Welcome to our presentation
cyber security
SUBMITTED BY:
Roksana Akter
I’d:151-15-4864
Mst Tanha Tasnim
I’d:151-15-5420
Hadiea Rashid
I'd:151-15-5298
Renu Akther
I'd:151-15-5096
SUBMITTED to:
Mohammad Jahangir
LECTURER AT
DEPARTMENT OF CSE
DAFFODIL
INTERNATIONAL
UNIVERSITY
Roksana Akter
I’d:151-15-4864
WHAT IS CYBER SECURITY??
The security offered
through on-line services to
protect your online
information is Called Cyber
Security.
MEANING OF THE WORD CYBER
It is a combining form
relating to information
technology, the Internet,
and virtual reality.
NEED OF CYBER SECURITY
 Cyber security is necessary
since it helps in securing
data from threats such as
data theft or misuse, also
safeguards your system
from viruses.
MAJOR SECURITY PROBLEMS
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Mst Tanha Tasnim
I’d:151-15-5420
Viruses
Solution
Install a security suite that protects the
computer against threats such as viruses and
worms
Hackers
In common a hacker is a person who
breaks into computers, usually by
gaining access to administrative
controls
Types of Hackers
How To prevent hacking
Hadiea Rashid
I'd:151-15-5298
Malware
Where malware comes from?
How to recognize malware?
How to remove malware?
Trojan Virus
How Trojans can impact you
 Backdoor
 Exploit
 Rootkit
 rojan-Banker
 Trojan-Downloader
 Trojan-Dropper
 Trojan-SMS
 Trojan-Spy
How to protect against Trojan
By installing effective anti-malware software,
you can defend your devices.A rigorous anti-
malware solution – such as Kaspersky Anti-
Virus – will detect and prevent Trojan attacks
on your devices. Kaspersky Lab has anti-
malware products that defend the following
devices against Trojans
 Windows PCs
 Linux computers
 Apple Macs
 Smart phones
Password Cracking & Securing Password
In computersecurity, password cracking is
the process of
recovering passwords from data that have
been stored in or transmitted by a computer
system. A common approach is to try guesses
repeatedly for the password and check them
against an available cryptographic hash of the
password.
Software:
There are many password cracking software tools,
but the most popular are Aircrack, Cain and
Abel, John the Ripper, Hashcat,Hydra and so on.
Securing Password from cracking by following this
method “Easy to remember, hard to guess”
Renu akther
I'd:151-15-5096
Big cyber attacks on
2016
Why should we care ?
It is a criminal activity committed on the
internet .
Cyber crime – where computer is either a
tool or target or both.
Advantage of cyber
security It will defend from hacks and virus.
 The application of cyber security used in our
PC needs update every week.
 The security developers will update their
database every week once. Hence the new
virus also deleted.
Our responsibility
Conclusion
The only system which is truly
secure is one which is switched
off and unplugged. So , only way
to be safe is Pay attention and
Act smart
CYBER SECURITY

CYBER SECURITY

  • 1.
    Welcome to ourpresentation
  • 2.
    cyber security SUBMITTED BY: RoksanaAkter I’d:151-15-4864 Mst Tanha Tasnim I’d:151-15-5420 Hadiea Rashid I'd:151-15-5298 Renu Akther I'd:151-15-5096 SUBMITTED to: Mohammad Jahangir LECTURER AT DEPARTMENT OF CSE DAFFODIL INTERNATIONAL UNIVERSITY
  • 3.
  • 4.
    WHAT IS CYBERSECURITY?? The security offered through on-line services to protect your online information is Called Cyber Security.
  • 5.
    MEANING OF THEWORD CYBER It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6.
    NEED OF CYBERSECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7.
    MAJOR SECURITY PROBLEMS Virus  Hacker  Malware  Trojan horses  Password cracking
  • 8.
  • 9.
  • 10.
    Solution Install a securitysuite that protects the computer against threats such as viruses and worms
  • 12.
    Hackers In common ahacker is a person who breaks into computers, usually by gaining access to administrative controls
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
    Where malware comesfrom? How to recognize malware? How to remove malware?
  • 18.
  • 19.
    How Trojans canimpact you  Backdoor  Exploit  Rootkit  rojan-Banker  Trojan-Downloader  Trojan-Dropper  Trojan-SMS  Trojan-Spy
  • 20.
    How to protectagainst Trojan By installing effective anti-malware software, you can defend your devices.A rigorous anti- malware solution – such as Kaspersky Anti- Virus – will detect and prevent Trojan attacks on your devices. Kaspersky Lab has anti- malware products that defend the following devices against Trojans
  • 21.
     Windows PCs Linux computers  Apple Macs  Smart phones
  • 22.
    Password Cracking &Securing Password In computersecurity, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.
  • 24.
    Software: There are manypassword cracking software tools, but the most popular are Aircrack, Cain and Abel, John the Ripper, Hashcat,Hydra and so on. Securing Password from cracking by following this method “Easy to remember, hard to guess”
  • 25.
  • 26.
  • 28.
    Why should wecare ? It is a criminal activity committed on the internet . Cyber crime – where computer is either a tool or target or both.
  • 29.
    Advantage of cyber securityIt will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 30.
  • 31.
    Conclusion The only systemwhich is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart