Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Lesson 30 Computer Safety and Ethics
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Internet = A World of Opportunities
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Unit 19 INTERNET SECURITY
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Cyber crime & Security Prepared by : Rughani Zarana.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Protecting Students on the School Computer Network Enfield High School.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Small Business Security Keith Slagle April 24, 2007.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Lesson 15 : Networks And The Internet
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
Internet Dangers Technology Communication Tools E-Literate.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.
Information Systems Design and Development Security Precautions Computing Science.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Cyber crime and security issues
Chapter 40 Internet Security.
Cyber Security & awareness
Risk of the Internet At Home
Cyber Security & awareness
Unit# 7: Future Enabling use of ICT
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Cyber security and Computer Misuse
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Introduction-Cyber Safety
Presentation transcript:

Cyber Security Action against cyber crime

What is cyber security?  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.

What is…?  Communication security-protecting organization communication media, technology, and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements, including the systems and hardware that use, store or transmit that information.

What is cyber crime?  The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.  Other forms include "digital", "electronic", "virtual", "IT", "high-tech" and technology-enabled" crime.

History  The first recorded cyber crime was recorded in the year  The first spam took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.

Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud

Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.

How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.

Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.

Safety tips …  Use antivirus software  Insert firewalls, pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords, don’t give personal information unless required

Conclusion  The only system which is truly secure is one which is switched off and unplugged.  So, only way to be safe is Pay attention and Act smart.

THANK YOU  Slides by:-  BIJAY BHANDARI