Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

LUCKNOW INSTITUTE OF TECHNOLOGY

Seminar Presentation

Submitted by Submitted to
Abhishek kumar Singh Ms. Arti Singh
Introductio
nThe term cyber security is used to refer to the
security offered through on-line services to
protect your online information.

With an increasing amount of people getting


connected to Internet, the security threats that
cause massive harm are increasing also.
What is the
meaning What is the need
of the of Cyber
word Security
CYBER is
the need How to
of Cyber implement and
Security
What are the maintain
security Security of a
problems in Cyber field
Cyber field around us.
Meaning of the Word
CYBER
It is a combining form relating to
information technology, the Internet, and
virtual reality.
Need of cyber
security
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system
from viruses.
Major security problems
Virus

Hacker

Malware

Trojan horses

Password
cracking
Viruses and Worms
A Virus is a “program that is loaded onto
your computer without your knowledge and
runs against your wishes
Solution
Install a security suite that protects the computer
against threats such as viruses and worms.
AV PANCJ PfuAhnl
A ab
G 1

Nort e ,. Se~
.
avast! . o n· t r·~ec Essent
.web
from
symantec
ure t U
als rity
Hackers

In common a hacker is a person who breaks


into computers, usually by gaining access to
administrative controls.
Types of Hackers

White Hat Hacker

Grey Hat Hacker

Black Hat Hacker


How To prevent hacking

It may be impossible to prevent computer hacking,


however effective security controls including
strong passwords, and the use of firewalls can
helps.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge
or permission.
To Stop Malware

Download an anti-
malware program
thatalso
helps prevent infections.

Activate Network
Threat Protection,
Firewall, Antivirus.
Trojan Horses

Trojan horses are


email viruses that
can duplicate
themselves, steal
information, or
harm the computer
system.
These viruses are the
most serious threats
to computers
How to Avoid Trojans

Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
Password
Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to
different protected electronic areas and social
network sites.
Securing Password
Use always Strong password.
Never use same password for two different sites.
CCyybbeerr SSeeccuurriittyy IIss
EEvveerryyoonnee'’ss
RReessppoonnssiibbiilliittyy
Cyber Security Strategy –
• SIencdura
i ityPolicy, Legal Framework
– ITAct, 2000
– IT (Amendment) Bill, 2006 – Data Protection & Computer crimes

• Capacity building
– Skill & Competence development

• Research and Development


– Cyber Monitoring
– Network Security

• International Collaboration
India stands 10th in the
cyber crime in the
world
One Cyber Theft 65 MILLION
• Linkedin
I
l'\aclc.edtt',e ,nforma1 ion
of
link me Passwords
24 MILLION were pur at risk AND
7appof:/Amazon c1.Hlomen
n 30,000
Pa><word1 were cracked

198 MILLION 1.
Android owners met'OO()' card( MILLION
C ard Numbers: were
AT RISK
by malicious link or app.
5
STOLEN

-
e
1. MILLION
e5Harmon Passwords
were s-tolen in 2012

y
Security
Hole
Hackers
discovered allow<
to ln<ta11 1nallc.ioui ~oftwa~ on

H Windows computers

27 MILLION
user acccunt compromhed
Hackers Obtained
users. pa,swords. credtt card number
&
VIRUS
1,656,227
computer Viru<E'i, worms &

Trojans
were found
Conclusion
I hope that my presentation will be helpful for
my audience to improve their knowledge about
cyber security and to overcome several security
loopholes on their computer operation. Also it
helps to spread awareness among normal
people about emerging security threats. Simple
and practical prevention methods are explained
in the Seminar to prevent PCs from infection.
QUERIES?
REFERENCES
owww.wikipedia.org o
www.avtest.org owww
.billmullins.blogspot.com
owww.digit/forum.com o
www.antivirusnews.com

You might also like