SlideShare a Scribd company logo
2
Most read
3
Most read
Action against cyber crime
 Cyber security standards are security standards which
enable organizations to practice safe security techniques to
minimize the number of successful cyber security attacks.
 Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered
via the Internet by cyber criminals.
 Though, cyber security is important for network, data and
application security.
 Communication security-protecting organization
communication media , technology , and content.
 Network security-is the protection of networking
components, connection and content.
 Information security-protection of information and its
critical elements , including the systems and hardware
that use , store or transmit that information.
 The former descriptions were "computer crime",
"computer-related crime" or "crime by computer". With
the pervasion of digital technology, some new terms
like "high-technology" or "information-age" crime
were added to the definition. Also, Internet brought
other new terms, like "cybercrime" and "net" crime.
 Other forms include "digital", "electronic", "virtual" ,
"IT", "high-tech" and technology-enabled" crime .
 The first recorded cyber crime was recorded in the year
1820.
 The first spam email took place in 1978 when it was
sent over the Arpanet.
 The first Virus was installed on an Apple Computer in
1982.
Illegal access
Illegal Interception
System Interference
Data Interference
Misuse of devices
Fraud
 It is a criminal activity committed on the internet.
 Cyber crime-Where computer is either a tool or target
or both.
 Read Privacy policy carefully when you submit the
data through internet.
 Encryption: lots of website uses SSL (secure socket
layer)to encrypt a data.
 Disable remote connectivity.
 It will defend from hacks and virus.
 The application of cyber security used in our PC needs
update every week.
 The security developers will update their database
every week once. Hence the new virus also deleted.
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information unless required
 The only system which is truly secure is one which
is switched off and unplugged.
 So , only way to be safe is Pay attention and Act
smart.
Introduction to cyber security by cyber security infotech(csi)

More Related Content

What's hot (20)

PDF
Cyber security
Bhavin Shah
 
PPTX
Cyber security
Pihu Goel
 
PPTX
Cybersecurity
Foram Gosai
 
PPTX
Cyber security
Manjushree Mashal
 
PPTX
Ransomware
Chaitali Sharma
 
PPTX
Introduction to cyber security amos
Amos Oyoo
 
PDF
1. introduction to cyber security
Animesh Roy
 
PPTX
Cyber security
manoj duli
 
PPTX
Cyber Security
Vivek Agarwal
 
PPTX
Network security
Madhumithah Ilango
 
PPTX
IT Security
Mohsin Laiq
 
PPTX
Cybercrime and Security
Noushad Hasan
 
PDF
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
PPTX
Cybersecurity
NebiyeLioul
 
PDF
Basics of Cyber Security
Nikunj Thakkar
 
PPTX
Malware
Anoushka Srivastava
 
PPT
Introduction To Information Security
belsis
 
PPTX
CYBER SECURITY
Mohammad Shakirul islam
 
PPTX
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
PPTX
Cyber security ppt
CH Asim Zubair
 
Cyber security
Bhavin Shah
 
Cyber security
Pihu Goel
 
Cybersecurity
Foram Gosai
 
Cyber security
Manjushree Mashal
 
Ransomware
Chaitali Sharma
 
Introduction to cyber security amos
Amos Oyoo
 
1. introduction to cyber security
Animesh Roy
 
Cyber security
manoj duli
 
Cyber Security
Vivek Agarwal
 
Network security
Madhumithah Ilango
 
IT Security
Mohsin Laiq
 
Cybercrime and Security
Noushad Hasan
 
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Cybersecurity
NebiyeLioul
 
Basics of Cyber Security
Nikunj Thakkar
 
Introduction To Information Security
belsis
 
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber security ppt
CH Asim Zubair
 

Similar to Introduction to cyber security by cyber security infotech(csi) (20)

PPTX
Cyber security presentation
Bijay Bhandari
 
PDF
cybersecurityprt-131017183506-phpapp02.pdf
ShantanuDharekar
 
PDF
cybersecurityprt-131017183506-phpapp02.pdf
AnkitShrestha37
 
PPTX
Mian
princejhulan
 
PPTX
Mian
Dom Mike
 
PPTX
Cyber Security
Home
 
PPTX
cyber security
BasineniUdaykumar
 
PPTX
recent trends in technology.pptx
keerthivemireddy
 
PPTX
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
PPTX
Cyber crime and security
sanjana mun
 
