This book covered an efficient method of cyber security to provide Data protection against cyber criminals. It provides data privacy, network security, integrity and identity management to access the data authorized users. Many public and private key procedures are recommended for securing data, however there are still a lot of challenge exist in this substance. Most familiar encryption techniques such as RSA, DES and AES are functioning against the cyber-crime. The proposed method of security mechanism provides three stages such as key generation, encryption and decryption. Also it provides data confidentiality, data authentication and data access control. This scheme encrypts and decrypts the data fast and secure.