You are on page 1of 20

CYBER

SECURITY
Guru Nanak Institute of
Technology.
By Dimple Kumari
B .Tech ( CSE )
2nd year (4th Sem)
SECTIONS:-
*Introduction
 *Need of cyber security
 *Facts
 *Types of Cyber Attacks
 *Major Security Problem
 *Classification of Cyber Crime
 *Statistics
 *Types of Cyber security
 *Importance of Cyber Security
 *How does cyber security work
 *Cyber security strategy in INDIA
 *Future Challenges for cyber security
 *Safety Tips for cyber crime
 *conclusion.
INTRODUCTION
The word cyber, relates its origin to Information Technology, the internet and virtual
reality.
The term Cyber Security is that the security offered through online services to protect
online information.
Cyber crime are increasing day by day so to protect the system and the data form this
attacks some cyber security measure are taken. The need of Cyber Security . We felt
that cyber attacks were increasing and people were getting problems from it. Cyber
Security needs Dedication. The multinational companies and industries are having a
great amount of possessive data ,so there protection is important as well as. When
the data is protected by means of technical security we can say it cyber security.
Need of Cyber Security
*It helps in securing data from threats like data theft
or misuse.
*It safeguards Computer from Viruses.
*It secures from Cyber Crime.
*To protect System, Computers, and data from
attacks, damage and or unauthorized access.
FACTS:-
 There is a hacker attack every 39 seconds.
 43 percent of cyber attacks focuses the small business.
 95 percent of cyber security breaches are due to the human
errors.
 Only 38% of global organization claim they are prepared to
handle a sophisticated cyber attack.
 USA has more numbers of cyber attacks.
 160,000 Facebook accounts are compromised per day
 41% percent of companies have over 1,000 sensitive files
open to everyone.
Types of cyber attacks
 MALWARE
 PHISHING
 MAN-IN –THE-MIDDLE ATTACK
 DENIAL OF SERVICE ATTACK
 SQL INJECTION
 D n s tunneling
 Zero-day exploit
Major security problems
Virus
Virus
Hacker
Hacker
Malware
Malware
Trojan
Trojan horses
horses
Password
Password cracking
cracking

VIRUSHES
VIRUSHES AND
AND WORMS:-
WORMS:- AA Virus
Virus is
is aa “Program
“Program that
that is
is loaded
loaded onto
onto
your
your computer
computer without
without your
your knowledge
knowledge and
and runs
runs against
against your
your wishes.
wishes.
SOLUTION:-
SOLUTION:- Install
Install aa security
security suite
suite that
that protects
protects the
the computer
computer against
against
threats
threats such
such as
as viruses
viruses and
and worms
worms ..
Example-
Example- Antivirus.
Antivirus.
Hackers:- In Common a hacker is a person who breaks into
computers, usually by gaining access to administrative controls.
Types of hackers
 White hackers
 Grey hackers
 Black hackers
White hackers:- These are good hackers and have a genuine license for doing the hacking.
The hacking performed by them is to protect the government or big companies and to build a
cybersecurity infrastructure. They are good hackers
Grey hackers:- They are called by companies to attack their companies to test their company’s
security system. They are also called to hack another company in the competition or even make D-
Dos attacks on their competitive companies.
Black hackers:- These are bad hackers and perform unethical hacking to hack big companies
either to hack their bank account or to blackmail them and to take financial advantage. E g:- “these
are the hackers and attackers who hack your bank Accounts, Social Media Account” and many other
things.
MALWARE:-
 The word “malware” comes from the term “MALICIOUS SOFTWARE”.
 Malware is any software that infects and damages a computer system without the owner’s
knowledge or permission.
TO STOP MALWARE
 Download an anti-malware program that also helps prevent infections.
 Activate Network Threat Protection,
Firewall ,Antivirus.

TROJAN HORSE:-
 Trojan horses are email viruses that can duplicate themselves , steal information , or
harm the computer system.
 These viruses are the most serious threats to computers.
HOW TO AVOID TROJANS
 Security suits , such as Avast Internet Security , will prevent you from downloading Trojans
Horses.
PASSWORD CRACKING:-
 Password attacks are attacks by hackers that are able to determine passwords or find
passwords to different protected electronic areas and social network sites.
SECURING PASSWORD
 Use always Strong Password
 Never use same password for two different sites.
Classification of cyber crime
 Email Bombing
 Email Spoofing
 Web Jacking
 Salami Attack
 Software Piracy
 Password sniffing
 Online fraud
 Identity Theft
 Forgery
 Cyber Terrorism
STATISTICS
Top ten countries affected targeted attacks between 2006-2020

