0% found this document useful (0 votes)
12 views8 pages

Introduction To Cyber Security

Uploaded by

k23246533
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views8 pages

Introduction To Cyber Security

Uploaded by

k23246533
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Introduction to

Cyber Security
Cyber security is the practice of protecting digital systems, networks, and
data from unauthorized access, damage, or disruption. It's crucial for
safeguarding personal and business information in the digital age.

by Akshita Mishra
Understanding Cyber Threats
1 Malware 2 Phishing
Malicious software like viruses, Fraudulent attempts to acquire
worms, and Trojans that can infect sensitive information by posing as a
and damage systems. trustworthy source.

3 Data Breaches
Unauthorized access and theft of confidential data, often for financial gain or
espionage.
Implementing Strong Passwords
Length Uniqueness Password Managers

Use passwords that are at least 12 Avoid using the same password Use a reputable password manager
characters long, mixing upper and across multiple accounts. Each to securely store and generate
lowercase letters, numbers, and account should have a unique, strong, unique passwords.
symbols. complex password.
Securing Your Devices
Enable Encryption Install Updates
Encrypt your devices to protect sensitive data in case Keep your operating system and applications up-to-
of loss or theft. date to address security vulnerabilities.

Use Antivirus Enable Two-Factor Authentication


Install reputable antivirus software to detect and Add an extra layer of security to your accounts by
remove malware on your devices. enabling two-factor authentication.
Recognizing Phishing Attacks

Suspicious Emails Malicious Links Dubious Attachments


Be wary of emails with urgent Avoid clicking on links in emails or Never open attachments from
requests, unexpected attachments, messages from unknown sources. untrusted sources, as they may
or unusual sender addresses. contain malware.
Keeping Software Up-to-Date
Identify 1
Regularly check for available updates for your
operating system, applications, and security
software. 2 Schedule
Set your devices to automatically install
updates or schedule regular update sessions.
Apply 3
Promptly apply updates to ensure your
systems are protected against the latest
threats.
Backing Up Your Data
Identify
1 Determine which files and data are critical and need to be backed up.

Choose
2 Select a reliable backup method, such as cloud storage or external hard
drives.

Automate
3 Set up automatic backups to ensure your data is regularly and securely stored.
Conclusion and Resources
Implementing these cyber security best practices will help protect your digital assets and personal information. For
more information, consult trusted resources like the Cybersecurity and Infrastructure Security Agency (CISA) and
the National Institute of Standards and Technology (NIST).

You might also like