0% found this document useful (0 votes)
45 views46 pages

Cyber-Futuristic AI Technology Thesis Defense by Slidesgo

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views46 pages

Cyber-Futuristic AI Technology Thesis Defense by Slidesgo

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

CYBER SECURITY

Cybersecurity is the practice of protecting computer systems,


networks, and data from digital threats, including hacking, malware,
and unauthorized access, to ensure the confidentiality, integrity, and
availability of information.
Data Protection and Privacy
P R O T E C T I N G S E N S I T I V E D ATA F R O M U N A U T H O R I Z E D
A C C E S S P R O T E C T I N G S E N S I T I V E D ATA F R O M U N A U T H O R I Z E D A C C E S S

Confidentiality Data protection ensures that sensitive information remains confidential

Encryption Data protection involves using encryption and access controls to prevent
unauthorized access.

Data Security Protecting data through technical and organizational measures, such as
encryption, access controls, and regular security assessments, is essential
to prevent data breaches and unauthorized access.
Cybersecurity Threats
01 02 03
Malware Phishing Ransomware
Malicious software Method that involves A type of malicious software
tricking individuals that encrypts a victim's files,

04 05 06
DDoS Attacks Social Engineering Insider Threats
Social engineering is a manipulative tactic Insider threats involve individuals within
A Distributed Denial of where cybercriminals exploit human an organization, such as employees or
Service (DDoS) attack floods psychology to deceive individuals or gain contractors, exploiting their authorized
unauthorized access to confidential access to compromise security, often for
a network or website with
information or systems. personal gain or malicious intent.
excessive traffic,
01 Malware
“malicious software," is software
specifically designed to harm,
infiltrate, or exploit computer systems
and their data.
"In the digital realm, malware
is the silent assassin that
preys on the unprepared.“
Why Cybersecurity Matters

Protection of Data: Ensuring National Security


Safeguarding sensitive and valuable Continuity of In an interconnected world, national
data. This includes personal Operations security is closely tied to
information, financial records,
Cybersecurity is critical for the cybersecurity. Malicious actors, such
intellectual property, and much uninterrupted operation of critical as state-sponsored hackers or
more. Protecting this data ensures infrastructure, businesses, and cybercriminal organizations, can
the privacy and security government organizations. Cyberattacks
can disrupt services
target government systems, critical
infrastructure
Cybersecurity Concepts

1 2 3
Cybersecurity concepts
• Confidentiality,
encompass practices, Authentication Intrusion
Integrity,
technologies, and strategies Availability and Authorization Detection/Prevention
designed to protect digital (CIA Triad)
systems, networks, and data
from unauthorized access and
cyber threats.

Key concepts
Security Measures and Best Practices

 Strong Passwords
 Two-Factor Authentication

 Regular Software Updates/Patching


 Firewalls and Antivirus Software

 Data Backups
 Employee Training and Awareness
A picture is worth a
thousand words
Cybersecurity Tools and Technologies

Antivirus VPNs
A VPN, or Virtual Private
Antivirus software scans,
Network, encrypts internet
detects, and removes or
traffic, rerouting it through
quarantines malicious software
secure servers to protect online
privacy, security, and provide
anonymity to users.
Firewalls Intrusion Detection
Firewalls act as a barrier Intrusion detection systems monitor
between a computer network network or system activities,
identifying and alerting to suspicious
and potential external threats,
or unauthorized behavior, helping to
allowing authorized data thwart cyberattacks.
800,944
The FBI's Internet Crime Report for 2022 revealed that
the public reported a total of cybercrime complaints
Emerging Trends in Cybersecurity

o AI and Machine Learning in Security –


o AI and machine learning enhance security by automatically identifying and
responding to evolving cyber threats with improved speed and accuracy.

oo IoT
IoT Security –
security involves protecting the interconnected devices and networks of the Internet of Things to prevent vulnerabilities
that could be exploited by cyber threats.

o Blockchain and Cryptocurrency Security –


Blockchain and cryptocurrency security aim to protect digital assets and transactions through
cryptographic techniques and decentralized ledger technology.
Ethical Hacking and Penetration Testing
Explanation of Ethical Hacking

Basics factors
i. Proactive
● Authorized Testing Security
● Vulnerability Identification Penetration Testing
● Improving Security i. Continuous Penetration testing, also known as pen testing,
Improvement is a controlled and authorized cybersecurity
assessment where skilled professionals
simulate real-world cyberattacks to identify
vulnerabilities, assess security defenses, and
provide recommendations for strengthening
an organization's security posture
INDIA CYBER SECURITY SCORE (G C I)

97.5 90.4 81.5

2020 2021 2022


13.9 Lakhs Attacks 14.02 Lakhs Attacks 11.58 Lakhs Attacks
Ethical Hacking
can save you from
this

Ethical hackers identify vulnerabilities


and weaknesses in a system or network,
allowing organizations to patch or fix
them before malicious hackers can
exploit these weaknesses.
Methodology
Mercury is the closest planet to
Type of data the Sun and the smallest one in
the System

Venus has a beautiful name and


Motives is the second planet from the
Sun

Despite being red, Mars is


Mercury Data collection actually a cold place. It’s full of
iron oxide dust

Jupiter is a gas giant and the


Specific sampling biggest planet in the Solar
System
Locations
Mercury
Mercury is a
small planet

Venus
Venus has a nice
name
Mars
Mars is a very
cold place
Analysis & development

Phase 1 Phase 2
Mercury is the closest planet to Venus has a beautiful name and is
the Sun and the smallest one in the second planet from the Sun. It’s
the entire Solar System terribly hot!
Analysis & development
Mercury
10% Mercury is quite a
small planet

