You are on page 1of 12

CYBER SECURITY

Done by
Nalin sin
Suma
Neeha Gajula
Nikitah Sinha
Swetha
Rupesh
Pava
WHAT IS IT

• Refers to the body of technologies, processes,


and practices designed to protect networks,
devices programs and data from attack,
damage, or any unauthorized access.
WHAT IS THE PURPOSE
• cybersecurity is used to protect the data of and small large individuals and
organizations.
• It protects an organization’s data assets from any kind of digital attacks that
could damage the organization or individual
• Government, corporate, Medical and financial records all hold personal
information, any security incidents can lead to losses in terms of reputation,
money, theft of data and deletion of data
• Prevents data breaches and theft
COMMON CYBERSECURITY
THREATS
• Infected website
• Orphan accounts
• Malvertisements
• Online quizzes and personality tests
• Portable storage devices
• Unsupported browser extension
INFECTED WEBSITE
UNSUPPORTED BROWSER
EXTENSION
MALVERSTISEMENT
• Malverstising is the practice of using web ad to spread malware( a software
with intent of damaging devices or stealing data).
• Cybercrimianls use the same advertising strategies as legitimate companies
• Malverstising will make the user either to downalod malware directly on
vistors’s device or to send visistors to website that distributes viruses and any
other malicious program.
• Criminals use redirect to send clickers to a malicious site and on while on the
site, code will be runt in the background(which ill download the malware
into the device)
MALVERTISING
PORTABLE STORAGE DEVICES
• 25% of malware is spread today through USB devices
• The USB port of your PC may contain malware that you copy unknowingly
• Once the malware infects your PC t steal or corrupt data, it might spread to
others
• How to minimize it
• - Install anti-virus software, that will scan any device that is
connected to your PC
• - keep personal and business data separate
• - after transferring sensitive data from a USB drive, delete it
BENEFITS

• Protection for data and networks


• Prevention of unauthorized users accessing
digital assets
• Protection of personal information

You might also like