The Most Affected country is United States Of America. With more than 143 million Americans affected by
cybercrime in 2017. According to the Norton Cyber security insights Report. Nearly 8 in 10 U.S consumers
surveyed reported themselves or someone they know being victimized, so it’s understandable that Americans are
worried more about cybercrimes than other crimes.
Types of cyber security
• For an effective cyber security, an organization needs to coordinate its efforts throughout
its entire information system.
ELEMENTS OF CYBER encompass all the following:-
 NETWORK SECURITY:- The process of protecting the network from unwanted users,
attacks and intrusion.
 APPLICATION SECURITY:- Apps require constant updates and testing to ensure
these programs are secure from attacks.
 ENDPOINT SECURITY:- Remote access is a necessary part of business, but can also
be a weak point for data. Endpoint security is the process of protecting remote access to
a company’s network.
 DATA SECURITY:- Inside of networks and applications is data. Protecting company
and customer information is a separate layer of security.
 IDENTITY MANAGEMENT:- Essentially, this is a process of understanding the
access every individual has in an organization.
 DATABASE AND INFASTRUCTURE:- Everything in a network involves database
and physical equipment. Protecting these devices is equally important.
 CLOUD SECURITY:- Many files are in digital environment or “the Cloud”, Protecting
data in a 100% online environment presents a large amount of challenges.
 MOBILE SECURITY:- Cell phones and tablets involve virtually every type of security
challenge in and of themselves.
Important of cyber security.
Cyber security plays a virtual role in protecting data , information, and networks from cyberattacks. If you are a
business or organization , it is very important to prevent data breaches and take care of the safety of assets and crucial
information. It encompasses everything that relates to protecting our data from cyber attackers who want to steal this
information and use it to cause harm. This can be sensitive data, governmental and industry information , personal
information , personally identifiable information(PII) , intellectual property , and protected health information(PHI).
Having advanced cyber defence programs and mechanisms in place to protect this data is crucial and in everyone’s
interest. Everyone in society relies on critical infrastructure such as hospitals and other healthcare institutions, financial
service programs, and power plants. We need these to keep our society running.
At an individual level, cyber security attacks can lead to identity theft and extortion attempts, which can do serious
damage to that individual’s life.
HOW DOES CYBER SECURITY WORK
Cybersecurity is designed to provide multiple layers of
protection across all of the computers , networks , and
program used by a business. In order to create a unified
defence against potential cyberattacks , it is important that
the business, employees, processes , and technology are
designed to work seamlessly together.
Cyber security system that function properly will be able to
detect , investigate and resolve potential weakness and
vulnerabilities in the system before they can be exploited by
a hacker or malicious software.
Cyber security strategy- india
 Security Policy, Legal Framework
 IT Act, 2000
 IT (Amendment) Bill,2006 – Data protection & Computer
crimes
 Capacity Building
 Skill & Competence Development
 Research and Development
 Cyber Monitoring
 Network Security
 International Collaboration
Future challenges for cyber security
There are a vast number of cyber security challenges around us. Describing them all at once is hard. So, here we are doing to share a
genetic list of cyber security challenges with you. I hope it helps you to know about the cybersecurity challenges.

 Machine learning cyber attack:- we know that machine learning is one of the best is technologies for data processing.
It comes with the great ability to process a huge amount of data , detect malfunctions and adjust algorithms.it seems to be
very crucial for the data. That’s why hackers target machine learning to make it one of the cyber threats. They use its
faster behavior against its cyber protection ability . Through machine learning, hackers can attack and hack all the
information before you can even discover the attack. So , basically , they are taking advantages by using it against
themselves.
 Ransomware:- Another cyber security challenge that’s increasing greatly day by day is Ransomware. We are inform you
that the growth rate of Ransomware is unbelievably high. It’s truly a curse to data and web security and the respective
professionals.
 Infrastructure Automation:- Now, it can easily take the highest place among the IT security challenges. It’s going to be
an endless cyber challenge. This type of challenge will hack your data and help hackers blackmail you based on the
information as it will be able to encrypt all the data. It can cost you a very large amount of money.
 Attack through IOT :- IOT – internet of things is a blessing to us, but it’s an extraordinary blessing to criminals Nowdays
Most of us use different types of smart devices. Thanks to IOT , we can now connect all our devices to each other . It reduces
a lot of complexity. But in modern society hackers will also very smart. They can use the internet of things for the DDOs
attack.it will make them take down the whole system based on internet.
 Blockchain hacking and Cryptojacking:- Attacks on the block chain system are increasing, and so it becomes
a headache for cyber protection. Criminals are hacking the entire blockchain system , and that’s why are getting
access to every single system, and that’s how they are getting access to every single piece of information included
in the network. They are also mining cryptocurrencies for their wallet through crypto- jacking . Criminals can mine
cryptocurrencies for the criminal wallet . The criminals make them do such mining .its going to be one of the top
cyber threats very soon.
 Weak passwords and Two-factors Authentication:- we all use passwords in our devices and different applications
for security purposes. Some people use weak passwords just because they cannot remember their passwords, it
becomes too easy for hackers to hack your information. Now come to the two-factor-authentication process. it,s
another way to hack your phone by redirecting text messages to your phone for authentication.
 Physical Infrastructure Hacking:- Cybercriminals are becoming more sophisticated with their plans to attack
you. Their new target is the physical infrastructure , for example , media channels , power grid, and transportation
network. This type of cyber attacks has the potential to cause extensive disaster.
 AI- Based Hacking:- Another huge cyber security challenges is Artificial Intelligence Marware . AI is making our life
way easier, and it saves our time. But , once it gets corrupted, you can’t stop it from doing its task . That’s because
, by the time you’re going stop it, it will have completed all the tasks.
 Email Phishing and Mailsploit:- Emails are the most used application for any type of corporate or professional
communication. People don’t just communicate but also share valuable data via Email. That’s the reason criminals
keep phishing emails in different ways.
 Worm Based Malware:- Using the worm is a technique that hackers are using to spread malware.it seems that
the number of hackers using worms is highly increasing.
 New and advanced Technologies for cyber Hacking:- It,s true that day by day, professionals are trying harder
to increase cyber protection . On the other hand , criminals are not standing quietly . They are also becoming
smarter and creating more advanced technologies for hacking.
Safety tips from cyber crimes:-
 Use Antivirus software.
 Internet firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords, don , to give personal information unless required.
CONCLUSION:-
 I hope that my presentation will be helpful for my audience to
improve their Knowledge about cyber security loopholes on their
computer operation . Also it helps to spread awareness among
normal people about emerging security threats . Simple and
practical prevention methods are explained in the seminar to
protect the information assets.

You might also like