SlideShare a Scribd company logo
4
Most read
5
Most read
13
Most read
WELCOME
CYBER
SECURITY PRESNATION
Introduction:
 The term cyber security is used to refer to the
security offered through on-line services to protect
your online information.
 With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
To Undrstand:
 What is meaning of the word CYBER
 What is the need of Cyber Security
 What are the security problems in Cyber field
 How to implement and maintain Security of a
Cyber field around us.
Meaning of the word CYBER:
 It is a combining form relating to information
technology, the Internet, and virtual reality.
Need of cyber security:
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Major security problems:
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and Worms:
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Hackers:
 In common a hacker is person who breaks into
computers, usually by gaining access to
administrative controls.
Malware:
 The word “malwarer” comes from the term “MALicious
softWARE.”
 Malware is any software that infects and damages a
computer system without the owner’s knowledge or
permission.
Trojan Horses:
 Trojan horses are email viruses that can duplicate
themselves, steal information, or harm the computer
system.
 These viruses are the most serious threats to compuers.
How to Avoid Trojans
 Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses.
Password Cracking:
 Password attacks are attacks by hackers that are
able to determine passwords or find passwords to
different protected electronic areas and social
network sites.
Securing Password
 Use always Strong password
 Never use same password for two different sites.
Cuber Security Strategy - India:
 Security Policy, Legal Framework
-It Act, 2000
-It (Amendment) bill, 2006 – Data Protection and Computer crimes
o Capacity building
-skill and Competence development
Research and Development
-Cyber Monitoring
-Network Security
International Collaboration
THANK YOU

More Related Content

PPTX
Cyber security by Anushka Jha
Anushka Jha
 
PPTX
Cyber security (daffodil international university)
akkharbabu
 
PPTX
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
PPTX
SAHITHI.PPT.pptx
Vamshi963187
 
PPTX
Cyber security system presentation
A.S. Sabuj
 
PPTX
CYBER SECURITY
PranjalShah18
 
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
PPTX
Introduction to cyber security
Self-employed
 
Cyber security by Anushka Jha
Anushka Jha
 
Cyber security (daffodil international university)
akkharbabu
 
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
SAHITHI.PPT.pptx
Vamshi963187
 
Cyber security system presentation
A.S. Sabuj
 
CYBER SECURITY
PranjalShah18
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
Introduction to cyber security
Self-employed
 

Similar to 4247174743543535355-Cyber-Security-Ppt.pptx (20)

PPTX
cybersec sumit (1).pptx
sumitkumar917666
 
PDF
cyber security.pdf
Yashwanth Rm
 
PPTX
cybersecurity.pptx
20ArnavKumar8F
 
PPTX
Art integrated project of computer science class 12
ANURAGYADAV265
 
PPTX
Cyber security
Siblu28
 
PDF
cybersecurity-140713064844-phpapp01.pdf
SejalDesai30
 
PDF
cybersecurity-140713064844-phpapp01.pdf
RahulDasari12
 
PPTX
cyber security.pptx
BWUBTS19022
 
PPTX
Cyber security
TaimoorArshad5
 
PPTX
Cyber Security 03
Home
 
PPTX
cyber security PPT
Nitesh Dubey
 
PPTX
Cyber Security
Zain Abid
 
PPTX
Cybersecurity
Foram Gosai
 
PDF
cybersecurity-210715084148.pdf
RavirajChavan10
 
PPTX
cyber security,need,security problem and types of cyber security
Vansh Bathla
 
PPTX
Cyber security
Sachith Lekamge
 
PPTX
Cyber security & awareness
Rishab garg
 
PPTX
basic and advance awareness of cyber security
BabaBoss5
 
PPTX
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
 
PPTX
Cyber Security
Rameesha1
 
cybersec sumit (1).pptx
sumitkumar917666
 
cyber security.pdf
Yashwanth Rm
 
cybersecurity.pptx
20ArnavKumar8F
 
Art integrated project of computer science class 12
ANURAGYADAV265
 
Cyber security
Siblu28
 
cybersecurity-140713064844-phpapp01.pdf
SejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
RahulDasari12
 
cyber security.pptx
BWUBTS19022
 
Cyber security
TaimoorArshad5
 
Cyber Security 03
Home
 
cyber security PPT
Nitesh Dubey
 
Cyber Security
Zain Abid
 
Cybersecurity
Foram Gosai
 
cybersecurity-210715084148.pdf
RavirajChavan10
 
cyber security,need,security problem and types of cyber security
Vansh Bathla
 
Cyber security
Sachith Lekamge
 
Cyber security & awareness
Rishab garg
 
basic and advance awareness of cyber security
BabaBoss5
 
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
 
Cyber Security
Rameesha1
 
Ad

More from NIMMANAGANTI RAMAKRISHNA (20)

