It Practical Cyber Security: Nishita Nagar X-A

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

IT PRACTICAL

CYBER SECURITY
N I S H I TA N A G A R X - A
WHAT IS CYBER SECURITY?

• Cyber security is the practice of defending computers, servers,


mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can be
divided into a few common categories.
• Cybersecurity is important for two very human reasons:

• Our identities are increasingly online. From credit agencies to


our workplaces and to the social media networks that we use
WHY IS IT every day, we are living online.

IMORTANT? • The supply chains that keep us fed and clothed are all managed
through information technology.
Benefits of                       01 02 03 04 05

       It Can Protect
Your Business
Protects
Personal Info
Allows
Employees To
Work Safely
Protects
Productivity
Prevents
Adware

            Cyber Security
  Network security is the practice of securing a computer network
from intruders, whether targeted attackers or opportunistic malware.

  Application security focuses on keeping software and devices


free of threats. A compromised application could provide access to
the data its designed to protect. Successful security begins in the
Types of design stage, well before a program or device is deployed.

               Cyber   Information security protects the integrity and privacy of data,

security  both in storage and in transit.

 Operational security includes the processes and decisions for


handling and protecting data assets. The permissions users have
when accessing a network and the procedures that determine how
and where data may be stored or shared all fall under this umbrella.
• A cyber or cybersecurity threat is a
malicious act that seeks to damage data, steal
data, or disrupt digital life in general. Cyber
threats include computer viruses, data
What are cyber breaches, Denial of Service (DoS) attacks,
threats? and other attack vectors.
TYPES OF CYBER THREATS

1. Cybercrime includes
2. Cyber-attack often 3. Cyberterrorism is
The threats countered by single actors or groups
involves politically intended to undermine
cyber-security are three- targeting systems for
motivated information electronic systems to
fold: financial gain or to cause
gathering. cause panic or fear.
disruption.
MEANING OF MALWARE?

• Malware means malicious software. One of the most common cyber


threats, malware is software that a cybercriminal or hacker has created to
disrupt or damage a legitimate user’s computer. Often spread via an
unsolicited email attachment or legitimate-looking download, malware
may be used by cybercriminals to make money or in politically motivated
cyber-attacks.
Trojans: A type of malware that is
Virus: A self-replicating program
disguised as legitimate software.
that attaches itself to clean file and
There are a number of different Cybercriminals trick users into
spreads throughout a computer
types of malware, including: uploading Trojans onto their
system, infecting files with
computers where they cause
malicious code.
damage or collect data.

TYPES OF Spyware: A program that secretly


records what a user does, so that
cybercriminals can make use of
Ransomware: Malware which
locks down a user’s files and data,
Adware: Advertising software
which can be used to spread

MALWARE
this information. For example, with the threat of erasing it unless a
malware.
spyware could capture credit card ransom is paid.
details.

Botnets: Networks of malware
infected computers which
cybercriminals use to perform tasks
online without the user’s
permission.
CYBER SAFETY TIPS

Update Update your software and operating system: This means you benefit from the latest security patches.

Use anti-virus software: Security solutions like Kaspersky Total Security will detect and removes threats. Keep your software updated for the best level of
Use protection.

Use Use strong passwords: Ensure your passwords are not easily guessable.

Do not open Do not open email attachments from unknown senders: These could be infected with malware.

Do not click on Do not click on links in emails from unknown senders or unfamiliar websites: This is a common way that malware is spread.

Avoid Avoid using unsecure wifi networks in public places: Unsecure networks leave you vulnerable to man-in-the-middle attacks.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy