0% found this document useful (0 votes)
15 views10 pages

Shivwangi Banerjee - CC

The document discusses the importance of cybersecurity in protecting systems, networks, and data from digital attacks, emphasizing the rising cyber crimes and the need for data protection. It outlines key objectives of cybersecurity, types of threats, challenges faced, and preventive measures to enhance security. The future of cybersecurity is highlighted with advancements in AI, machine learning, and the increasing demand for skilled professionals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views10 pages

Shivwangi Banerjee - CC

The document discusses the importance of cybersecurity in protecting systems, networks, and data from digital attacks, emphasizing the rising cyber crimes and the need for data protection. It outlines key objectives of cybersecurity, types of threats, challenges faced, and preventive measures to enhance security. The future of cybersecurity is highlighted with advancements in AI, machine learning, and the increasing demand for skilled professionals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

DR.

BC ROY ENGINEERING COLLEGE


DURGAPUR

TOPIC:- Importance and challenges of Cyber security

NAME – SHIVWANGI BANERJEE


UNIVERSITY ROLL NO - 12000122028
PAPER – CYBER SECURITY
CODE – PEC-CS702E
DEPARTMENT – COMPUTER SCIENCE AND ENGINEERING
SEMESTER – 7th
Introduction
Cybersecurity refers to the practice of protecting systems, networks,
programs, and data from digital attacks. These attacks are usually
aimed at accessing, changing, or destroying sensitive information;
extorting money from users via ransomware; or interrupting normal
business processes.
 Internet-connected systems: Protects devices like laptops, mobiles, and
servers from online threats.
 Hardware & software security: Prevents tampering or misuse of physical
devices and programs.
 Data protection: Ensures confidentiality using encryption and secure
storage.
 Prevention tools: Uses firewalls, antivirus, and monitoring tools to block
cyber attacks.
 Trust and safety: Builds user confidence by securing digital interactions
and transactions.
Why Cybersecurity Matters Today
Cybersecurity is important because it protects this data
from hackers who can steal money, leak private
information, or shut down systems.
 Increased digital dependence: Most work,
communication, and services happen online.
 Rising cyber crimes: Hacking, phishing, and ransomware
attacks are growing every day.
 Data protection: Personal, financial, and confidential
information must be kept safe.
 Business & economy impact: Cyber attacks can cause
massive losses and shutdowns.
Key Objectives of Cybersecurity
 Confidentiality: Keeps data private and accessible only to
authorized users.
 Integrity: Ensures information is accurate and not altered
without permission.
 Availability: Makes sure systems and data are always
accessible when needed.
 Authentication: Verifies the identity of users before giving
access.
 Non-repudiation: Prevents denial of actions, ensuring
users can’t deny their activity (e.g., digital signatures).
These objectives work together to protect systems
unauthorized access, misuse, and cyber threats.
Types of Cyber Threats
 Malware: Harmful software like viruses, worms, and
ransomware that damages or steals data.
 Phishing: Fake emails or messages that trick users into
revealing personal information.
 DDoS Attacks: Overloads websites or servers to make them
crash or unavailable.
 Man-in-the-Middle (MitM): Hackers secretly intercept and
alter communication between two users.
 Insider Threats: Attacks from people within an
organization, like employees misusing access.
Challenges in Cybersecurity
 Evolving Threats: Hackers keep creating new and advanced
attack methods.
 Shortage of Skilled Experts: There aren’t enough trained
cybersecurity professionals.
 Budget Constraints: Many organizations don’t invest
enough in security tools.
 Human Errors: Mistakes like weak passwords or clicking
fake links cause breaches.
 Outdated Systems: Old software and systems are easier
for hackers to attack.
 Regulatory Compliance: Following global security laws
(like GDPR) is complex and challenging.
 Let me know if you’d like slide 8 now!
Solutions and Preventive Measures
 Strong Passwords & MFA: Use unique passwords and
enable multi-factor authentication for extra security.
 Regular Updates: Keep software and systems updated to fix
security holes.
 Cybersecurity Training: Educate employees and users to
avoid common mistakes.
 Firewalls & Antivirus: Install security tools to detect and
block threats.
 Data Backup: Regularly back up important data to avoid loss
from attacks.
 Security Policies: Implement rules and audits to monitor
and protect systems.
Future of Cybersecurity
 AI & Machine Learning: Smart systems will detect threats
faster and respond automatically.
 Cybersecurity Careers: Demand for ethical hackers and
security experts is increasing.
 Blockchain Technology: Will help secure data through
decentralized and tamper-proof systems.
 Quantum Cryptography: Future encryption methods will
become more powerful and secure.
 Zero Trust Architecture: No user or device is trusted by
default, even inside the network.
 IoT Security: Focus will grow on protecting smart devices
like home assistants and wearables.
Conclusion
 Cybersecurity is essential in today’s digital world.
 It protects personal, financial, and organizational data.
 Cyber threats are constantly growing and evolving.
 Everyone—from individuals to large companies—must stay
alert.
 Learning and applying security practices is the need of the
hour.
 The future will demand smarter, AI-driven, and more
secure systems.
....THANK-YOU....

You might also like