WEST BENGAL STATE UNIVERSITY
P.N. DAS COLEEGE
DEPARTMENT OF COMPUTER
SCIENCE
Name: TAPATI BISWAS
Roll: 346
Registration No.:
1312221100059 of 2022
Session: 2022-2023
CYBER SECURITY
“Amateurs Hack Systems
Professionals Hack People ”
—Bruce Schneier
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
01
INTRODUCTION
To Cyber Security
INTRODUCTION TO CYBER SECURITY
What is cyber security?
● Cyber security is the body of
technologies, processes, and practices
designed to protect networks,
computers, programs and data from
attack, damage or unauthorized access.
WHY IS CYBER SECURITY IMPORTANT?
PROTECTING PREVENTING MAINTAINING BUSINESS
CONFIDENTIAL DATA FINANCIAL LOSSES CONTINUITY
Measures Are Essential
Financial Losses Due Can Help Organizations
In Protecting
To Theft Or Damage To Prevent Disruptions To
Sensitive Data From
Assets, And This Can Their Operations, Thus
Unauthorized Access Or
Affect The Bottom Line Ensuring Business
Theft.
Of Organizations. Continuity.
TYPES OF CYBER ATTACKS
A cyber-attack is an exploitation of
computer systems and networks.
It uses malicious code to alter Web-based
computer code, logic or data and
lead to cybercrimes.
attacks
System-
based
attacks
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
02
WAYS TO PROTECT
Yourself and Your
Organization
WAYS TO PROTECT YOURSELF
Use strong, unique
passwords for all
accounts and change them
regularly. Also, avoid
sharing passwords or
using the same password
across multiple
USE STRONG accounts.
PASSWORDS
WAYS TO PROTECT YOURSELF
Install reputable
antivirus software and
keep it up to date to
protect against malware
INSTALL and other cyber threats.
ANTIVIRUS
SOFTWARE
WAYS TO PROTECT YOURSELF
Implement multi-factor
authentication on all
accounts to provide an
IMPLEMENT extra
MULTI-FACTOR layer of security.
AUTHENTICATION
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
03
THREATS AND
TYPES
OF Cyber Security
TYPES OF CYBER THREATS
MALWARE FORMJACKING
Ransomware, Botnet Inserts malicious
Software, Rats, code into online
Spyware, Trojans, forms.
Viruses, And Worms.
DNS name
(Domain DDoS
(Distributed denial-of-
system) poisoning service) attacks, which
attacks, which flood servers, systems,
compromise the DNS and networks with
to redirect traffic traffic to knock them
to malicious sites. offline.
WHAT ARE THE FIVE TYPES OF CYBER SECURITY?
CYBER SECURITY
Critical
Infrastructure
Network Security Cloud Security
IoT Security Application Secur
ity
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
04
LEGAL RIGHTS &
DIFFERENCE
DIFFECENCE
Information
Cyber security
security
● Cyber security is often ● Information security
confused with is a broader category
information security. that protects all
● Cyber security focuses information assets,
on protecting computer whether in hard copy
systems from or digital form.
unauthorized access or
being otherwise damaged
or made inaccessible.
The legal
requirement
for cyber
security
The GDPR and DPA 2018
require organizations to
implement appropriate
security measures to
protect personal data.
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
05
CONSEQUENCES
& CHALLENGES
OF Cyber Security
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?
• Financial losses due to
theft, fraud, or business
disruption
• Legal and regulatory
penalties and fines
• Damage to IT
infrastructure or hardware
• Potential harm to
individuals
• Increased insurance
premiums and security costs
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?
• Financial losses due to
theft, fraud, or business
disruption
• Legal and regulatory
penalties and fines
• Damage to IT
infrastructure or hardware
• Potential harm to
individuals
• Increased insurance
premiums and security costs
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?
• Financial losses due to
theft, fraud, or business
disruption
• Legal and regulatory
penalties and fines
• Damage to IT
infrastructure or hardware
• Potential harm to
individuals
• Increased insurance
premiums and security costs
CHALLENGES OF CYBER SECURITY
• Legacy systems
and software that
may not be • Complexity of
• Rapidly evolving modern IT
properly patched
and sophisticated environments,
or updated,
cyber threats and including cloud,
creating
attack techniques mobile, and IoT
vulnerabilities
devices
• Shortage of
• Business
skilled cyber • Growing volume
priorities
security and diversity of
leading to
professionals and data, making it
inadequate
resources harder to protect
investment in
cyber security sensitive
measures information
Referenc
e 1. GFG (www.gfg.com)
2. JavaTpoint (javatpoint.com)
3. Tutorianpoint (tutorialpoint.com)
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon, infographics &
images by Freepik
THANKS!
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon, infographics &
images by Freepik