You are on page 1of 13

A SEMINAR REPORT

ON
“CYBER SECURITY"
SUBMITTED BY
SUDHARANI. K .S

UNDER THE GUIDANCE OF


PROF. PREETI. B. M
CONTENTES

01.ITRODUCTION
1.1BACKGROUND

02.SYSTEM ARCHITECTURE
2.1 WAYS TO IMPROVE CYBER SECURITY

03.APPLICATIONS

04.ADVANTAGES

05.DISADVANTAGES

CONCLUSION

REFERENCES
INTRODUCTION
Computers are everywhere. Almost everything that we do
in our daily lives depends on computers and computer
networks. The Internet has become a mission-critical
infrastructure for governments, companies, and financial
institutions.
Computers and networks are used for controlling and
managing manufacturing processes, water supplies, the
electric power grid, air traffic control systems, and stock
market systems, to mention a few. As a consequence,
network attack s have started to impact the practical
aspects of our lives.
BACKGROUND
1 As time sharing systems emerged in the mid to late 1960s
and multiple jobs and users were able to run at the same time,
controlling the access to the data on the system became a
major point of concern.
2 One solution that was used was to process classified data
one level at a time and “sanitize” the system after the jobs
from one level were run and before the jobs for the next level
were run.
3This approach to computer security was known as periods
processing because the jobs for each level were all run in their
particular period of the day. This was an inefficient way to
use the system, and an effort was made to find more efficient
software solutions to the multilevel security problem.
SYSTEM ARCHITECTURE

System Architecture
 Cyber security is also know as computer security.

 It is an information security for computing devices such


as phones and computers.

 It covers all the process by which digital equipments.


information and services are protected from
unauthorized access change or destruction and is of
growing impotents in lie with increases reliance o
computer system of most societies worldwide.
1.Train employees in security principal :
it is necessary to establish basic security
practices and policies for workers, such as requiring strong
passwords, and establishing proper internet use guiding principle that
detail penalties for violating company cyber security policies.
Establish rules of behavior describing how to deal with and project
customer information and other vital data.
2.Protect information, computers and networks from cyber attacks:
it is very important to keep clean machines and have the
latest security, web browser, and operating system secure with the
best defenses against viruses malware, and other online threats, set
antivirus software to run a scan after each update. install other key
software updates as soon as they are available
APPICATIONS:-

Patch Management
Scroll down for all the latest news and information on patch
management.

Secure Coding
Scroll down for all the latest news and information on secure coding.

Web Application Security


Scroll down for all the latest web application security news and
information.

ADVANTAGES
 Protection from malicious attacks on your network.

 Deletion and/or guaranteeing malicious elements within a


preexisting network.

 Prevents users from unauthorized access to the network.

 Deny's programs from certain resources that could be infected.

 Securing confidential information


 
DISADVANTAGES

 Strict Regulations

 Difficult to work with for non-technical users

 Restrictive to resources

 Constantly needs Patching

 Constantly being attacked


CONCLUSION
Cybercrime is criminal activity done using computers
and the Internet. This includes anything from
downloading illegal music files to stealing millions of
dollars from online bank accounts. Cybercrime also
includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting
confidential business information on the Internet.
.
REFERENCES
1. J. Anderson, et al. Computer Security Technology
Planning Study. Technical Report ESD-TR-73-51,
Deputy for Command and Management Systems, HQ
Electronic Systems Division (AFSC), 1972. Vol. 1.
2. W. Bevier. Kit: A study in operating system
verification. IEEE Transactions on Software
Engineering, 15(11), November 1989.
3. Cert coordination center statistics. http://www.cert.
org/stats/, 2003.
4. Minutes of the First Workshop on Covert Channel
Analysis. IEEE Cipher, July 1990. Los Angeles, CA.
THANK YOU

You might also like