You are on page 1of 16

Cyber

security 

 By
Mohammed
Saqib khan
and
Thuan Waseem
Akram.
Class: xi
 Section: B
 Cyber Security is a process that's
designed to protect networks and
devices from external threats.
Businesses typically employ Cyber
INTRODUCTION Security professionals to protect their
confidential information, maintain
employee productivity, and enhance
customer confidence in products and
services.
Need of cyber
security 

 Cybersecurity is important
because it protects all
categories of data from theft
and damage. This includes
sensitive data, personally
identifiable information
(PII), protected health
information (PHI), personal
information, intellectual
property, data, and
governmental and industry
information systems.
Virus

Hackers

Biggest
Malware
cybersecurity
threats Trojan horse

Password cracking
  A computervirus is a malicious
software program loaded onto a
Virus  user’s computer without the user’s
knowledge and performs malicious
actions. 
Solution 

 A professionalantivirus app can help you protect


your computer against viruses. You can also use
antivirus software to scan for viruses, spyware, and
other malware. To deal with the new threats, you
can check for updates frequently. 
Hackers
 A hacker is an individual who uses
computer, networking or other skills to
overcome a technical problem. The
term also may refer to anyone who uses
their abilities to gain unauthorized
access to systems or networks in order
to commit crimes. A hacker may, for
example, steal information to hurt
people via identity theft or bring down
a system and, often, hold it hostage in
order to collect a ransom.
Types of Hackers

 White hats
 Grey hats
 Black hats
Ways to Protect Yourself From Hackers

Don’t access personal or


Turn off anything you
financial data with public
don’t need.
Wi-Fi.

Use a password, lock code


Choose your apps wisely.
or encryption.

Be skeptical about links


and attachments.
Malware

 “Malware” is short for “malicious


software” - computer programs
designed to infiltrate and damage
computers without the users consent.
“Malware” is the general term
covering all the different types of
threats to your computer safety
To prevent malware attacks


 Installanti-virus and anti-spyware software. Anti-
virus and anti-spyware programs scan computer
files to identify and remove malware.
Trojan Horse

 A Trojan horse, or Trojan, is a type


of malicious code or software that
looks legitimate but can take
control of your computer. A Trojan
is designed to damage, disrupt,
steal, or in general inflict some
other harmful action on your data
or network.
Install Install a High-Quality Antivirus

How to Defend
your PC and Avoid Avoid Third-Party Downloads
Devices Against
a Trojan Horse
Virus Stick Stick to Trusted Sources

Use Use a Firewall


Password cracking 

 Password cracking is the process of attempting to gain Unauthorized


access to restricted systems using common passwords or algorithms
that guess passwords. In other words, it’s an art of obtaining the
correct password that gives access to a system protected by an
authentication method.
Securing Passwords

 Password security starts with creating


a strong password. A
strong password is: At least 12
characters long but 14 or more is
better A combination of uppercase
letters, lowercase letters, numbers, and
symbols
Thank you

You might also like