAIL?
Option Percentage
It contains a 64.4
suspicious link
It comes from a 35.6
known and
trusted sources
What is a firewall
Option Percentage
A tool for sharing 33.3
lage files
A barrier that 66.7
blocks hackers
from accessing
your computer
Which of the following is a secure way to connect
to a public wifi network?
Option Percentage
Use a virtual private 83
network (VPN)
Share your personal 17
information with
anyone who ask
Why it is important to update your computer’s
operating system and software
Option Percentage
To fix security 87.8
vulnerabilities
To create new bugs 18.2
What are two factor authentication (2FA) and
multifactor authentication(MFA)
Option Percentage
Additional securities 88.6
beyond a username
and password
Ways to bypass 11.4
security measures
What is social engineering
Option Percentage
The use of social 70.5
media to hack into
computers
Ways to bypass 29.5
security measures
REVIEW OF LITERATURE
E-INFRASTRUCTURE
Further, e-infrastructure helps to integrate various
Technologies including different computer systems, Internet
broadband channels, computing power, Data storage, data
sharing, and many more. To meet the growing challenges of
globalization and Also cope-up with the sustainable growth of
Information and communication technology, it is Essentially
required to integrate these systems by Developing better e-
infrastructure.
E-Infrastructure in India
In today’s world, e-infrastructure is the key element For the
development of a society. E-infrastructure facilitates competent
equipment And favorable resources and opportunities that are
Essentially needed to for the safety, security, and Development
of a society.
INITIATIVES TAKEN SO FAR...
By understanding the growing demand and Challenges, the
Department of Information Technology formulated a ‘National
Policy on Universal Electronic Accessibility’.
The policy was approved by the union cabinet in 2013.The
major strategies adopted in the implementation Of the policy
have been taken from the Press Information Bureau
Government of India Cabinet October 3, 2013 –
Creating awareness on universal electronics Accessibility and
universal design. Capacity building and infrastructure
development. Setting up of model electronics and ICTs centres
for Providing training and demonstration to special Educators
and physically as well as mentally Challenged persons.
Conducting research and development, use of Innovation,
ideas, technology etc. Whether Indigenous or outsourced from
aabroad .
Developing programme and schemes with greater Emphasis
for differently abled women/children.
Developing procurement guidelines for electronics And ICTs for
accessibility and assistive needs.
●ITIR
For the exclusive growth of E-infrastructure in India, the
Government of India has formulated the policy on ‘Information
Technology Investment Regions (ITIRs) in 2008.
As per the policy, ITIRs will be self-contained integrated
township with the purpose to accelerated growth of
Information Technology, Information Technology Enabled
Service, and Electronic Hardware Manufacturing units.
Further, the policy has recommended to assign Minimum area
of 40 sq. Km for ITIR. However, out Of the total demarcated
area, 40% should be Reserved for the processing zone and the
Remaining area for the non-processing zone.
The processing zone will include –
Information Technology/Information Technology Enabled
Services
Electronic Hardware Manufacturing Units
Logistics and other services and required infrastructure.
On the other hand, the non-processing area will Include –
Residential area
Commercial area
Other social and institutional infrastructure
●National Knowledge Network
In 2009, in order to create an infrastructure that can fulfil the
future requirements, the concept of ‘National Knowledge
Network’ (NKN) is conceptualized.
The concept of NKN is designed to Encourage, Enable, Enrich,
and Empower the user community to test and implement the
innovative ideas without any restrictions.
Further, the NKN will provide better –
Network design
Security requirements
Service requirements
Operational requirements
CONCLUSION
Cybersecurity is important because it protects all Categories of
data from theft and damage. This Includes sensitive data,
personally identifiable Information (PII), protected health
information (PHI), personal information, intellectual property,
Data, and governmental and industry information Systems.
BIBLIOGRAPHY
https://www.tutorialspoint.com/
fundamentals_of_science_and_technology/
einfrastructure_in_india.htm
https://www.tutorialspoint.com/
fundamentals_of_science_and_technology/
cyber_crime_and_cyber_security.htm
https://www.britannica.com/technology/data-science
https://www.upguard.com/blog/cybersecurity-
important#:~:text=Cybersecurity%20is%20important
%20because%20it,governmental%20and%20industry
%20information%20systems.