際際滷

際際滷Share a Scribd company logo
CYBER SECURITY
OVERVIEW
Anil Sreeramula and Sannith Mynampati
AGENDA Why Cybersecurity ?
How to protect from Cyber
attacks
Understanding Risks
Best practices to protect
from risks
Conclusion
WHY CYBERSECURITY ?
 Cybersecurity is a necessary consideration for individuals and families, as well as businesses,
governments, and educational institutions. For families and parents, online safety of children and
family members is of paramount importance. In terms of our financial security, its critical to protect
information that could impact our personal finances. And, by protecting our computers, we protect
precious family assets such as photos, as well as videos and music. For faculty, staff, and students,
the Internet has provided huge learning opportunities as well as risks.
HOW TO PROTECT FROM CYBER
ATTACKS
 Everyone need to understand how to protect themselves and must understand the link between the
online and real world. Learning how to protect computers and engage in appropriate online behavior
will reduce vulnerabilities and create a safer online environment.
UNDERSTANDING RISKS
 Risk : The outcome of an uncertain event and its consequences
 Few Risks type.
 Phishing
 Spyware
 Password protection
 Social Media
 Phishing
 Phishing uses email or malicious websites to solicit personal or financial information. This can take the form
of an email, seemingly from a reputable credit card company or financial institution that requests account
information. When users respond with the requested information, fraudsters can use it to gain access to the
accounts.
Prevention : Do not open messages or attachments from unknown sources. Use spam filters to prevent
unwanted and dangerous email.
 Spyware
 The important things to know about spyware programs are that they can download themselves onto your
computer without your permission when you visit an unsafe website, and they can take control of your
computer.
Prevention : Keep your computer up to dateespecially your operating System, web browsers, and
antivirus/antispyware protection
 Password protection
 Choose strong passwords that are not easy to guess. Avoid your address, pets name, or a childs name.
Think of creating a password by using the first letter of each word of a favorite saying. Substituting capital
letters and/or numbers for some of those letters will strengthen the passwords even further.
Prevention : Make sure to change your passwords regularly.
 Social media
 Although social media can be a fun experience and can help you stay connected, it can also create an
opportunity for information leakage or even compromise personal identity and safety. Be smart with your
identity on social media sites.
Prevention: Make sure to review and use privacy settings. Keep all tagged photos private. Do not
share information that can help people steal your personal identity.
CONCLUSION
 Cyber security is one of the most urgent issues of the day. Computer networks have always been the
target of criminals, and it is likely that the danger of cyber security breaches will only increase in the
future as these networks expand, but there are sensible precautions that organizations can take to
minimize losses from those who seek to do harm.

More Related Content

Cyber security

  • 2. AGENDA Why Cybersecurity ? How to protect from Cyber attacks Understanding Risks Best practices to protect from risks Conclusion
  • 3. WHY CYBERSECURITY ? Cybersecurity is a necessary consideration for individuals and families, as well as businesses, governments, and educational institutions. For families and parents, online safety of children and family members is of paramount importance. In terms of our financial security, its critical to protect information that could impact our personal finances. And, by protecting our computers, we protect precious family assets such as photos, as well as videos and music. For faculty, staff, and students, the Internet has provided huge learning opportunities as well as risks.
  • 4. HOW TO PROTECT FROM CYBER ATTACKS Everyone need to understand how to protect themselves and must understand the link between the online and real world. Learning how to protect computers and engage in appropriate online behavior will reduce vulnerabilities and create a safer online environment.
  • 5. UNDERSTANDING RISKS Risk : The outcome of an uncertain event and its consequences Few Risks type. Phishing Spyware Password protection Social Media
  • 6. Phishing Phishing uses email or malicious websites to solicit personal or financial information. This can take the form of an email, seemingly from a reputable credit card company or financial institution that requests account information. When users respond with the requested information, fraudsters can use it to gain access to the accounts. Prevention : Do not open messages or attachments from unknown sources. Use spam filters to prevent unwanted and dangerous email. Spyware The important things to know about spyware programs are that they can download themselves onto your computer without your permission when you visit an unsafe website, and they can take control of your computer. Prevention : Keep your computer up to dateespecially your operating System, web browsers, and antivirus/antispyware protection
  • 7. Password protection Choose strong passwords that are not easy to guess. Avoid your address, pets name, or a childs name. Think of creating a password by using the first letter of each word of a favorite saying. Substituting capital letters and/or numbers for some of those letters will strengthen the passwords even further. Prevention : Make sure to change your passwords regularly. Social media Although social media can be a fun experience and can help you stay connected, it can also create an opportunity for information leakage or even compromise personal identity and safety. Be smart with your identity on social media sites. Prevention: Make sure to review and use privacy settings. Keep all tagged photos private. Do not share information that can help people steal your personal identity.
  • 8. CONCLUSION Cyber security is one of the most urgent issues of the day. Computer networks have always been the target of criminals, and it is likely that the danger of cyber security breaches will only increase in the future as these networks expand, but there are sensible precautions that organizations can take to minimize losses from those who seek to do harm.