Computer security, also known as cyber security or IT security, is the process of preventing and detecting unauthorized access or use of data on a computer. The document discusses common cyber threats like cybercrime, cyber warfare, and the top 5 cyber threats which are social engineering, ransomware, DDoS attacks, third party software vulnerabilities, and cloud computing vulnerabilities. It recommends cyber security measures like changing passwords frequently, using a password manager, using unique passwords for each account, and deleting unused accounts. The conclusion states that cyber security is very important nowadays due to increased internet usage, and that cyber threats endanger national security, so both governments and citizens should work to improve security and spread awareness.
Computer security, also known as cyber security or IT security, is the process of preventing and detecting unauthorized access or use of data on a computer. The document discusses common cyber threats like cybercrime, cyber warfare, and the top 5 cyber threats which are social engineering, ransomware, DDoS attacks, third party software vulnerabilities, and cloud computing vulnerabilities. It recommends cyber security measures like changing passwords frequently, using a password manager, using unique passwords for each account, and deleting unused accounts. The conclusion states that cyber security is very important nowadays due to increased internet usage, and that cyber threats endanger national security, so both governments and citizens should work to improve security and spread awareness.
Computer security, also known as cyber security or IT security, is the process of preventing and detecting unauthorized access or use of data on a computer. The document discusses common cyber threats like cybercrime, cyber warfare, and the top 5 cyber threats which are social engineering, ransomware, DDoS attacks, third party software vulnerabilities, and cloud computing vulnerabilities. It recommends cyber security measures like changing passwords frequently, using a password manager, using unique passwords for each account, and deleting unused accounts. The conclusion states that cyber security is very important nowadays due to increased internet usage, and that cyber threats endanger national security, so both governments and citizens should work to improve security and spread awareness.
R I CU SE ER UT P M CO B Y: H A R S H A VA R D H I N I M 20ISR020 WHAT IS COMPUTER SECURITY?
It is the process of preventing and detecting
the use of data in the computer by any individuals without authorization.
It is also known as cyber security or IT
security. CYBER THREATS: Cyber crime Cybercrime is criminal activity that either targets or uses a computer , a computer network or a networked device. It is carried out by individuals or organizations. Cyber warfare: Cyber warfare is the use of digital attacks to attack nation , causing comparable harm to actual warfare and / or disrupting the computer systems. TOP 5 CYBER THREATS: i. Social Engineering ii. Ransomware iii. DDoS attacks iv. Third Party software v. Cloud computing vulnerbalities CYBER SECURITY MEASURES Change your passwords. Use password manager tools like LastPass, Dashlane, sticky password and so on. Use unique and secure passwords for every sites. Delete unused accounts. Since attacker can gain access to our network is to use old credentials. CONCLUSION: Now a days due to high internet penetration cyber security is one of the biggest need . Cyber threats are very dangerous to the country’s security. Not only government but also citizens should spread awareness to update system and network security settings to stay virus and malware free. THANK YOU