cyber security

22
Cyber Security

Upload: vivek-agarwal

Post on 18-May-2015

2.220 views

Category:

Education


0 download

DESCRIPTION

About Cyber security

TRANSCRIPT

Page 1: Cyber Security

CyberSecurity

Page 2: Cyber Security

Presented by :-

Vivek Agarwal

Page 3: Cyber Security

Internet security is a branch of computer security specifically

related to the Internet.

It's objective is to establish rules and

measure to use against attacks over the Internet. 

Cyber Security

Page 4: Cyber Security

About Cyber SecurityOctober is National Cyber SecurityAwareness Month. Microsoft and theNational Cyber Security Alliance(NCSA) have teamed up with theDepartment of Homeland Security(DHS) to help increase awarenessabout Internet security issues and toeducate people about how to helpprotect themselves and their devices.

NCSA's mission is to create a cultureof cyber security and safety througheducation and awareness activities.

Page 5: Cyber Security

Types Of Cyber Crime

HACKINGCHILD PORNOGRAPHYVIRUS DISSEMINITIONCYBER TERRORISMSOFTWARE PIRACY

Page 6: Cyber Security

HACKING Hacking in simple terms

means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.

Page 7: Cyber Security

CHILD PORNOGRAPHY The Internet is being highly

used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles

Page 8: Cyber Security

VIRUS DISSEMINITION

Malicious software that

attaches itself to other

software. (virus, worms,

Trojan Horse, web

jacking, e-mail bombing

etc)

Page 9: Cyber Security

CYBER TERRORISMTerrorist attacks on the

Internet is by distributed

denial of service attacks,

hate websites and hate

emails, attacks on sensitive

computer networks,

etc. Technology savvy

terrorists are using 512-bit

encryption, which is

impossible to decrypt.

Page 10: Cyber Security

SOFTWARE PIRACY Theft of software through the illegal copying

of

genuine programs or the counterfeiting and

distribution of products intended to pass for

the original.

Page 11: Cyber Security

Internet Infrastructure inIndia

Page 12: Cyber Security

Primary Online Risks and Threats

To Families• Cyberbullie

s • File-sharing

abuses• Invasion

of privacy• Disturbing

content • Predators

To Computers• Viruses • Worms • Trojans• Spyware

To PersonalInformation• Online fraud

and phishing• Hoaxes • Identity theft• Spam

Page 13: Cyber Security

Primary Threats to Computer Security

Viruses/WormsSoftware programs designed to invade your computer, and copy, damage, or delete your data.

TrojansViruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information.

SpywareSoftware that tracks your online activities or displays endless ads.

Page 14: Cyber Security

SpamUnwanted e-mail, instant messages, and other online communication

PhishingE-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information

Identity TheftA crime where con artists get your personal information and access your cash and/or credit

HoaxesE-mail sent by online criminals to trick you into giving them money

Primary Threats to Personal Online Safety

Page 15: Cyber Security

Steps You Can Take

Your computer1. Turn on Windows

Internet firewall.2. Use Microsoft

Update to keep Windows up-to-date automatically.

3. Install and maintain antivirus software.

4. Install and maintain Microsoft Windows Defender.

Yourself1. Practice Internet

behavior that lowers your risk.

2. Manage your personal information carefully.

3. Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Windows Live, and Microsoft Outlook.

Your family1. Talk with your

kids about what they do online.

2. Set clear rules for Internet use.

3. Keep personal information private.

4. Use family safety settings in Microsoft software.

Page 16: Cyber Security

Turn on Windows Internet firewall

Four Steps to Help Protect Your Computer

Use Microsoft Update to keep Windows

up-to-date automatically

Install and maintain antispyware software

Install and maintain antivirus software

Page 17: Cyber Security

Turn on Windows Internet Firewall

An Internet firewall helps create a protective barrier between your computer and the Internet

Page 18: Cyber Security

Use Automati c Updates to Keep Soft ware Up-to-date

Install all updates as soon as they are available

Automatic updates provide the

best protection

Page 19: Cyber Security

Install and Maintain Anti virus Soft ware

Antivirus software helpsto detect and removecomputer viruses beforethey can cause damage.

For antivirus software tobe effective, you mustkeep it up-to-date.Don’t let it expire

Page 20: Cyber Security

Install and Maintain Anti spyware Soft ware

Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.

Page 21: Cyber Security

Other Ways to Help Protect Your Computer

Back up your files regularly

Think before you click

Read Web site privacy statements

Close pop-ups using red “X”

www.microsoft.com/protect

Page 22: Cyber Security

Thank You