Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

CYBER SECURITY

Arooj Fatima (SP24 - BCS – 207 )


Mahzaib (SP24 – BCS - 165 )
OVERVIEW
 Security
 Introduction to Cybersecurity
 Threats to users
 Threats to hardware and data
 Loss of Privacy
 Threats To Data:
 Goals of cybersecurity
 Importance of cybersecurity
 Conclusion
Security :
Security is a fundamental need that ensures
our well-being and protects us from harm.
It encompasses safeguarding our personal
information, data, devices, and overall
digital presence from various threats and
vulnerabilities.
INTRODUCTION OF CYBERSECURITY

• Cyber Security is a process that's designed to protect networks and devices from external
threats. Businesses typically employ Cyber Security professionals to protect their confidential
information, maintain employee productivity, and enhance customer confidence in products
and services.
DEFINITION OF CYBERSECURITY:
• Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually
aimed at accessing, changing, or destroying sensitive information;
extorting money from users via ransomware; or interrupting
normal business processes.
HISTORY OF CYBER SECURITY:
The Creeper in the 1970s:
The Cybersecurity checking began in the 1970s when researcher Bob
Thomas created a computer program called Creeper that could move
across ARPANET's network. Ray Tomlinson, the innovator of email,
wrote the program Reaper, which chased and deleted Creepers.
Threats to Users

Identity Theft

Loss Of Privacy

Online Spying Tools

Online Theft

Online Fraud

Other Dot Cons


Threats To Users
Identity Theft:
Stealing personal information for fraud .Personal
information is stolen and posing risks to financial security
and reputation.

Loss of Privacy:
Others access your private stuff without permission, making
you feel exposed.

Online Spying Tools:


Sneaky tools watch you online without you knowing, making
you feel watched all the time.
Threats To Users
Online Theft:
Hackers steal from your online accounts, leaving you broke
and insecure.

Online Fraud:
Con artists deceive you into giving them your info, leading to
theft and anxiety.

Other Dot Cons:


Scammers trick you with fake emails or sites, causing loss and
frustration.
Threats to Hardware and Data

 Hardware Failure
 Power Outages
 Natural Disasters
 Malware Infections
Threats to Hardware and Data

1 2 3 4
Hardware Power Natural Malware
Failure Outages Disasters Infections

Malfunctions, Disruptions in Floods earthquakes, Viruses, worms, or


wear and tear, or electricity supply, or other natural other malicious
physical damage causing events that can software that can
to devices, temporary or physically damage or corrupt, encrypt, or
destroy hardware delete data, or even
leading to loss of prolonged loss of
and data storage. render devices
access or data. system unusable
functionality and
data.
Loss of Privacy

 Online Tracking
 Data Breaches
 Social Media
Loss of Privacy

Online Data Social


Tracking Breaches Media

Companies and third Unauthorized access Voluntary sharing of


parties collecting and to and leakage of personal details and
using personal data sensitive personal content on social
without consent, information, leading platforms, which can
through cookies, to privacy violations be exploited or
location tracking, and potential misuse. accessed without
and other techniques. consent.
Threats To Data:
Malware, Virus & Malicious
Programs

Cybercrime

Cyber-terrorism

Countermeasures and Best


Practices
Threats To Data:
Malware, Virus & Malicious Programs:
Software designed to harm systems.

Cybercrime:
Criminal activities online.

Cyber-terrorism:
Using cyber attacks for terrorism.

Countermeasures and Best Practices:


Implementing security measures to protect data.
GOALS OF CYBERSECURITY

 Confidentiality:

 Integrity

 Availability
GOALS OF CYBERSECURITY
 Confidentiality:
•Protection of Data: Confidentiality involves keeping sensitive information private
and protected from unauthorized access. It ensures that only authorized individuals or
entities can access and view certain data.

•Encryption: Data encryption is a common method used to maintain confidentiality. It


transforms data into a coded format that can only be deciphered by individuals with
the proper decryption keys.
GOALS OF CYBERSECURITY

 Integrity:
Data Integrity: Integrity ensures that data remains
accurate and unaltered during storage, processing, and
transmission. Any unauthorized or accidental changes to
data should be detected and prevented.
GOALS OF CYBERSECURITY

 Availability:
Availability focuses on ensuring that
systems and services are available and
operational when needed. Downtime due to
cyberattacks or system failures can lead to
significant disruptions.
IMPORTANCE OF CYBERSECURITY

• Protection from Cyber Threats


• Data Protection
• Business Continuity
• Financial Protection
• Protection of Intellectual Property
• Preservation of Trust
• Global Economy and National Security
CONCLUSION

Cybersecurity is critical because it helps to protect


organizations and individuals from cyber attacks.
Cybersecurity can help to prevent data breaches, identity
theft, and other types of cybercrime. Organizations must
have strong cybersecurity measures to protect their data
and customers.
THANK YOU

You might also like