PPTX
Business Quiz Ideas rds st srtretrdhytryttdtry.pptx
NIMMANAGANTI RAMAKRISHNA
 
PDF
fintech_ecosystem_presentation_20250704172911.pdf
NIMMANAGANTI RAMAKRISHNA
 
PPTX
AI_in_Fintech_Transformation_Presentation.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
Astrological Behavior of people in the world for better life.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
Exploring South Indian Food Culture.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
dfafa sdfsdafsdfdasfdf sdfgdfgdfgdfffsdfsefwerer.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
dfasdfdfsdafdfdsfdfdfdfdfdfdsaf ffsdfsdfdf.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
International marketing Marketing (1).pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
International marketing marMarketing.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
AI in Researsddsfsfdscxxvcbvvbvdsdsfsch.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
nnnnnnnnnnnnnnnnnnnnnnnnnkiniiiiiiiiiiiiiiiiiii.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
kjkljljljjjkjlkjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjkkkkkkkkkkkkkkkkk.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
Installation of fdsfdsdsfdsfsdfsdfsdfdsf.pptx
NIMMANAGANTI RAMAKRISHNA
 
PPTX
final presentatonsfkldsjlkfjdslfksdjflksdjflsdjflkdsjf.pptx
NIMMANAGANTI RAMAKRISHNA
 
PDF
cultural-activities-around-the-world-.pdf
NIMMANAGANTI RAMAKRISHNA
 
PDF
optimizing-institutional-best-practices-.pdf
NIMMANAGANTI RAMAKRISHNA
 
PDF
empowering-women-the-role-of-a-wife-in-modern-society.pdf
NIMMANAGANTI RAMAKRISHNA
 
PDF
slidesgo-understanding-the-modern-husband-roles-and-responsibilities-20240520...
NIMMANAGANTI RAMAKRISHNA
 
PDF
wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
NIMMANAGANTI RAMAKRISHNA
 
PDF
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
NIMMANAGANTI RAMAKRISHNA
 
Business Quiz Ideas rds st srtretrdhytryttdtry.pptx
NIMMANAGANTI RAMAKRISHNA
 
fintech_ecosystem_presentation_20250704172911.pdf
NIMMANAGANTI RAMAKRISHNA
 
AI_in_Fintech_Transformation_Presentation.pptx
NIMMANAGANTI RAMAKRISHNA
 
Astrological Behavior of people in the world for better life.pptx
NIMMANAGANTI RAMAKRISHNA
 
Exploring South Indian Food Culture.pptx
NIMMANAGANTI RAMAKRISHNA
 
dfafa sdfsdafsdfdasfdf sdfgdfgdfgdfffsdfsefwerer.pptx
NIMMANAGANTI RAMAKRISHNA
 
dfasdfdfsdafdfdsfdfdfdfdfdfdsaf ffsdfsdfdf.pptx
NIMMANAGANTI RAMAKRISHNA
 
International marketing Marketing (1).pptx
NIMMANAGANTI RAMAKRISHNA
 
International marketing marMarketing.pptx
NIMMANAGANTI RAMAKRISHNA
 
AI in Researsddsfsfdscxxvcbvvbvdsdsfsch.pptx
NIMMANAGANTI RAMAKRISHNA
 
nnnnnnnnnnnnnnnnnnnnnnnnnkiniiiiiiiiiiiiiiiiiii.pptx
NIMMANAGANTI RAMAKRISHNA
 
kjkljljljjjkjlkjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjkkkkkkkkkkkkkkkkk.pptx
NIMMANAGANTI RAMAKRISHNA
 
Installation of fdsfdsdsfdsfsdfsdfsdfdsf.pptx
NIMMANAGANTI RAMAKRISHNA
 
final presentatonsfkldsjlkfjdslfksdjflksdjflsdjflkdsjf.pptx
NIMMANAGANTI RAMAKRISHNA
 
cultural-activities-around-the-world-.pdf
NIMMANAGANTI RAMAKRISHNA
 
optimizing-institutional-best-practices-.pdf
NIMMANAGANTI RAMAKRISHNA
 
empowering-women-the-role-of-a-wife-in-modern-society.pdf
NIMMANAGANTI RAMAKRISHNA
 
slidesgo-understanding-the-modern-husband-roles-and-responsibilities-20240520...
NIMMANAGANTI RAMAKRISHNA
 
wepik-time-flies-when-you-manage-it-wisely-20240506125304NOnr.pdf
NIMMANAGANTI RAMAKRISHNA
 
wepik-the-essential-role-of-wives-in-the-household-20240415135711Xet1.pdf
NIMMANAGANTI RAMAKRISHNA
 