Mars
30% Mars is actually a
very cold place

Venus
60% Venus has a beautiful
name

Follow the link in the graph to modify its data and then paste the new one here. For more info, click here
Analysis of the results
Mars
Despite being red, Mars is
a cold place

Venus
Venus is the second planet
from the Sun

Neptune
Neptune is the farthest
planet from the Sun
Follow the link in the graph to modify its data and then paste the new one
here. For more info, click here
Discussion

Discussion 1 Discussion 3
Mars is actually a very 1 3 Saturn is a gas giant and
cold place has rings

Discussion 2 Discussion 4
Jupiter is the biggest
planet of them all
2 4 Venus is the second
planet from the Sun
Conclusions

Venus Mercury Mars


Venus is the second Mercury is the closest Despite being red, Mars
planet from the Sun planet to the Sun is a cold place

Jupiter Saturn Neptune


Jupiter is the biggest Saturn is composed of It’s the farthest planet
planet of them all hydrogen and helium from the Sun
Evolution

Mars Venus
01 03
Mars is actually a very Venus is the second
cold place planet from the Sun

Jupiter Saturn
Jupiter is the biggest 02 It’s composed of 04
planet of them all hydrogen and helium
Technology references
Do you know what helps you make your point
clear? Lists like this one:

● They’re simple
● You can organize your ideas clearly
● You’ll never forget to buy milk!

And the most important thing: the audience won’t


miss the point of your presentation at all. Let’s use
lists!
Mockup

You can replace the image on the


screen with your own work. Just
right-click on it and select
“Replace image”
Thanks!
Do you have any questions?
[email protected]
+91 620 421 838
yourwebsite.com

Please keep this slide for attribution


CREDITS: This presentation template was created by Slidesgo, and includes
icons by Flaticon and infographics & images by Freepik
Conclusion

Here’s an assortment of alternative resources whose style fits that of this template:

Content

● Woman wearing virtual reality simulator


● Man using a pair of smart glasses
● Woman wearing virtual reality simulator
● Website hosting with smiley man in suit
● Close up hand holding futuristic screen
Resources

Did you like the resources on this template? Get them for free at our other websites:

Photos
● Gradient network connection background
Vectors
● Medium shot man wearing vr glasses
● Close up eye scanning
● Side view woman working on digital monitors
● Young man with virtual reality simulator and woman testing
● Website hosting concept with futuristic screen
Instructions for use
If you have a free account, in order to use this template, you must credit Slidesgo by keeping the Thanks slide. Please
refer to the next slide to read the instructions for premium users.

As a Free user, you are allowed to:


- Modify this template.
- Use it for both personal and commercial projects.

You are not allowed to:


- Sublicense, sell or rent any of Slidesgo Content (or a modified version of Slidesgo Content).
- Distribute Slidesgo Content unless it has been expressly authorized by Slidesgo.
- Include Slidesgo Content in an online or offline database or file.
- Offer Slidesgo templates (or modified versions of Slidesgo templates) for download.
- Acquire the copyright of Slidesgo Content.

For more information about editing slides, please read our FAQs or visit Slidesgo School:
https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
Instructions for use (premium users)
As a Premium user, you can use this template without attributing Slidesgo or keeping the "Thanks" slide.

You are allowed to:


● Modify this template.
● Use it for both personal and commercial purposes.
● Hide or delete the “Thanks” slide and the mention to Slidesgo in the credits.
● Share this template in an editable format with people who are not part of your team.

You are not allowed to:


● Sublicense, sell or rent this Slidesgo Template (or a modified version of this Slidesgo Template).
● Distribute this Slidesgo Template (or a modified version of this Slidesgo Template) or include it in a database or in
any other product or service that offers downloadable images, icons or presentations that may be subject to
distribution or resale.
● Use any of the elements that are part of this Slidesgo Template in an isolated and separated way from this
Template.
● Register any of the elements that are part of this template as a trademark or logo, or register it as a work in an
intellectual property registry or similar.

For more information about editing slides, please read our FAQs or visit Slidesgo School:
https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
Fonts & colors used

This presentation has been made using the following fonts:

Audiowide
(https://fonts.google.com/specimen/Audiowide)

Karla
(https://fonts.google.com/specimen/Karla)

#031126 #ffffff #10355f #3b8794 #51afdb


Storyset

Create your Story with our illustrated concepts. Choose the style you like the most, edit its colors, pick
the background and layers you want to show and bring them to life with the animator panel! It will boost
your presentation. Check out how it works.

Pana Amico Bro Rafiki Cuate


Use our editable graphic resources...

You can easily resize these resources without losing quality. To change the color, just ungroup the resource
and click on the object you want to change. Then, click on the paint bucket and select the color you want.
Group the resource again when you’re done. You can also look for more infographics on Slidesgo.
JANUARY FEBRUARY MARCH APRIL MAY JUNE

PHASE 1

Task 1

Task 2

PHASE 2

Task 1

Task 2

JANUARY FEBRUARY MARCH APRIL

PHASE
1

Task 1

Task 2
...and our sets of editable icons

You can resize these icons without losing quality.


You can change the stroke and fill color; just select the icon and click on the paint bucket/pen.
In Google Slides, you can also use Flaticon’s extension, allowing you to customize and add even more icons.
Educational Icons Medical Icons
Business Icons Teamwork Icons
Help & Support Icons Avatar Icons
Creative Process Icons Performing Arts Icons
Nature Icons
SEO & Marketing Icons

You might also like