PPTX
Cyber security
Krishanu Ghosh
 
PPTX
Cyber Crime and Security
Chitra Mudunuru
 
PPTX
Cyber crime and security
BasitShah18
 
PPT
Cyber Security
Arshad Khan
 
PPTX
Cyber crime and security
Eng. Shuaib ibrahim
 
PPTX
Cyber crime and security 1
indhuchezhian
 
PPTX
Cyber crime and Security
Hussain777
 
PPTX
Cyber crime perspective, definition types, various forms of cyber crime
VanithaM33
 
PPTX
Cyber crime ppt
Gracy Joseph
 
PPTX
Cyber crime
Prachi ranpura
 
Cyber security presentation
Bijay Bhandari
 
cybersecurityprt-131017183506-phpapp02.pdf
ShantanuDharekar
 
cybersecurityprt-131017183506-phpapp02.pdf
AnkitShrestha37
 
Mian
Dom Mike
 
Cyber Security
Home
 
cyber security
BasineniUdaykumar
 
recent trends in technology.pptx
keerthivemireddy
 
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
Cyber crime and security
sanjana mun
 
Cyber security
Krishanu Ghosh
 
Cyber Crime and Security
Chitra Mudunuru
 
Cyber crime and security
BasitShah18
 
Cyber Security
Arshad Khan
 
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber crime and security 1
indhuchezhian
 
Cyber crime and Security
Hussain777
 
Cyber crime perspective, definition types, various forms of cyber crime
VanithaM33
 
Cyber crime ppt
Gracy Joseph
 
Cyber crime
Prachi ranpura
 
Ad

More from Cyber Security Infotech (6)

PDF
Trends that state the future of mobile application development
Cyber Security Infotech
 
PPTX
Cyber security infotech pvt ltd
Cyber Security Infotech
 
PPT
Introduction to induction heating by stead fast engineers
Cyber Security Infotech
 
PPT
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
PDF
Introduction to cyber security by cyber security infotech (csi)
Cyber Security Infotech
 
PPTX
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Trends that state the future of mobile application development
Cyber Security Infotech
 
Cyber security infotech pvt ltd
Cyber Security Infotech
 
Introduction to induction heating by stead fast engineers
Cyber Security Infotech
 
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Introduction to cyber security by cyber security infotech (csi)
Cyber Security Infotech
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Ad

Recently uploaded (20)

PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PDF
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
PPTX
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
PDF
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
PDF
Integrating IIoT with SCADA in Oil & Gas A Technical Perspective.pdf
Rejig Digital
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PDF
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PDF
How Current Advanced Cyber Threats Transform Business Operation
Eryk Budi Pratama
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Basics of Electronics for IOT(actuators ,microcontroller etc..)
arnavmanesh
 
PPTX
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PPTX
PCU Keynote at IEEE World Congress on Services 250710.pptx
Ramesh Jain
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
Integrating IIoT with SCADA in Oil & Gas A Technical Perspective.pdf
Rejig Digital
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
How Current Advanced Cyber Threats Transform Business Operation
Eryk Budi Pratama
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Basics of Electronics for IOT(actuators ,microcontroller etc..)
arnavmanesh
 
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
The Future of Artificial Intelligence (AI)
Mukul
 
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PCU Keynote at IEEE World Congress on Services 250710.pptx
Ramesh Jain
 

Introduction to cyber security by cyber security infotech(csi)

  • 2.  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.
  • 3.  Communication security-protecting organization communication media , technology , and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
  • 4.  The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.  Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .
  • 5.  The first recorded cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.
  • 6. Illegal access Illegal Interception System Interference Data Interference Misuse of devices Fraud
  • 7.  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.
  • 8.  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.
  • 9.  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.
  • 10.  Use antivirus software  Insert firewalls , pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 11.  The only system which is truly secure is one which is switched off and unplugged.  So , only way to be safe is Pay attention and Act smart.