This document discusses cyber security and the present threats. It defines cyber security as protecting networks, computers, programs and data from attacks. Some major security problems are discussed like viruses, hackers, malware, Trojan horses, password cracking, and ransomware. The document provides preventive measures that can be taken against these threats like installing security suites, using strong passwords, and enabling firewalls. It also discusses advantages of cyber security like protecting data theft and disadvantages like systems running slower. In conclusion, complete security is difficult but being aware and taking smart precautions can help.
1 of 29
Downloaded 130 times
More Related Content
Cyber Security in Bangladesh
1. Cyber Security
The Present World Threat
1. Mahir Faysal 2015-2-55-0281. Mahir Faysal 2015-2-55-028
2. Md. Mohiuddin Murad 2015-2-55-0272. Md. Mohiuddin Murad 2015-2-55-027
3.Md. Jahirul Islam3.Md. Jahirul Islam 2015-2-55-0082015-2-55-008
4. Sadia Islam 2015-2-55-0204. Sadia Islam 2015-2-55-020
5. Md. Sagir Ahmed5. Md. Sagir Ahmed 2014-1-55-0382014-1-55-038
Presented ByPresented By
2. CONTENTS
INTRODUCTION ABOUT CYBER SECURITY
DESCRIPTION
TYPES OF ATTACKS
SECURITY/PREVENTIVE MEASURES
ADVANTAGES
DISADVANTAGES
CONCLUSION
3. Cyber Security:
Cyber security is the body of technologies, processes and
practices designed to protect networks, computers, programs and
data from attack, damage or unauthorized access.
With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm are
increasing also.
4. It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
5. Need of cyber security
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
12. How To prevent hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
13. Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
14. To Stop Malware
Download an anti-malware
program that also
helps prevent infections.
Activate Network Threat
Protection,
Firewall, Antivirus.
15. Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
16. How to Avoid Trojans
Security suites,
such as Avast
Internet Security,
will prevent you
from downloading
Trojan Horses.
17. Password Cracking
Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
18. How to Avoid Password Cracking
Murad 302Murad 302
EncryptionEncryption
203 daruM203 daruM
DecryptionDecryption
Murad 302Murad 302
19. Ransomware & Present Cyber
Security Situation in Bangladesh
Ransomware :
Malware that locks out computer and demands a ransom (payment) in exchange for
access.
22. Cyber Security Is EveryonesCyber Security Is Everyones
ResponsibilityResponsibility
23. Cyber Security Strategy Bangladesh
Security Policy, Legal Framework
ICT Act, 2006.
Digital Security Act 2016(Amendment) Bill, 2016 Data Protection &
Computer crimes
Capacity building
Skill & Competence development
Research and Development
Cyber Monitoring
Network Security
International Collaboration
25. ADVANTAGES OF CYBER SECURITY
PROTECTS THE COMPUTERS AGAINST
VIRUS,WORMS AND MALWARE.
PROTECTS AGAINST THE DATA FROM THEFT
INCREASE IN CYBER DEFENSE
INCREASES THE SECURITY
WE CAN BROWSE THE SAFE WEBSITE
INCREASE IN CYBER SPEED
PROTECTS NETWORKS AND RESOURCES
26. DIS ADVANTAGES OF CYBER CRIMES
MAKES THE SYSTEM SLOWER THAN BEFORE.
FIREWALLS WOULD BE DIFFICULT TO CONFIGURE
CORRECTLY.
HUGE AMOUNT OF LOSS IN MONEY FOR THE
BANKS,COMPANIES ETC
HUGE AMOUNT OF DATA LOSS OCCURS IN THE
DATABASE
27. Conclusion
The only system which is truly secure is one
which is switched off and unplugged.
So , only way to be safe is Pay attention and
Act smart.