Sie sind auf Seite 1von 24

Presented By:

Muhammad Rashid
&
1
Huraira Aslam
Introduction to word “Cyber”

2
1. What is its means?

2. Why we need Cyber security?


3.What are the security problems?

We have to
Understand

4.How to implement and maintain


security of a Cyber Field 3
(1)What is its means?
The term cyber security is used
to refer to the security that
protect computer, Network and
data from unauthorized access
and attack on Data from cyber
delivered via the internet by the
Cyber criminals.

4
(2) Need of the Cyber Security
 It is needed as it helps securing data from threats of being hacked, stolen or misuse that
is connected to internet and it also saves data and system from viruses.

5
(3)What are the Security Problems

 Viruses

 Hackers

 Malware

 Trojan Horses

 Password Cracking

 spyware
6
Viruses
 A virus is a program loaded into computer without user’s information and runs
against your wishes and perform malicious actions without knowledge of user.

7
Protection

 Install a security software that will protect your computer from such viruses
and harmful software.
 Such as:

• Windows Defender
• Sophos Anti-Virus

8
Hackers
 A person of computer user who get an unauthorized access to a system or a network
using his/her abilities.

9
Main types of Hackers

 White Hat Hackers

 Gray Hat Hackers

 Black Hat Hackers

10
How to prevent these Hacking

 It is just impossible to prevent hacking. But use of strong passwords and securities may
help from such hackings.

11
Malware

 Malware is word from Malicious and Software meaning a software which is


specifically designed to disrupt, damage, or gain authorized access to a computer
system.

12
How to prevent Malware

 We can install antimalware program to our computer that can keep Malwares away
from your Computer.
 Activate Network Threat protection,
Firewall and Antivirus

13
Trojan Horses

 A Trojan Horse is malicious computer program that mislead users of its true intent.
o It Destroys Data
o Do changes in Data
o Steal Data

14
How to avoid Trojans

 Avoid clicking unknown links from an unknown site.


 Install latest security patches for the operating system.
 Install Anti-Trojan Software and update them regularly.
 Don’t give access to any stranger.

15
Password Cracking
 This is the process of attempting to guess
passwords to gain access to a computer
system or network.
 It also includes recovering passwords from
data that have been stored in or transmitted
by a computer system.

16
Spyware

 Spyware is a Software that is installed in a computing devise without its user’s


knowledge.
 It is installed to:
o Monitor the user’s activity
o Track the location of user
o Access the sites he use

17
How to Prevent Spyware

 Don’t allow an unauthorized person to use your computer mobile or Laptop etc.
 Not to click links on unauthorized sites these may contain such software.
 Install Anti-Spyware Software.
 Harden Your Browser Settings.

18
(4)How to maintain security of a Cyber Field

We can maintain security by the following measures taken:


 Risk Assessment
 Risk Response
 Risk Monitoring
 Planning and Disaster Recovery
 Awareness and Training.

19
Cyber Crime in Pakistan
In Pakistan Cyber Crime is a major issue like in whole
of the world.
Illegal Cyber activities
in Pakistan

Such as:
BankIslami becomes victim of $6.5 million cyber-
attack the last month.
Cybercrime has increased manifold in Pakistan.
According to cybercrime unit, 62 cases were reported
to the unit in 2010, 87 in 2011 and 75 in 2014. More
than 312 cases were registered in different categories
of cybercrime.

20
Cyber Security Measures in Pakistan

 Establishment of Pakistan Computer Emergency Response Team.(PKCERT)


 Establishment of Security Task force with the help of ministry of IT and the Ministry
of Information and some others to formulate National Cyber security Strategy.
 In Pakistan, stringent Cybercrime policies have been brought in place with the
Cybercrime Bill 2015.
 People are given training workshop on Cyber security measures.
 Moreover it is considered a big crime and criminals are given sentences on their crime.

21
Conclusion

 I hope that my presentation was helpful for my audience about Cyber security and how
to overcome such issues. It is also helpful to spread awareness for normal people about
their such security issues and to aware them the causes of their Data stolen and how to
prevent such attacks. It will make them ready to face such conditions in future and will
help them brought out the solutions of such problems on their own.

22
23
Any
Question
24

Das könnte Ihnen auch gefallen