0% found this document useful (0 votes)
24 views27 pages

Cyber Security

new

Uploaded by

surajnarang465
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views27 pages

Cyber Security

new

Uploaded by

surajnarang465
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Cyber Security

Introduction to cybersecurity tools and cyber


attack
Cybersecurity roles, processes and operating
system security
Cybersecurity compliance, Framework and
system administration
Network security and Database
Content
Introduction
Categories of Cyber crime
Types of Cyber crime
Types of Security tools
Advantage of Cybersecurity
Safety tips to Cyber crime
References
Introduction
 The Internet in India is growing rapidly. There are two sides to a
coin. Internet also has it's own disadvantages is cyber crime-illegal
activity committed on the Internet.

 Crime committed using a computer and the internet to steal a


person's identity or illegal imports or malicious programs. Cyber
crime is an activity done using computers and the internet.

 Cyber security refers to the technologies and processes designed


to protect computers, networks and data from unauthorized
access and attacks delivered via the internet by cyber criminals.
Though, cyber security is important for the network, data and
application security.

 The objective of cyber security is to establish rules and measure to


use against attacks over the internet.
What is cyber security
Cyber security is the protection of internet-connected
systems, including hardware, software and data,
from cyber attacks.

In a computing context, security comprises cyber


security and physical security -- both are used by
enterprises to protect against unauthorized access to
data centers and other computerized systems

In formation security, which is designed to maintain


the confidentiality, integrity and availability of data,
is a subset of cyber security.
SECURITY & PRIVACY
Security privacy
 Security refers to how  Privacy relates to any
your personal rights you have to
information is protected control your personal
information and how it's
used
 Example:Privacy Policies
Principles of computer security
Types of cyber crime
Hacking
Phishing
Denial of service
Scam Email
Spyware , Adware
 Malware (Trojan, Virus, Worms etc.)
ATM Skimming and point of Scale Crimes
Ransomware
HACKING

 Hacking in simple
terms means
illegal
intrusion into a
computer system and a
network

It is also known as a


cracking government
websites are the hackers
due to the press
coverage, it receives
PHISHING
Phishing is a fraudulent attempt usually made
through email to steal your personal information.
Phishing is the attempt to obtain sensitive
information such as username, password and
credit card details often for malicious reasons
through an electronic communication (such as E-
mail )
A common online phishing scam starts with an
email message that appears to come from a
trusted source but actually directs recipients to
provide information to a fraudulent web site.
PHISHING
DENIAL OF SERVICE
The is an act by the criminals who floods the bandwidth
of the victims network.
In the DoS attack, a hacker uses a single internet
connection to either exploit a software vulnerability or
flood a target with fake request –usually in an attempt to
exhaust server resources
On the other hand, DDoS attacks are launched from
multiple connected devices that are distributed across
the internet.
DoS = When a single host attacks.
DDoS = when multiple hosts attack simultaneously and
continuously.
DENIAL OF SERVICE (DDOS)
SCAM EMAIL
Email Spam is the electronic version of junk
mail. It involves sending unwanted messages,
often unsolicited advertising, to a large
number of recipients. Spam is a serious
security concern as it can be used to deliver
Trojan horses, viruses, worms, spyware, and
targeted phishing attacks.
SCAM EMAIL
Email Spam is the electronic version of junk
mail. It involves sending unwanted messages,
often unsolicited advertising, to a large
number of recipients. Spam is a serious
security concern as it can be used to deliver
Trojan horses, viruses, worms, spyware, and
targeted phishing attacks.
SCAM EMAIL
MALWARE
It's malicious software (such as Virus, Worms &
Trojan), which specifically designed to disrupt or
damage computer system or mobile device.
Hackers use malware for any number of reasons
such as, extracting personal information or
passwords, stealing money, or preventing owners
from accessing their device.
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to
other files and to other computers on a network.
They usually affect the data on a computer and
mobile device either by altering or deleting it.
worms are standalone software and do not
require a host program or human help to
propagate.
Trojan is a type of malware that pretends to
be something useful, helpful, or fun while
actually causing harm or stealing data.
Trojans are often silently downloading other
malware (e.g. spyware, adware, ransomware)
on an infected device as well.
MALWARE
SPYWARE
Spyware is software installed without your
knowledge or consent that can monitor your
online activities and collect personal
information while you're online
Spyware is malicious software that enters a
user's computer, gathers data from the device
and user, and sends it to third parties without
their consent
SPYWARE
ADWARE
Adware is a type of malware that bombards
you with endless ads and pop-up windows
that could potentially be dangerous for your
device. The best way to remove adware is to
use an adware removal tool.
RANSOMWARE
Ransomware is as scary as it sounds. Hackers use this
technique to lock you out of your devices and demand
a ransom in return for access. Ransomware puts you
in a sticky situation, so it's best to know how to avoid
it.
Ransomware (a.k.a. rogueware or scareware) restricts
access to your computer system and demands that a
ransom is paid in order for the restriction to be
removed. The most dangerous ransomware attacks
are caused by Wannacry, Petya, Cerber and Locky
ransomware. The money which suppose to be paid to
remove ransomware from your system which is called
ransom money
RANSOMWARE
ATM Skimming and Point of Scale Crimes
It is a technique of compromising the ATM
machine by installing a skimming device a top the
machine keypad to appear as a genuine keypad or
a device made to be affixed to the card reader to
look like a part of the machine
 Additionally, malware that steals credit card data
directly can also be installed on these devices.
Successful implementation of skimmers cause in
ATM machine to collect card numbers and
personal identification number codes that are
later replicated to carry out fraudulent
transaction
TYPES OF CYBER ATTACKS

You might also like