Seminar Report
Seminar Report
Seminar Report
on
Cyber Security
SUBMITTED
TO
Sem-IV (2023-2024)
BY
Prof. D D Mehtre
Through
DIRECTOR
We would like to thanks Prof. D D Mehtre Sir for his immense interest,
valuable guidance, constant inspiration and kind co-operation throughout the
period of word undertaken, which has been instrumented in the success of our
project. We also acknowledge our profound sense of gratitude to all the
teachers who have been instrumental for providing us the technical knowledge
and moral support to complete the project with full understanding.
Harshvardhan G Kherodkar
CONTENTS
Cybercrime
Cyber Threats
Conclusion
INTRODUCTION TO CYBER
SECURITY
CYBER SECURITY:
cybersecurity is the practice of protecting internet-connected systems such as
hardware, software and data from cyberthreats. It's used by individuals and
enterprises to protect against unauthorized access to data centers and other
computerized systems.
Categories of Cybercrime:
2. Blockchain Revolution
3. IoT Threats
Spyware
Spyware is a form of malware that hides on a device providing real-time
information sharing to its host, enabling them to steal data like bank details and
passwords.
Phishing Attacks
Phishing attacks are when a cybercriminal attempts to lure individuals into
providing sensitive data such as personally identifiable information (PII), banking
and credit card details, and passwords.
Ransomware
Ransomware is a type of malware that denies access to a computer system or data
until a ransom is paid. Ransomware is one of the most dangerous types of
cybersecurity threats.
Some ransomware attack techniques involve stealing sensitive information before
the target system is encrypted. Such added processes could classify some
ransomware attacks as data breaches.
Zero-Day Exploits
A zero-day exploit is a flaw in the software, hardware, or firmware that is
unknown to the party or parties responsible for patching the flaw.
Wiper Attacks
A wiper attack is a form of malware whose intention is to wipe the hard drive of
the computer it infects.
Theft of Money
Cyber attacks may gain access to credit card numbers or bank accounts to steal
money.
Data Manipulation
Data manipulation is a form of cyber attack that doesn't steal data but aims to
change the data to make it harder for an organization to operate.
Data Destruction
Data destruction is when a cyber attacker attempts to delete data.
Drive-by Downloads
A drive-by download attack is a download that happens without a person's
knowledge often installing a computer virus, spyware, or malware.
Malvertising
Malvertising is the use of online advertising to spread malware.
Rogue Software
Rogue software is malware that is disguised as real software.
Unpatched Software
Unpatched software is software that has a known security weakness that has been
fixed in a later release but not yet updated.
What is FIREWALLS
A firewall is a network security device which serves as a protective barrier
between internal and external networks. Firewalls work by examining and filtering
data using specific security rules. Based on these rules, firewalls determine
whether to permit, deny, or discard data, ensuring the network's security. They can
exist as hardware, software, or a combination of both.
What Is Antivirus?
2. Business Continuity
Cyber attacks can lead to technological issues, such as computer crashes and
freezing screens. This can halt or delay business operations. By preventing cyber
attacks, organizations can ensure the availability of their systems and services,
minimizing downtime and potential losses.
5. Competitive Benefit
Companies with robust cyber security measures in place are less vulnerable to
cyber-attacks and can gain a competitive edge over competitors who may not
prioritize security. Publicly showcasing the implementation of cyber security
measures can help a company distinguish itself as a much more secure option
compared to the competitors. This can influence the customers to prefer companies
with robust cyber security efforts. Also, implementing these measures allows
companies to focus on their core business activities while their digital assets are
protected.
Disadvantages
2. Complex Management
As cyber threats continue to evolve, managing the various components of cyber
security becomes increasingly complex. This can be particularly challenging for
businesses with limited technical expertise.
4. Compatibility Issues
Cyber security tools and solutions may not always be compatible with existing
systems and software, leading to integration challenges and potential security gaps.
5. Inconvenience to Users
Strict security protocols, such as multi-factor authentication and frequent password
changes, can sometimes lead to inconvenience and reduced productivity among
users.
CONCLUSION
we can say that Cyber Security is one of the mostimportant issues that we have
faced with the increasein technological advancements, anything andeverything that
exists on the internet isn't completelysafe. With the increase in Cyber crimes in
India thegovernment of India took a major step and introducedan act in the year
2000 which is called as (IT act 2000)which states that it is the primary law in India
dealingwith cybercrime and electronic commerce. The Actprovidesa legal
framework for electronic governanceby giving recogniton to electronic records and
digitalsignatures. It also de nes cyber crimes and prescribespenaltes for
them.Cybersecurity is a never-ending batle.
A permanentlydecisive solution to the problem will not be found
inthe foreseeable future,even Mark Zukerberg thecreator of one of the most used
social networking sitesFacebook is seen covering his laptop's front camerawith a
duct tape so that the camera might not beaccessed by anyone else then what else
can we expectfrom our security.