cyber security
TRANSCRIPT
![Page 1: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/1.jpg)
Cyber security
Presented by Sapna Patil
![Page 2: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/2.jpg)
OUTLINE…
What is cyber crime? What is Cyber Security? Why is Cyber Security Important? Major security problems Who is getting attacked? Safety tips Prons Cons conclusion
![Page 3: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/3.jpg)
WHAT IS CYBER CRIME?
to steal data
disadvantages of internet.
illegal activity.
![Page 4: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/4.jpg)
WHAT IS CYBER SECURITY?
information technology security
Protecting from unauthorized access
![Page 5: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/5.jpg)
WHY IS CYBER SECURITY IMPORTANT?
Cyber attacks
To safeguard national security
Digital spying
misuse
![Page 6: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/6.jpg)
MAJOR SECURITY PROBLEMS
Virus
Hacker
Malware
Trojan horses
Password cracking
![Page 7: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/7.jpg)
![Page 8: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/8.jpg)
Safety tips:
•Use antivirus software
•Insert firewalls , pop up blocker
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Use secure connection
•Open attachments carefully
•Use strong passwords
![Page 9: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/9.jpg)
PROS:
Defend- hacks and virus.
The application of cyber security used in our PC needs update every
week.
new virus also deleted.
![Page 10: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/10.jpg)
CONS:
Interconnected computers.
Improved viruses, malware and worms.
Increase in “cyber warfare” possibly.
More anonymity between hackers.
![Page 11: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/11.jpg)
CONCLUSION
it will be helpful
emerging security threats are explained
Simple and practical prevention methods are
explained
![Page 12: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/12.jpg)
ANY QUESTIONS ??
![Page 13: Cyber security](https://reader030.vdocuments.us/reader030/viewer/2022032513/55d2cc99bb61eb6e408b45b0/html5/thumbnails/13.jpg)