Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBER SECURITY...

Similar presentations


Presentation on theme: "CYBER SECURITY..."— Presentation transcript:

1 CYBER SECURITY..

2 WHAT IS CYBER SECURITY? Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

3 WHAT IS CYBER THREAT? Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. These can be labeled as either a cyber campaign, cyberwarfare or cyberterrorism in different context. Cyber-attacks can range from installing spyware on a PC to attempts to destroy the infrastructure of entire nations. Cyber-attacks have become increasingly sophisticated and dangerous as the Stuxnet worm recently demonstrated.User behavior analytics and SIEM are used to prevent these attacks.

4 CYBER THREATS: HACKING AND CRACKING : Hacking is a particular type of illegal activity which endangers the privacy and security of important online information. Hacking challenges the utility of mechanisms which are used to secure a information network. It is important here to note that although hacking is used interchangeably with cracking,both are different. Both the activities are carried on with different objectives. In hacking,the attempt is to create something while in cracking the primary motive is to destroy something. SPAM: The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. TROJAN HORSES : Malicious program that is disguised as, or embedded within legitimate software. It is an executable file that will install itself and run automatically once it is downloaded.

5 VIRUSES : Malicious computer programs that are often sent as an attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. WORMS: a worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memeory, doesn't damage or alter the hard drive and propagates by sending itself to oyher computers in a network. PHISHING: Fake s, text messages and websites created to look like they are from authentic companies. They are sent by criminals to steal personal and financial information from you.This is also known as spoofing. Malware : Malware is an umbrella term used to refer to a variety of forms of hostile or instructive software,including computer viruses , worms.trrojan horses, ransomware, spyware,and other malicious program. It can teke the form of executable code, scripts, active content and other software.

6 EFFORTS DONE BY..... SUNIDHI JAIN IX-A 38.


Download ppt "CYBER SECURITY..."

Similar presentations


Ads by Google