cyber security

20

Upload: krishanu-ghosh

Post on 08-Aug-2015

20 views

Category:

Education


2 download

TRANSCRIPT

CYBER SECURITY

Subtitle

Action against cyber crime.

Title and Content Layout with List

Click to edit Master text styles

Second level

Third level

Fourth level

Fifth level

What is cyber crime?

The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime. 

Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .

What is cyber security?

Security is “Freedom from risk or danger.“

The ability of a system to protect information and system resources with respect to confidentiality and integrity.

Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.

Though, cyber security is important for network, data and application security.

What is…?

Communication Security- Protecting organization communication media , technology , and content.

Network Security- Network Security is the protection of networking components, connection and content.

Information Security- Information Security is protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.

History

The first recorded cyber crime took place in the year 1820.

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.

During the 1980s, the hackers and crimes were beginning to emerge.

CERT was created to overcome network security issues.

In the 1990s, Internet became public and the security concerns increased tremendously.

Cyber crimes includes

Illegal access

Illegal Interception

System Interference

Data Interference

Misuse of devices

Fraud

Why should we care?

It is a criminal activity committed on the internet.

Cyber crime-Where computer is either a tool or target or both.

Main Objectives of Cyber Security

Secure Access

Confidentiality

Authentication

Integrity

Non-repudiation

How can we protect?

Read Privacy policy carefully when you submit the data through internet.

Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.

Disable remote connectivity.

Working process of Cyber Security We need multiple layers of security.

Cyber Security is accomplished through hardware and software.

Network security components:

Anti-virus and anti-spyware

Firewall

Intrusion prevention systems

Virtual Private Networks

Network Security Technology

Cryptographic Systems:

Secret Key Cryptography (SKC)

Public Key Cryptography (PKC)

Hash Function

Hash Function

Plain Text Cipher Text

Firewall

A typical border control mechanism.

Metaphor for network security.

Designed to prevent unauthorized access to or from a private network.

Security Tools

Antivirus software packages

Firewalls

SSL secure connection

Secure network infrastructure

DNS hardware and software

Virtual private network

Identity services

Encryption

Security management

Monitoring of incoming traffic

Advantage of cyber security

It will defend from hacks and virus.

The application of cyber security used in our PC needs update every week.

The security developers will update their database every week once. Hence the new virus also deleted.

Safety tips …

Use antivirus software

Insert firewalls , pop up blocker

Uninstall unnecessary software

Maintain backup

Check security settings

Use secure connection

Open attachments carefully

Use strong passwords , don’t give personal information unless required

Conclusion

The only system which is truly secure is one which is switched off and unplugged.

As security tweaks, threats tremendously tweaks.

Thank You

By,

KRISHANU GHOSH