0% found this document useful (0 votes)
226 views

Cybersecurity

This document defines key cybersecurity terms and discusses major cybersecurity problems. It explains that cybersecurity helps protect organizations and individuals from cyber attacks by preventing data breaches, identity theft, and other cybercrimes. The major security problems covered are viruses, hackers, malware, Trojan horses, and password cracking. It provides details on each type of threat and recommendations on how to address them, such as using antivirus software, strong unique passwords, and keeping systems updated.

Uploaded by

moonval.808
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views

Cybersecurity

This document defines key cybersecurity terms and discusses major cybersecurity problems. It explains that cybersecurity helps protect organizations and individuals from cyber attacks by preventing data breaches, identity theft, and other cybercrimes. The major security problems covered are viruses, hackers, malware, Trojan horses, and password cracking. It provides details on each type of threat and recommendations on how to address them, such as using antivirus software, strong unique passwords, and keeping systems updated.

Uploaded by

moonval.808
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

❑ Meaning of the word Cyber

It is a combining form relating to


information technology, the internet, and virtual
reality.
❑ Cybersecurity
Is the art of protecting networks, devices,
and data from unauthorized access or criminal
use and the practice of ensuring confidentiality,
integrity, and availability of information
Importance of Cyber Security

Cybersecurity is critical because it helps to protect


organizations and individuals from cyber attacks.
Cybersecurity can help to prevent data breaches,
identity theft, and other types of cybercrime.
Organizations must have strong cybersecurity measures
to protect their data and customers.
MAJOR SECURITY PROBLEMS

1.VIRUS

2.HACKER

3.MALWARE

4.TROJAN HORSES

5.PASSWORD CRACKING
VIRUSES
A computer program that can copy itself and infect a
computer without permission or knowledge of the user. A virus
might corrupt or delete data on a computer, use e-mail programs
to spread itself to other computers, or even erase everything on a
hard disk.

❑ SOLUTION:
Install a security suite that protects the computer against
threats such as viruses.
Example of Anti-virus
HACKER

A hacker is a person who breaks into a

computer system. The reasons for hacking can be

many: installing malware, stealing or destroying data,

disrupting service, and more. Hacking can also be

done for ethical reasons, such as trying to find

software vulnerabilities so they can be fixed.


TYPES OF HACKERS
❑ Black hat hackers
are cybercriminals that illegally crack systems with malicious intent. Seeking to
gain unauthorized access to computer systems is the definition of black hat hacking.
Once a black hat hacker finds a security vulnerability, they try to exploit it, often by
implanting a virus or other type of malware such as a trojan.

❑ White hat hackers


also known as ethical security hackers, identify and fix vulnerabilities. Hacking
into systems with the permission of the organizations they hack into, white hat hackers
try to uncover system weaknesses in order to fix them and help strengthen overall
internet security.

❑ Gray hat hackers


may not have the criminal or malicious intent of a black hat hacker, but they also
don’t have the prior knowledge or consent of those whose systems they hack into. But
gray hat hackers may demand payment in exchange for providing full details of what
they uncovered.
❑ HOW TO PREVENT HACKING

To prevent hacking, employ strong, unique passwords and enable


two-factor authentication for added security. Keep all software up to
date, including antivirus tools, to patch known vulnerabilities. Be cautious
with emails, avoiding clicking on suspicious links or downloading
attachments from unknown sources. A combination of these measures
significantly reduces the risk of hacking and enhances overall digital
security.
❑ MALWARE

• The word “malware” comes from the term “MALicious

softWARE.”

• Malware is any software that infects and damages a

computer system without the owner’s knowledge or

permission.
MALWARE
To Stop Malware

❑ Download an anti-malware program that also


helps prevent infections.

❑ Activate Network Threat Protection, Firewall,


and Antivirus.

❑ Maintain backup.

❑ Keep your information private.


❑ Trojan Horses

Trojan, is a type of malicious code or software that can take control of your
computer. It is designed to damage, disrupt, steal, or in general inflict some other
harmful action on your data or network. Once installed, a Trojan can perform the
action it was designed for.
❑ Example of Trojan Horse:
Zeus/Zbot: The Zeus (Zbot) trojan is malware software that targets Microsoft
Windows-based devices. It infiltrates devices by generating a trojan horse, which
appears to your system as a legitimate file but is malware that can grant third-
party access to your system.
❑ How To Avoid Trojans

❑ Security suites, such as Avast Internet Security,


will prevent you from downloading Trojan
Horse.
❑ Never download or install software from a
source you don't trust completely. Never open
an attachment or run a program sent to you in
an email from someone you don't know. Keep all
software on your computer up to date with the
latest patches. Make sure a Trojan antivirus is
installed and running on your computer.
❑Password Cracking

Password cracking (also called, password hacking) refers to


various measures used to discover computer passwords. This is
usually accomplished by recovering passwords from data stored in
or transported from a computer system. Password cracking is done
by either repeatedly guessing the password, usually through a
computer algorithm in which the computer tries numerous
combinations until the password is successfully discovered.
❑Securing Password

A secure password and updated recovery info help

protect your Google Account. Your password should be hard to

guess and shouldn't contain personal information like your

birth date or phone number.

✓ Use always Strong password.

✓ Never use same password for two different sites.


❑ CONCLUSION

We hope that our presentation will be helpful for my audience to improve


their knowledge about cyber security and to overcome several security loopholes
on their computer operation. Also it helps to spread awareness among normal
people about emerging security threats. As technology advances, it's crucial for
individuals and organizations to adapt and stay informed about appearing risks. By
fostering a security-conscious culture and continually enhancing protective
measures, we can collectively contribute to a safer digital environment.
Cybersecurity is a shared responsibility, and by implementing these practices, we
can better protect our digital assets and privacy.
THANK YOU!

You might also like