[go: up one dir, main page]

0% found this document useful (0 votes)
12 views29 pages

ppt rf

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 29

WEST BENGAL STATE UNIVERSITY

P.N. DAS COLEEGE


DEPARTMENT OF COMPUTER
SCIENCE
Name: TAPATI BISWAS
Roll: 346
Registration No.:
1312221100059 of 2022
Session: 2022-2023
CYBER SECURITY
“Amateurs Hack Systems
Professionals Hack People ”

—Bruce Schneier
TABLE OF CONTENTS

01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES

04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
01
INTRODUCTION
To Cyber Security
INTRODUCTION TO CYBER SECURITY

What is cyber security?

● Cyber security is the body of


technologies, processes, and practices
designed to protect networks,
computers, programs and data from
attack, damage or unauthorized access.
WHY IS CYBER SECURITY IMPORTANT?

PROTECTING PREVENTING MAINTAINING BUSINESS


CONFIDENTIAL DATA FINANCIAL LOSSES CONTINUITY
Measures Are Essential
Financial Losses Due Can Help Organizations
In Protecting
To Theft Or Damage To Prevent Disruptions To
Sensitive Data From
Assets, And This Can Their Operations, Thus
Unauthorized Access Or
Affect The Bottom Line Ensuring Business
Theft.
Of Organizations. Continuity.
TYPES OF CYBER ATTACKS
A cyber-attack is an exploitation of
computer systems and networks.
It uses malicious code to alter Web-based
computer code, logic or data and
lead to cybercrimes.
attacks

System-
based
attacks
TABLE OF CONTENTS

01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES

04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
02
WAYS TO PROTECT
Yourself and Your
Organization
WAYS TO PROTECT YOURSELF

Use strong, unique


passwords for all
accounts and change them
regularly. Also, avoid
sharing passwords or
using the same password
across multiple
USE STRONG accounts.
PASSWORDS
WAYS TO PROTECT YOURSELF

Install reputable
antivirus software and
keep it up to date to
protect against malware
INSTALL and other cyber threats.
ANTIVIRUS
SOFTWARE
WAYS TO PROTECT YOURSELF

Implement multi-factor
authentication on all
accounts to provide an
IMPLEMENT extra
MULTI-FACTOR layer of security.
AUTHENTICATION
TABLE OF CONTENTS

01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES

04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
03
THREATS AND
TYPES
OF Cyber Security
TYPES OF CYBER THREATS

MALWARE FORMJACKING
Ransomware, Botnet Inserts malicious
Software, Rats, code into online
Spyware, Trojans, forms.
Viruses, And Worms.

DNS name
(Domain DDoS
(Distributed denial-of-
system) poisoning service) attacks, which
attacks, which flood servers, systems,
compromise the DNS and networks with
to redirect traffic traffic to knock them
to malicious sites. offline.
WHAT ARE THE FIVE TYPES OF CYBER SECURITY?

CYBER SECURITY

Critical
Infrastructure

Network Security Cloud Security

IoT Security Application Secur


ity
TABLE OF CONTENTS

01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES

04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
04
LEGAL RIGHTS &
DIFFERENCE
DIFFECENCE

Information
Cyber security
security
● Cyber security is often ● Information security
confused with is a broader category
information security. that protects all
● Cyber security focuses information assets,
on protecting computer whether in hard copy
systems from or digital form.
unauthorized access or
being otherwise damaged
or made inaccessible.
The legal
requirement
for cyber
security
The GDPR and DPA 2018
require organizations to
implement appropriate
security measures to
protect personal data.
TABLE OF CONTENTS

01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES

04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
05
CONSEQUENCES
& CHALLENGES
OF Cyber Security
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?

• Financial losses due to


theft, fraud, or business
disruption

• Legal and regulatory


penalties and fines

• Damage to IT
infrastructure or hardware

• Potential harm to
individuals

• Increased insurance
premiums and security costs
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?

• Financial losses due to


theft, fraud, or business
disruption

• Legal and regulatory


penalties and fines

• Damage to IT
infrastructure or hardware

• Potential harm to
individuals

• Increased insurance
premiums and security costs
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?

• Financial losses due to


theft, fraud, or business
disruption

• Legal and regulatory


penalties and fines

• Damage to IT
infrastructure or hardware

• Potential harm to
individuals

• Increased insurance
premiums and security costs
CHALLENGES OF CYBER SECURITY

• Legacy systems
and software that
may not be • Complexity of
• Rapidly evolving modern IT
properly patched
and sophisticated environments,
or updated,
cyber threats and including cloud,
creating
attack techniques mobile, and IoT
vulnerabilities
devices
• Shortage of
• Business
skilled cyber • Growing volume
priorities
security and diversity of
leading to
professionals and data, making it
inadequate
resources harder to protect
investment in
cyber security sensitive
measures information
Referenc
e 1. GFG (www.gfg.com)
2. JavaTpoint (javatpoint.com)
3. Tutorianpoint (tutorialpoint.com)

CREDITS: This presentation template was created by


Slidesgo, including icons by Flaticon, infographics &
images by Freepik
THANKS!
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon, infographics &
images by Freepik

You might also like