SlideShare a Scribd company logo
Presented by:-
Ayesha Javed
 Inroduction
 Defination
Cyber security Information security
Cyber security Information security
Cyber security Information security
Cyber security Information security
 The security offered through on-line services
to protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats
that cause massive harm are increasing also.
Cyber security Information security
 Cyber security or information
technology security
 The techniques of protecting
 Computers
 Networks
 programs and data from unauthorized
access or attacks that are aimed for
exploitation. ...
Cyber security Information security
 Cyber security is the protection of computer
systems from
 theft or damage to their hardware, software
or electronic data, as well as from disruption
or misdirection of the services they provide.
Cyber security Information security
Cyber security Information security
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
Cyber security Information security
Cyber security Information security
Cyber security Information security
Cyber security Information security
Cyber security Information security
Cyber security Information security
Cyber security Information security
Cyber security Information security
 Taking some simple actions and practising
safe behaviours will reduce online threats.
 Move away from using UNSUPPORTED
software
 Always DOWNLOAD AND INSTALL the latest
software and app updates
 RUN up-to-date ANTI-VIRUS SOFTWARE
 Use Strong Password
 DELETE suspicious Emails and Avoid clicking
on unknown attachments or LINKS
 Back up your DATA
 Train tour staff to be CYBER AWARE
 Manage security relationships with supplier
and partners
Cyber security Information security
Cyber security Information security
Cyber security Information security
Ad

More Related Content

What's hot (20)

cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
Nitesh Dubey
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security
Cyber securityCyber security
Cyber security
Prem Raval
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
Weyai1
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
Nitesh Dubey
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cyber security
Cyber securityCyber security
Cyber security
Prem Raval
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
Weyai1
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 

Similar to Cyber security Information security (20)

How to Protect Your Devices from Internet-Based Malware.pdf
How to Protect Your Devices from Internet-Based Malware.pdfHow to Protect Your Devices from Internet-Based Malware.pdf
How to Protect Your Devices from Internet-Based Malware.pdf
Internet Bundle Now
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
Info-Tech
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
KRISHNARAJ207
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Home
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
online Marketing
 
Complete Guide to McAfee Antivirus: Features, Benefits & Installation.
Complete Guide to McAfee Antivirus: Features, Benefits & Installation.Complete Guide to McAfee Antivirus: Features, Benefits & Installation.
Complete Guide to McAfee Antivirus: Features, Benefits & Installation.
SMART TECHNOLOGIES
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
Cyber and its prevention Security using by powerpoint presentation.pptx
Cyber and its prevention Security using by powerpoint presentation.pptxCyber and its prevention Security using by powerpoint presentation.pptx
Cyber and its prevention Security using by powerpoint presentation.pptx
AbdulNazar63
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
20ArnavKumar8F
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
RavirajChavan10
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Greg Pierson_ Recognizing Internet Security Fundamentals.pdf
Greg Pierson_ Recognizing Internet Security Fundamentals.pdfGreg Pierson_ Recognizing Internet Security Fundamentals.pdf
Greg Pierson_ Recognizing Internet Security Fundamentals.pdf
Greg Pierson
 
Cyber security
Cyber securityCyber security
Cyber security
RavikantGautam8
 
Cyber Security Course in Dubai: Learn from Industry Experts
Cyber Security Course in Dubai: Learn from Industry ExpertsCyber Security Course in Dubai: Learn from Industry Experts
Cyber Security Course in Dubai: Learn from Industry Experts
sudheeshoc79
 
Cyber security
Cyber securityCyber security
Cyber security
RIPPER95
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
Vamshi963187
 
How to Protect Your Devices from Internet-Based Malware.pdf
How to Protect Your Devices from Internet-Based Malware.pdfHow to Protect Your Devices from Internet-Based Malware.pdf
How to Protect Your Devices from Internet-Based Malware.pdf
Internet Bundle Now
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
Info-Tech
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
KRISHNARAJ207
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Home
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
online Marketing
 
Complete Guide to McAfee Antivirus: Features, Benefits & Installation.
Complete Guide to McAfee Antivirus: Features, Benefits & Installation.Complete Guide to McAfee Antivirus: Features, Benefits & Installation.
Complete Guide to McAfee Antivirus: Features, Benefits & Installation.
SMART TECHNOLOGIES
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
Cyber and its prevention Security using by powerpoint presentation.pptx
Cyber and its prevention Security using by powerpoint presentation.pptxCyber and its prevention Security using by powerpoint presentation.pptx
Cyber and its prevention Security using by powerpoint presentation.pptx
AbdulNazar63
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptxGopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
gopalhalder8
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
RavirajChavan10
 
Greg Pierson_ Recognizing Internet Security Fundamentals.pdf
Greg Pierson_ Recognizing Internet Security Fundamentals.pdfGreg Pierson_ Recognizing Internet Security Fundamentals.pdf
Greg Pierson_ Recognizing Internet Security Fundamentals.pdf
Greg Pierson
 
Cyber Security Course in Dubai: Learn from Industry Experts
Cyber Security Course in Dubai: Learn from Industry ExpertsCyber Security Course in Dubai: Learn from Industry Experts
Cyber Security Course in Dubai: Learn from Industry Experts
sudheeshoc79
 
Cyber security
Cyber securityCyber security
Cyber security
RIPPER95
 
Ad

More from AYESHA JAVED (20)

Neural network basic
Neural network basicNeural network basic
Neural network basic
AYESHA JAVED
 
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHYJOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
AYESHA JAVED
 
