Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

CYBER

SECURITY

MADE BY
191FA07004
191FA07005
INTRODUCTION

 Cyber Security was designed to help learners develop a deeper


understanding of modern information and system protection technology
and methods. ... Students, developers, managers, engineers, and even
private citizens will benefit from this learning experience.
 Special customized interviews with industry partners were included to
help connect the cyber security concepts to live business experiences.
IMPORTANCE OF CYBER SECURITY

 Cyber security is important because government, military, corporate,


financial, and medical organizations collect, process, and store
unprecedented amounts of data on computers and other devices. 
 Organizations transmit sensitive data across networks and to other
devices in the course of doing businesses, and cyber security
describes the discipline dedicated to protecting that information and
the systems used to process or store it.
MAJOR SECURITY PROBLEMS

Virus
Hacker
Malware
Trojanhouses
Password cracking
VIRUS AND WORMS

 An important distinction between computer viruses and worms is that viruses


require an active host program or an already-infected and active operating system
in order for viruses to run, cause damage and infect other executable files or
documents, while worms are stand-alone malicious programs that can self-
replicate.
SOLUTION

 Install a security suite that protects the computer against threats such as
Viruses and worms.
HACKERS

 In common a hacker is a person who breaks into computers,


usually by gaining access to administrative controls.
 In computer security, a hacker is someone who
focuses on security mechanisms of computer and
network systems.
  Nevertheless, parts of the subculture see their aim in
correcting security problems and use the word in a
positive sense.
TYPES OF HACKERS

 White Hat Hacker


 Grey Hat Hacker
 Black Hat Hacker
 Red Hat Hacker
 Green Hat Hacker
HOW TO PREVENT HACKING

 It may be impossible to prevent computer hacking ,however effective


security controls including strong passwords, and the use of firewalls
can helps.
 Don’t access personal or financial data with public Wi-Fi.
 Use a password, lock code or encryption.
MALWARE

 Malware is the collective name for a number of malicious software


variants, including viruses, ransomware and spyware.
 Shorthand for malicious software, malware typically consists of code
developed by cyber attackers, designed to cause extensive damage to
data and systems or to gain unauthorized access to a network.
TROJAN HORSES

 A Trojan horse or Trojan is a type of malware that is often disguised as legitimate


software. Trojans can be employed by cyber-thieves and hackers trying to gain
access to users systems.
 Users are typically tricked by some form of social engineering into loading and
executing Trojans on their systems.
SOME OF THE TROJAN ACTIONS

  These actions can include:


• Deleting data
• Blocking data
• Modifying data
• Copying data
• Disrupting the performance of computers or computer networks
HOW TO AVOID TROJANS

 Security suites, such as Avast internet


security, will prevent you from
downloading Trojan horses.
PASSWORD CRACKING

 Password cracking is the process of attempting to gain Unauthorized


access to restricted systems using common passwords or algorithms that
guess passwords.
 Password strength is the measure of a password’s efficiency to resist
password cracking attacks.
ADVANTAGES

  Protects system against viruses, worms, spyware and other unwanted


programs.
 Protection against data from theft.
 DISADVANTAGES
 Makes the system slower than before.
 Makes the system slower than before.
 Need to keep updating the new software in order to keep security up to date.
THANK YOU

You might also like