0% found this document useful (0 votes)
15 views17 pages

Cyberiksh

The presentation discusses the importance of cybersecurity in protecting systems, networks, and data from digital threats, emphasizing the need for proactive measures to safeguard sensitive information. It highlights emerging job roles in cybersecurity, the main reasons behind cyberattacks, and helpful measures individuals and organizations can take to enhance their security. Additionally, it outlines the current state of cybersecurity in India, including government initiatives and the challenges ahead in combating evolving cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views17 pages

Cyberiksh

The presentation discusses the importance of cybersecurity in protecting systems, networks, and data from digital threats, emphasizing the need for proactive measures to safeguard sensitive information. It highlights emerging job roles in cybersecurity, the main reasons behind cyberattacks, and helpful measures individuals and organizations can take to enhance their security. Additionally, it outlines the current state of cybersecurity in India, including government initiatives and the challenges ahead in combating evolving cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

CYBERSECURIT

a brief presentation by ikshita, 11A

Y
01.
INTRODUCTION
Introduction
What do we mean by cybersecurity?
Cybersecurity is the practice of protecting systems, networks,
and data from digital threats. In today's interconnected world, it
plays a vital role in safeguarding sensitive information against
cyberattacks, ensuring data integrity, confidentiality, and
availability. From personal devices to critical infrastructure,
cybersecurity is essential for preventing unauthorized access
and ensuring safe digital interactions.
“Hackers don’t cause
breaches; unprepared
organizations do.”
—annonymous
02. THE NEED FOR CYBERSECURITY

PROTECTION PREVENTION ADAPTION

Safeguarding personal,
Mitigating risks of
financial, and Addressing advanced
fraud, theft, and
confidential information threats with proactive
operational disruptions.
from unauthorized security measures.
access.

● Cybersecurity is not just a technical requirement but a necessity for safety in the digital age.
EMERGING JOBS IN CYBERSECURITY
● Cybersecurity engineer: Identifies threats and
vulnerabilities in software and systems
● Security architect: Designs, implements, and tunes
controls to balance prevention, detection, and response
● Security analyst: Protects systems and information from
cyber threats and unauthorized access
● SOC analyst: Assists clients in responding to and detecting
security incidents
● Cybersecurity lead: Oversees services, manages
relationships, and resolves issues
● Information security officer: Oversees cybersecurity,
information security, and IT risk management programs
MAIN REASON BEHIND CYBER ATTACKS

Data Harvesting:
Cybercriminals may exploit
Theory 1 systems to collect user
data, which can be sold on
the dark web.

Corporate Espionage:
Competitors may engage
Theory 2 in cyberattacks to steal
trade secrets, product
designs, or business
strategies.
HELPFUL MEASURES
01..
01 02. 03.
Use strong, unique Enable multi-factor Keep software and
passwords for all authentication (MFA) systems updated
accounts. wherever possible. regularly

04. 05. 06.


Avoid clicking on Use antivirus software Back up important data
suspicious links or and a secure firewall. regularly to secure
downloading unknown storage.
attachments.
ANALYSIS

87.65%

altogether in 2024 and 2023,


more than 87% of Indian
people have been victims of
these cyber attacks. here's a
graph attached showcasing the
same.
CYBERSECURITY IN INDIA

The Indian Cyber Crime Helpline

01.
Number is 1930 (formerly 155260).
Alternatively, you can report
cybercrimes online at the National
Cyber Crime Reporting Portal:
www.cybercrime.gov.in

Cyber Surakshit Bharat Initiative:

02.
Launched by the Ministry of
Electronics and IT (MeitY) to
strengthen cybersecurity in
government organizations.
HELPFUL RESOURCES
● UpGrad: Provides programs in partnership with
universities like IIIT Bangalore, focusing on cybersecurity
with real-world applications and industry experts.
● Cyber Security Council (CISO): A dedicated council for
professionals looking to develop their cybersecurity
careers. They offer certifications and training in India.
● Indian Cyber Crime Coordination Centre (I4C): A
government initiative that aims to coordinate
cybersecurity efforts across various sectors in India. It
also provides resources on cybersecurity awareness and
best practices.
● National Cyber Security Policy (NCSP): The Indian
government’s policy focusing on the protection of
information and infrastructure. This also includes
awareness programs and guidelines for private and
public entities.
3.5+
cases in india per second (2024)

3.3B
+ 193.76Cr
cases around the globe per hour

+
cases in india in 2024
CONCLUSION
In conclusion, cybersecurity is a critical aspect of protecting
digital assets and ensuring the privacy, integrity, and
availability of information. As cyber threats continue to
evolve, it is essential for organizations and individuals to stay
proactive, adopt strong security practices, and invest in
advanced technologies to mitigate risks. By fostering a culture
of cybersecurity awareness and preparedness, we can better
safeguard our digital environments against potential threats
and vulnerabilities.
WHAT WE HAVE LEARNT SO FAR??

● Continuous education and awareness for


individuals and organizations are essential to
recognize and combat cyber threats effectively.
● Preventive actions, such as regular software
updates, strong passwords, and encryption, are
vital in mitigating risks.
● Security strategies must evolve in response to
emerging technologies and sophisticated
cyberattacks.
● Governments, businesses, and individuals must
work together to enhance cybersecurity
practices and share threat intelligence.
THE CHALLENGES AHEAD
1. Advanced Threats: Rise of AI-driven and sophisticated
cyberattacks.
2. Ransomware: Increasingly targeted attacks on critical
sectors
3. IoT Vulnerabilities: Expanding attack surface with
connected devices.
4. Supply Chain Risks: Third-party breaches affecting
security.
5. Data Privacy: Stricter regulations and compliance
challenges.
6. Zero-Day Exploits: Faster detection and response
required.
7. Human Factor: Phishing and social engineering threats
persist.
BIBLIOGRAPHY
● mindomo for the graph
● www.splunk.com
● wikipedia.org
● timesofindia.in
● linkedin.india
THANK YOU!
hoping this presentation helped yo
thank you for your time! signing off

You might also like