The recommendations system for source code components retrieval
The recommendations system for source code components retrievalThe recommendations system for source code components retrieval
The recommendations system for source code components retrieval
AYESHA JAVED
 
Jhon dewey __final document........#######____@@@ayesha javed
Jhon dewey  __final document........#######____@@@ayesha javedJhon dewey  __final document........#######____@@@ayesha javed
Jhon dewey __final document........#######____@@@ayesha javed
AYESHA JAVED
 
Normalization
NormalizationNormalization
Normalization
AYESHA JAVED
 
Lecture for 10 oct 2019 sentence types-workshop
Lecture for 10 oct 2019  sentence types-workshopLecture for 10 oct 2019  sentence types-workshop
Lecture for 10 oct 2019 sentence types-workshop
AYESHA JAVED
 
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
AYESHA JAVED
 
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
AYESHA JAVED
 
This is an empirical study of industry practice in the management of softwar...
This is an empirical study of  industry practice in the management of softwar...This is an empirical study of  industry practice in the management of softwar...
This is an empirical study of industry practice in the management of softwar...
AYESHA JAVED
 
Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...
AYESHA JAVED
 
A strand lead to success in project management
A strand lead to success in project managementA strand lead to success in project management
A strand lead to success in project management
AYESHA JAVED
 
PETROL SYSTEM
PETROL SYSTEMPETROL SYSTEM
PETROL SYSTEM
AYESHA JAVED
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
AYESHA JAVED
 
Eclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATIONEclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATION
AYESHA JAVED
 
Moore and mealy machines
Moore and mealy machinesMoore and mealy machines
Moore and mealy machines
AYESHA JAVED
 
Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB                                Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB
AYESHA JAVED
 
Hec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMINGHec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMING
AYESHA JAVED
 
VISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEWVISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEW
AYESHA JAVED
 
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAMVISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
AYESHA JAVED
 
Boyer moore algorithm
Boyer moore algorithmBoyer moore algorithm
Boyer moore algorithm
AYESHA JAVED
 
Neural network basic
Neural network basicNeural network basic
Neural network basic
AYESHA JAVED
 
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHYJOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
JOHN DEWEY THE FATHER OF EDUCATIONAL PHILOSOPHY
AYESHA JAVED
 
The recommendations system for source code components retrieval
The recommendations system for source code components retrievalThe recommendations system for source code components retrieval
The recommendations system for source code components retrieval
AYESHA JAVED
 
Jhon dewey __final document........#######____@@@ayesha javed
Jhon dewey  __final document........#######____@@@ayesha javedJhon dewey  __final document........#######____@@@ayesha javed
Jhon dewey __final document........#######____@@@ayesha javed
AYESHA JAVED
 
Lecture for 10 oct 2019 sentence types-workshop
Lecture for 10 oct 2019  sentence types-workshopLecture for 10 oct 2019  sentence types-workshop
Lecture for 10 oct 2019 sentence types-workshop
AYESHA JAVED
 
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter3 of datawarehouse cs614(solution of exercise)
AYESHA JAVED
 
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
Exercise solution of chapter1 of datawarehouse cs614(solution of exercise)
AYESHA JAVED
 
This is an empirical study of industry practice in the management of softwar...
This is an empirical study of  industry practice in the management of softwar...This is an empirical study of  industry practice in the management of softwar...
This is an empirical study of industry practice in the management of softwar...
AYESHA JAVED
 
Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...
AYESHA JAVED
 
A strand lead to success in project management
A strand lead to success in project managementA strand lead to success in project management
A strand lead to success in project management
AYESHA JAVED
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
AYESHA JAVED
 
Eclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATIONEclipse introduction IDE PRESENTATION
Eclipse introduction IDE PRESENTATION
AYESHA JAVED
 
Moore and mealy machines
Moore and mealy machinesMoore and mealy machines
Moore and mealy machines
AYESHA JAVED
 
Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB                                Fundamental of VISUAL PROGRAMMING LAB
Fundamental of VISUAL PROGRAMMING LAB
AYESHA JAVED
 
Hec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMINGHec registration form VISUAL C# PROGRAMMING
Hec registration form VISUAL C# PROGRAMMING
AYESHA JAVED
 
VISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEWVISUAL PROGRAMING GRIDVIEW
VISUAL PROGRAMING GRIDVIEW
AYESHA JAVED
 
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAMVISUAL PROGRAMING LOGIN_SIGNUP_FOAM
VISUAL PROGRAMING LOGIN_SIGNUP_FOAM
AYESHA JAVED
 
Boyer moore algorithm
Boyer moore algorithmBoyer moore algorithm
Boyer moore algorithm
AYESHA JAVED
 
Ad

Recently uploaded (20)

Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 

Cyber security Information security

  • 7.  The security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 9.  Cyber security or information technology security  The techniques of protecting  Computers  Networks  programs and data from unauthorized access or attacks that are aimed for exploitation. ...
  • 11.  Cyber security is the protection of computer systems from  theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
  • 14.  A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
  • 23.  Taking some simple actions and practising safe behaviours will reduce online threats.
  • 24.  Move away from using UNSUPPORTED software  Always DOWNLOAD AND INSTALL the latest software and app updates  RUN up-to-date ANTI-VIRUS SOFTWARE  Use Strong Password  DELETE suspicious Emails and Avoid clicking on unknown attachments or LINKS
  • 25.  Back up your DATA  Train tour staff to be CYBER AWARE  Manage security relationships with supplier and partners