Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

PRESENTATION ON

CYBER SECURITY
PRODUCED BY:-NUPUR BANDIVADEKAR
FROM CLASS X CASHEW

1
CATALOGUE
1) DESCRIPTION.
2) INSTANCE.
3) GENRES OF CYBER SECURITY.
4) SIGNIFICANCE.
5) ALERTNESS.
6) CYBER SECURTIY FOR STUDENTS.
7) HARM.
8) RISKS.
9) SOLUTION.
10) DEMAND IN PAKISTAN.
11) CONCLUSION.
2
1) OFFERING AN DESCRIPTION CYBER SECURITY.
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks. These cyberattacks are usually aimed at accessing, changing, or destroying
sensitive information; extorting money from users via ransomware; or interrupting
normal business processes.
Implementing effective cybersecurity measures is particularly challenging today because
there are more devices than people, and attackers are becoming more innovative.

3
2) INSTANCE OF CYBER SECURITY.
Cyber security is the protection of internet-connected systems such as hardware,
software and data from cyber threats. The practice is used by individuals and
enterprises to protect against unauthorized access to data centers and other
computerized systems.

4
3) GENRES OF CYBER SECURITY.
The 3 major types of cyber security are network security, cloud security, and
physical security. Your operating systems and network architecture make up your
network security. It can include network protocols, firewalls, wireless access
points, hosts, and servers.

5
4) SIGNIFICANCE OF CYBER SECURITY.
Cyber security is critical because it helps to protect organizations and
individuals from cyber attacks. Cyber security can help to prevent data
breaches, identity theft, and other types of cybercrime. Organizations must have
strong cyber security measures to protect their data and customers.

6
5) CYBER ALERTNESS WHICH WE SHOULD HAVE.

Cyber awareness refers to the level of awareness and understanding


end users have about cyber security best practices and the cyber
threats that their networks or organizations face everyday.

7
6.CYBER SECURITY FOR STUDENTS.
Cyber security is important for students because they often target cyber attacks.
In a recent case, a group of students from a college in the United States was
targeted by hackers who gained access to their personal information, including
their Social Security numbers and credit card information.

8
7. HARMS WE COULD HAVE AFTER CYBER ATTACK.
During a cyber attack, the attacker gains unauthorized access to a computer
system, network, or device for stealing, modifying, or destroying data. The
attacker may use a variety of tactics, including malware, social engineering, or
exploiting vulnerabilities in software or systems.

9
8. RISKS OF HAVING CYBER ATTACK.
Malware is the most common type of cyber attack, mostly because this term
encompasses many subsets such as ransom ware, Trojans, spyware, viruses,
worms, key loggers, bots, crypto jacking, and any other type of malware attack
that leverages software in a malicious way.

10
9. SOLUTION THROUGH THIS PROBLEM.

Cyber security solutions are technological tools and services that help
protect organizations against cyber attacks, which can result in
application downtime, theft of sensitive data, damage to reputation,
compliance fines, and other adverse consequences.

11
10) DEMAND IN PAKISTAN.
In 2023, the demand for cyber security professionals in Pakistan is also
expected to increase because current cyberspace lacks intelligent theft
investigation skills. Thus organizations now seek innovative procedures by
cyber security experts who can help them meet their security objectives.

12
11) LAST BUT NOT LEAST THE CONCLUSON.
Cyber security is one of the most important aspects of the fast-
paced growing digital world. The threats of it are hard to deny, so
it is crucial to learn how to defend from them and teach others
how to do it too.

13
"I THINK COMPUTER VIRUSES SHOULD COUNT AS LIFE. I THINK IT
SAYS SOMETHING ABOUT HUMAN NATURE THAT THE ONLY FORM
OF LIFE WE HAVE CREATED SO FAR IS PURELY DESTRUCTIVE. WE'VE
CREATED LIFE IN OUR OWN IMAGE."

-STEPHEN HAWKING

14

You might also like