Ad

Recently uploaded (20)

PPTX
The Future of Philanthropy - AI & Donor Engagement
The Impact Seat
 
PDF
1H 2025 Consolidated Results - Conference Call
Snam
 
DOCX
Investors Collective_ A Community-Driven Crypto Revolution.docx
taymormohse7
 
DOCX
How to Avoid Common Crypto Investment Scams.docx
taymormohse7
 
PPTX
lekkiport presentation to Michael Ashcroft .pptx
yeshua27
 
DOCX
Peer-to-Peer Learning for Crypto Market Success.docx
taymormohse7
 
PPTX
办理东北大学毕业证|NEU文凭购买NEU录取通知书2025年新版学位证书
w7gqk0ya
 
PDF
Methanex Investor Presentation - July 2025
Methanex Corporation
 
DOCX
Crypto Investment Opportunities Beyond Bitcoin.docx
taymormohse7
 
PDF
2025 07 29 Project Rocket Announcement Presentation .pdf
MandalayResources
 
DOCX
Security Protocols for Using Trading Signals Safely.docx
taymormohse7
 
PDF
Deutsche EuroShop | Company Presentation | 08/25
Deutsche EuroShop AG
 
PDF
AMG Q2 2025 Quarterly Investor Slides July 2025
gstubel
 
PDF
Leonardo 1H 2025 Results Presentation - July 30, 2025
Leonardo
 
PDF
Nicola Mining Inc. Corporate Presentation Jun 2025
nicola_mining
 
PDF
Teekay Group Q2-25 Earnings Presentation
Teekay Corporation
 
PDF
Collective Mining | Corporate Presentation - July 2025
Collective Mining
 
DOCX
Passive Income for Crypto Investors in 2025.docx
taymormohse7
 
PDF
1H 2025 Consolidated Results Presentation
Terna SpA
 
DOCX
Why Collaboration Matters in Crypto Investing.docx
taymormohse7
 
The Future of Philanthropy - AI & Donor Engagement
The Impact Seat
 
1H 2025 Consolidated Results - Conference Call
Snam
 
Investors Collective_ A Community-Driven Crypto Revolution.docx
taymormohse7
 
How to Avoid Common Crypto Investment Scams.docx
taymormohse7
 
lekkiport presentation to Michael Ashcroft .pptx
yeshua27
 
Peer-to-Peer Learning for Crypto Market Success.docx
taymormohse7
 
办理东北大学毕业证|NEU文凭购买NEU录取通知书2025年新版学位证书
w7gqk0ya
 
Methanex Investor Presentation - July 2025
Methanex Corporation
 
Crypto Investment Opportunities Beyond Bitcoin.docx
taymormohse7
 
2025 07 29 Project Rocket Announcement Presentation .pdf
MandalayResources
 
Security Protocols for Using Trading Signals Safely.docx
taymormohse7
 
Deutsche EuroShop | Company Presentation | 08/25
Deutsche EuroShop AG
 
AMG Q2 2025 Quarterly Investor Slides July 2025
gstubel
 
Leonardo 1H 2025 Results Presentation - July 30, 2025
Leonardo
 
Nicola Mining Inc. Corporate Presentation Jun 2025
nicola_mining
 
Teekay Group Q2-25 Earnings Presentation
Teekay Corporation
 
Collective Mining | Corporate Presentation - July 2025
Collective Mining
 
Passive Income for Crypto Investors in 2025.docx
taymormohse7
 
1H 2025 Consolidated Results Presentation
Terna SpA
 
Why Collaboration Matters in Crypto Investing.docx
taymormohse7
 

4247174743543535355-Cyber-Security-Ppt.pptx

  • 3. Introduction:  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 4. To Undrstand:  What is meaning of the word CYBER  What is the need of Cyber Security  What are the security problems in Cyber field  How to implement and maintain Security of a Cyber field around us.
  • 5. Meaning of the word CYBER:  It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. Need of cyber security:  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. Major security problems:  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 8. Viruses and Worms:  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 9. Hackers:  In common a hacker is person who breaks into computers, usually by gaining access to administrative controls.
  • 10. Malware:  The word “malwarer” comes from the term “MALicious softWARE.”  Malware is any software that infects and damages a computer system without the owner’s knowledge or permission.
  • 11. Trojan Horses:  Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to compuers. How to Avoid Trojans  Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 12. Password Cracking:  Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Securing Password  Use always Strong password  Never use same password for two different sites.
  • 13. Cuber Security Strategy - India:  Security Policy, Legal Framework -It Act, 2000 -It (Amendment) bill, 2006 – Data Protection and Computer crimes o Capacity building -skill and Competence development Research and Development -Cyber Monitoring -Network Security International Collaboration