Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Cyber

Security

Presented

by

Shivali Kumari
Contents
» What is Cyber Security ?
» Why is Cyber Security important ?
» Cyber Security Fundamentals
» Benefits of Cyber Security
» Types of Cyber Security

2
What is Cyber Security ?
The term “CYBER SECURITY” refers to a
protection system for computers and networks from
theft, damage, disruption, illegal changing, or
information disclosure taken from the electronic
data, software, or hardware.
Cyber Security is the protection of
internet-connected systems such as hardware,
software and data from cyberthreats. The practice is
used by individuals and enterprises to protect against
unauthorized access to data centers and other
computerized systems. 3
Why is Cyber Security important ?
 It is important because it encompasses everything that relates to
protecting our data from cyber attackers who want to steal this
information and use it to cause harm

 Tech Users Are Vulnerable

 Cloud Storage Needs Protection(Sensitive information, like banking


details and passwords, can now be stored on the cloud, increasing
their risk of theft) 

 Enables Credibility 

 It Could Save Millions Of Dollars 4


Cyber Security Fundamentals
let’s take a look at fundamental objectives of cybersecurity.

The CIA Triad

5
Continue…..

Confidentiality, integrity, and availability, also


known as the CIA triad, is a model designed to guide
companies and organizations to form their security
policies.
Technically, cybersecurity means protecting
information from unauthorized access, unauthorized
modification, and unauthorized deletion in order to
provide confidentiality, integrity, and availability.
6
Continue…..
Cybersecurity Fundamentals – Confidentiality
Confidentiality is about preventing the disclosure of data to
unauthorized parties. It also means trying to keep the identity of
authorized parties involved in sharing and holding data private
and anonymous.

Standard measures to establish confidentiality include:


• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
7
Continue…..
Integrity
Integrity refers to protecting information from being
modified by unauthorized parties. It is a requirement that
information and programs are changed only in a specified and
authorized manner.

Standard measures to guarantee integrity include:


• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups
8
Continue…..
Availability
Availability is making sure that authorized parties are
able to access the information when needed. Data only has
value if the right people can access it at the right time. 
Standard measures to guarantee availability include:
• Backing up data to external drives
• Implementing firewalls
• Having backup power supplies
• Data redundancy

9
Benefits of cyber security
Data protection from unauthorized access, loss or
deletion
 Preventing financial fraud
 Protection of intellectual property
 Prevention of cyber espionage
 Prevention of fraud through financial transactions like
wire transfers etc.
 Improves customer confidence
10
Types of Cyber Security
o Data security
o Application Security
o Network Security
o Database and Infrastructure Security
o Mobile Security
o Cloud Security
o Endpoint Security

11
Data Security
Data security protects by giving limited access only
to the authorized ones to prevent any data theft.

Application Security
This type of security should be developed from the
design stage of the program. Continuous updates of
the apps should include the security system, so new
threats could be detected early.
12
Network Security
By connecting people, networks have a bigger
possibility of getting intrusion and attacks. The
admin/host is also a part of the security system

Database and Infrastructure Security


Not only the digital software but the hardware
could also be stolen. The security system should
cover digitally and physically.
13
Mobile Security
Mobiles including tablets and cell phones are also
prone to threats that could come from wire/devices
like USB and wireless like Bluetooth and
the internet.
Cloud Security
Cloud is a digital data storage that enables the users
to store and download the data. There have been
many data thefts due to reckless Cloud account
usage. 14
Endpoint Security

Users and entry points (users’ devices) are most


likely to get malicious threats from a virus such as
Malware. The form of security could be anti-virus
software, but the best one is the education for users
to carefully plug in USBs, responding to suspicious
links, and more.

Tuesday, February 2, 20XX Sample Footer Text 15


16

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy