Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Cyber security presentation
-
Upload
bijay-bhandari -
Category
Technology
-
view
199 -
download
10
description
Transcript of Cyber security presentation
![Page 1: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/1.jpg)
Cyber SecurityAction against cyber crime
![Page 2: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/2.jpg)
What is cyber security? Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
Though, cyber security is important for network, data and application security.
![Page 3: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/3.jpg)
What is…? Communication security-protecting organization
communication media , technology , and content.
Network security-is the protection of networking components, connection and content.
Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.
![Page 4: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/4.jpg)
What is cyber crime?
The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime.
Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .
![Page 5: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/5.jpg)
History The first recorded cyber crime was recorded in the
year 1820.
The first spam email took place in 1978 when it was sent over the Arpanet.
The first Virus was installed on an Apple Computer in 1982.
![Page 6: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/6.jpg)
Cyber crimes includes
Illegal access Illegal Interception System Interference Data Interference Misuse of devices Fraud
![Page 7: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/7.jpg)
Why should we care? It is a criminal activity committed on the internet.
Cyber crime-Where computer is either a tool or target or both.
![Page 8: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/8.jpg)
How can we protect? Read Privacy policy carefully when you submit
the data through internet.
Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.
Disable remote connectivity.
![Page 9: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/9.jpg)
Advantage of cyber security It will defend from hacks and virus.
The application of cyber security used in our PC needs update every week.
The security developers will update their database every week once. Hence the new virus also deleted.
![Page 10: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/10.jpg)
Safety tips … Use antivirus software
Insert firewalls , pop up blocker
Uninstall unnecessary software
Maintain backup
Check security settings
Use secure connection
Open attachments carefully
Use strong passwords , don’t give personal information unless required
![Page 11: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/11.jpg)
Conclusion The only system which is truly secure is
one which is switched off and unplugged.
So , only way to be safe is Pay attention and Act smart.
![Page 12: Cyber security presentation](https://reader036.fdocuments.net/reader036/viewer/2022082317/54c8aca44a795945148b45ad/html5/thumbnails/12.jpg)
THANK YOU Slides by:- BIJAY BHANDARI 000-17-6798