CYBER SECURITY...

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Viruses & Destructive Programs
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.
Cyber Crimes.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Network System Security - Task 2. Russell Johnston.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Security Risks Todays Lesson Security Risks Security Precautions
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Viruses & Destructive Programs
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
Network security threats
COMPUTER VIRUSES Computer Technology.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Viruses and Virus Protection
Computer Security.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

CYBER SECURITY..

WHAT IS CYBER SECURITY? Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

WHAT IS CYBER THREAT? Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. These can be labeled as either a cyber campaign, cyberwarfare or cyberterrorism in different context. Cyber-attacks can range from installing spyware on a PC to attempts to destroy the infrastructure of entire nations. Cyber-attacks have become increasingly sophisticated and dangerous as the Stuxnet worm recently demonstrated.User behavior analytics and SIEM are used to prevent these attacks.

CYBER THREATS: HACKING AND CRACKING : Hacking is a particular type of illegal activity which endangers the privacy and security of important online information. Hacking challenges the utility of mechanisms which are used to secure a information network. It is important here to note that although hacking is used interchangeably with cracking,both are different. Both the activities are carried on with different objectives. In hacking,the attempt is to create something while in cracking the primary motive is to destroy something. SPAM: The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. TROJAN HORSES : Malicious program that is disguised as, or embedded within legitimate software. It is an executable file that will install itself and run automatically once it is downloaded.

VIRUSES : Malicious computer programs that are often sent as an e-mail attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. WORMS: a worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memeory, doesn't damage or alter the hard drive and propagates by sending itself to oyher computers in a network. PHISHING: Fake e-mails, text messages and websites created to look like they are from authentic companies. They are sent by criminals to steal personal and financial information from you.This is also known as spoofing. Malware : Malware is an umbrella term used to refer to a variety of forms of hostile or instructive software,including computer viruses , worms.trrojan horses, ransomware, spyware,and other malicious program. It can teke the form of executable code, scripts, active content and other software.

EFFORTS DONE BY..... SUNIDHI JAIN IX-A 38.