SANAKA EDUCATIONAL TRUST’S
GROUP OF INSTITUTIONS
CA-1 ASSESMENT
TOPIC: INTRODUCTION TO CYBER SECURITY
• Prepared by: Ravi Kumar
• Roll number: 27800122051
• Semester: 7th
• Year : 2025-26
• Subject Name: Cyber Security
• Subject Code: PEC-CS702E
Submitted to : Mrs. Parinita Dutta
Cyber Security and Cyber Crimes
Cyber security is the technology Cyber Crime is any illegal
and process that is designed to activity that involves a
protect networks and devices computer, networked device,
from attack, damage , or or a network. Most cybercrime
unauthorized access. is committed by cybercriminals
or hackers who want to make
money or cause harm.
Cyberspace
Cyberspace:
A vast, virtual world created by interconnected computer
networks, where information is exchanged and digital activities
occur.
Identify security challenges posted by Computing, Mobile
Devices and Networks
Computing (Desktops, Laptops, Servers)
• Malware attacks (viruses, ransomware)
• Unauthorized access due to weak passwords
• Data breaches and loss of sensitive information
• Outdated software with known vulnerabilities
• Insider threats from employees or users
Mobile Devices (Smartphones, Tablets)
• App vulnerabilities and malicious apps
• Loss or theft of devices leading to data exposure
• Unsecured public Wi-Fi use
• Weak authentication (no PIN or biometrics)
• Phishing & smishing (fraud via messages or calls)
Networks (LAN, WAN, Internet)
• Man-in-the-middle (MitM) attacks
• Denial of Service (DoS/DDoS) attacks
• Data interception through sniffing/spoofing
• Weak or no encryption of data in transit
• Rogue Wi-Fi networks stealing user date
Importance of Cyber Security
1. Protection from Cyber Threats:
• Cyber security defends against malware, phishing, hacking, and
ransomware attacks.
2. Safeguards Personal and Organizational Data:
• Prevents unauthorized access to sensitive data such as passwords,
bank details, and business information.
3. Ensures Business Continuity:
• By protecting IT infrastructure, it avoids downtime, financial losses,
and operational disruption.
4. Compliance with Laws and Regulations:
• Organizations must follow data protection laws (like GDPR, IT Act)
which require strong security.
5. Maintains Trust and Reputation:
• A secure system builds user trust and protects an organization’s image
from damage due to breaches.
THANK YOU!