0% found this document useful (0 votes)
538 views17 pages

Presentation On Cyber Security

This document discusses cyber security. It defines cyberspace and cybernauts. It outlines important fundamentals of cyber security like protecting devices, connections, email communication, and backing up files. Key elements include application security, end-user education, information security, network security, operational security, and disaster recovery. Common tools used for cyber security are passwords, anti-virus software, software patches, firewalls, authentication, and encryption. The core functions of cyber security are to identify, protect, detect, respond, and recover from cyber threats. Cyber security is important to address increasing technology adoption, unrestricted information access, and growing sophistication of threats. Essentials for securing computers include physical security, limiting administrator access,

Uploaded by

Divyansh Bajpai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
538 views17 pages

Presentation On Cyber Security

This document discusses cyber security. It defines cyberspace and cybernauts. It outlines important fundamentals of cyber security like protecting devices, connections, email communication, and backing up files. Key elements include application security, end-user education, information security, network security, operational security, and disaster recovery. Common tools used for cyber security are passwords, anti-virus software, software patches, firewalls, authentication, and encryption. The core functions of cyber security are to identify, protect, detect, respond, and recover from cyber threats. Cyber security is important to address increasing technology adoption, unrestricted information access, and growing sophistication of threats. Essentials for securing computers include physical security, limiting administrator access,

Uploaded by

Divyansh Bajpai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

CYBER SECURITY

Submitted to Submitted by
Miss Akansha Kathuria Divyansh Bajpai
ID- 22451108
BSc Animation and
Gaming
Registration Screenshot
Contents
1. Cyberspace
2. Cybernauts
3. Important fundamentals of Cyber Security
4. Key elements of Cyber Security
5. Tools used for Cyber Security
6. Cyber Security Core Functions
7. Importance of Cyber Security
8. Cyber Security Challenges
9. Essentials in securing the computers
10. Classification of Cyber Attacks
11. Common Cyber Attack Terms
What is Cyber Security ?
Cyberspace- Definition
Cybernauts
Important Fundamentals of Cyber Security

Cyber security

Protect and backup


Protect the device electronic
documents and files

Protect the
Protect email
connection of
devices
communication
Key elements of Cyber Security

Application
Security

End-user Information
Education Security

Key
Elements of
Cyber
Security

Operational Network
Security Security

Disaster
Recovery
Tools used for Cyber Security

Passwords

Anti-Virus/ Anti-Malware Software

Common tools Software Patches


used to prevent
Data Leakage
Firewalls

Authentication

Encryption
Cyber Security Core Functions

Identify
Protect
Develop
understanding Detect
Develop and
Manage implement Respond
systems, safeguards Identify the
assets, data occurrence Recover
and Ensure Take action
capabilities delivery of of cyber on the
services security detected Resilience
events cyber Restoration
security
events
Why Cyber Security is important?

• Cyber Security is not a one-time process to achieve


• It is an ever growing challenge encountered from time to
time
• When old problems are fixed and rectified, new targeted
attacks challenge the Cyberspace
• Cyber security is a process by itself and not the end
Cyber Security Challenges

• Increasing number of users and adoption


of technology
• Unrestricted or open access to Information
• Lack of control mechanisms
• Growing sophistication of threats
• Lack of preparedness to handle the
upcoming challenges
• Inadequate and restricted handling of
related crimes legally or the legal challenges
Essentials in securing the Computers

Physical security

Protect against unauthorized


Administrators

Assign the least


permission possible
Securing computers
Use the most secure
OS possible

Use strong passwords or pass-


phrase

Use of secure
authentication methods
Classification of Cyber Attacks
Cyber Attack
Classification

Based on Based on Based on


purpose severity of Network Type
Legal Based on
Involvement Scope
classification

Reconnaissance Attacks in
Attack Cyber Crime Malicious MANET
Active Attacks
Access Attack Cyber Large-Scale Attacks in
Espionage Passive Attack WSN
Denial of Service Attacks
Attack Cyber Non-Malicious
Terrorism Small-Scale
Attack
Cyber War
Common Cyber Attacks Terms
• Hacker
• Cracker
• Phreaker
• Spammer
• Phisher
• White hat
• Black hat
Conclusion
• We are living in digital era and digital technology has
transformed our lives promoting the need for Cyber Security.
• Cyber Security is a very important concern today due to digitization
and Information exchange.
• Cyber Attacks have started affecting most of the systems today
because of the dependency on technology.
• Cyber Attacks are on the rise, because there are various ways
and means through which a system can be compromised.
• It is absolutely necessary to understand the technical functioning
of the Cyber Attacks to prevent and handle them better.
Thank you

You might also like