Contents : 1. Cyber Security : Introduction 2. Symmetric Cryptography3. Asymmetric Cryptography4. Cyber Attack5. Malware Attack6. Phishing Attack7. Message Authentication Code (MAC)8. Deffie-Hellman Key Exchange Algorithm9. Firewall 10. Packet Filtering Firewall11 . Privacy Policy 12. GDPR13. Computer Misuse Act 199014 . COPPA15. Web 1.0 VS Web 2.0