0% found this document useful (0 votes)
41 views11 pages

Cybersecurity Project Overview

The document certifies that Praveen Lakshkar of XI-A completed a Computer Science project on 'Cybersecurity' under the guidance of Smt. Raksha Parmar. It outlines the importance of cybersecurity, common threats like malware and phishing, and provides tips for online protection. The project reflects a good understanding of the topic and acknowledges support from teachers, parents, and friends.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views11 pages

Cybersecurity Project Overview

The document certifies that Praveen Lakshkar of XI-A completed a Computer Science project on 'Cybersecurity' under the guidance of Smt. Raksha Parmar. It outlines the importance of cybersecurity, common threats like malware and phishing, and provides tips for online protection. The project reflects a good understanding of the topic and acknowledges support from teachers, parents, and friends.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CYBER

SECURITY
PRAVEEN LAKSHKAR
CLASS 11
COMPUTER SCIENCE
CERTIFICATE
This is to certify that Praveen Lakshkar
of XI-A has successfully completed the
Computer Science project on
"Cybersecurity" as part of the academic
curriculum for the session 2024-25.

The project was conducted under the


guidance of Smt. Raksha Parmar Ma’am,
and the work demonstrates a good
understanding of the topic and a sincere
effort in research and presentation.

Signature
ACKNOWLEDGEMENT
I would like to express my sincere
gratitude to our CS teacher,Smt. Raksha
Parmar Ma’am, for his vital support,
guidance, and encouragement, without
which this project would not have been
possible. Her insightful feedback and
constant motivation have been invaluable
throughout this journey.

I also wish to extend my heartfelt thanks


to my parents and friends for their
unwavering support and interest, which
inspired and encouraged me to move
forward with confidence and
determination.

Thank you all for being a part of this


meaningful experience!
C
What is Cyber Security?
Y
B Cyber security refers to the body of
E technologies, processes, and practices
designed to protect networks, devices,
R programs, and data from attack,
damage, or unauthorized access
S
E It requires an understanding of
potential information threats, such as
C viruses and other malicious code

U Effective cyber security reduces the


R risk of cyber attacks, and protects
organisations and individuals from the
I unauthorised exploitation of systems,
networks and technologies
T
Y
C
Importance of Cyber
Y Security
B Cyber security is important because
E government, corporate and medical
organizations collect, process and store
R unprecedented amounts of data on
computers and other devices
S
E The core functionality of cybersecurity
involves protecting information and
C systems from major cyberthreats

U Some of the common threats are


R outlined below in more detail:
•Cyberterrorismis
I • Cyberwarfare
• Cyberespionage
T
Y
C
About Cyberterrorismis,
Y Cyberwarfare,Cyberspionage
B Cyberterrorismis - The disruptive use
E of information technology by terrorist
groups to further their ideological or
R political agenda. This takes the form of
attacks on networks, computer systems
S and telecommunication infrastructures.
E
Cyberwarfare - It involves nation-
C states using information technology to
penetrate another nation's networks to
U cause damage or disruption.
R
Cyberspionage • It is the practice of
I using information technology to obtain
secret information without permission
T from its owners or holders.
Y
C
Types of Cybersecurity
Y Threats
B Cybersecurity threats can be classified
E into various types based on their
methods and impact. Let’s look at some
R common threats:
1. Malware
S Malware is a type of software that is
E designed to harm a computer system.
Examples include:
C Viruses: Programs that attach
themselves to other software or
U files and spread.
R Trojans: Malicious programs
disguised as legitimate software.
I Ransomware: Software that locks
your files and demands money to
T unlock them.
Y
C
Types of Cybersecurity
Y Threats
B 2. Phishing
E Phishing attacks occur when
R cybercriminals trick you into revealing
your personal information, such as
S passwords or bank account numbers, by
pretending to be trustworthy entities
E like banks or social media sites.
C 3. Hacking

U Hacking is when someone gains

R unauthorized access to a computer


system, often to steal data or cause
I harm. Hackers may break into
accounts, websites, or networks.
T
Y
C
How to Protect Yourself
Y Online
B 1. Use Strong Passwords
E Create long, complex passwords

R with a combination of letters


(upper and lower case), numbers,
S and special characters.
Avoid using the same password for
E multiple accounts.

C 2. Enable Two-Factor Authentication


(2FA)
U
Two-Factor Authentication adds an
R extra layer of security by requiring not
only a password but also a second form
I of verification (like a code sent to your
T phone) to access your account.

Y
C
How to Protect Yourself
Y Online
B 3. Be Cautious with Emails and
Links
E Never click on links or open
R attachments in suspicious emails. These
could be phishing attempts or contain
S malware.
4. Install Antivirus Software
E Antivirus programs help detect and
C remove malware. Ensure it is always
updated to protect against new
U threats.
5. Regularly Update Software
R Keeping your operating system and
I software up-to-date ensures that
security vulnerabilities are patched,
T making it harder for hackers to exploit
them.
Y
THANK
YOU
"SECURE YOUR DATA,
SECURE YOUR FUTURE."

You might also like