Академический Документы
Профессиональный Документы
Культура Документы
TEAM MEMBERS
Name of the Students University Roll No.
Gourav Loch 1224/17
ACKNOWLEDGEMENT
Working on this Seminar Report on "Cyber
Security" was a source of immense knowledge to
me and my team. We would like to express our
sincere gratitude to Prof. (Dr.) A. K. Srivastava for
his guidance on making this seminar report in the
right way. We acknowledge with a deep sense of
gratitude and for the encouragement received to
mould this report.
CONTENTS
Introduction to Cyber Security
Cybercrime
Challenges of Cyber Security
Cyber Threats
How to Avoid Cyber Attacks
Antivirus and Firewalls
Advantages and Disadvantages
Conclusion
Categories of Cybercrime:
We can categorize cyber crime into two ways:
• The computer as a target: Using a computer to
attack other computers e.g. Hacking, Virus/Worms
attack, Dos attack etc.
• The computer as a weapon: Using a computer to
commit real world crime e.g. Credit card fraud etc.
CHALLENGES OF CYBER SECURITY
CYBER THREATS
• Update regularly
• Passwords: don’t re-use them
• Download from authorised sources
• 'Administrator' shouldn't be your default setting
• Turn off when you’re done
• Encrypt to keep your stuff unreadable
DISADVANTAGES:
1) Firewalls can be difficult to configure correctly.
2) Incorrectly configured firewalls may block users
from performing certain actions on the Internet, until
the firewall configured correctly.
3) Makes the system slower than before.
4) Need to keep updating the new software in order to
keep security up to date.
5) Could be costly for average user.
CONCLUSION
REFERENCES
1. https://www.udemy.com/course/the-complete-
internet-security-privacy-course-volume-1/
2. https://www.geeksforgeeks.org/cyber-system-
security/
5. https://en.wikipedia.org/wiki/Cybercrime