0% found this document useful (0 votes)
185 views18 pages

Comprehensive Guide to Cyber Security

The document discusses cyber security. It defines cyber security as protecting networks and devices from attacks, damage or unauthorized access. It outlines the different types of cyber security including critical infrastructure security, network security, cloud security, and internet of things security. It discusses the principles of confidentiality, integrity and availability (CIA) and common threats to CIA like cyber crime and hacking. The document also describes different types of hackers, cyber attacks, how cybersecurity works, advantages of cyber security, common cybersecurity job roles and their required certifications and salaries. It concludes with noting that hacking is a punishable offense in India.

Uploaded by

Anshitha PA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
185 views18 pages

Comprehensive Guide to Cyber Security

The document discusses cyber security. It defines cyber security as protecting networks and devices from attacks, damage or unauthorized access. It outlines the different types of cyber security including critical infrastructure security, network security, cloud security, and internet of things security. It discusses the principles of confidentiality, integrity and availability (CIA) and common threats to CIA like cyber crime and hacking. The document also describes different types of hackers, cyber attacks, how cybersecurity works, advantages of cyber security, common cybersecurity job roles and their required certifications and salaries. It concludes with noting that hacking is a punishable offense in India.

Uploaded by

Anshitha PA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cyber security

Presented by,

Anshitha PA

Reg. No-18131481
● What is Cyber Security
● Types of cyber security
● CIA
● Treats to CIA
● Types of hackers
● Cyber attacks
● How does cybersecurity works
● Advantages of cyber security
● Different cybersecurity job roles
● Courses and certifications
Cyber security

Cyber security itself is a process, a design and


architecture created to protect network and devices from
attacks, damage or unauthorized access
5 main types of cyber security

Critical
Application
infrastructure Network security
security
security

Internet of things
Cloud security
(IoT) security
Confidentiality, Integrity, and Availability have
CIA served as the industry standard for computer
security since the time of first mainframes

The principles of confidentiality


assert that informations and
functions can be accessed only by
authorized parties
Eg: Military secrets The principles of a
Availability assert
that system,
functions, and data
must be available on
The principles of integrity assert demand according
that informations and functions can to agreed. Upon
be added, altered, or removed only parameters based
by authorized people and means. on levels of service
Eg:incorrect date entered by a user Eg: Gmail login
in the database
Threats to CIA

Cyber crime

Hacking
Cyber crime

Cyber crime is any criminal activity that involves a


computer, network device or a network

Computers
Computer Computer as the
incidental to the
assisted crimes target crimes
crimes

Eg:Fraud, Denial of Eg: Sniffing, viruses Eg: List of


Service (DOS) customers for
traffickers
Types of hackers

Black hat Grey hat White


hat

Individuals professing
Individuals with
Individuals who work both hacker skills and using them
extraordinary computing
offensively and defensively for defensive purposes and
skills resorting to malicious
at various times also known as security
or destructive activities
analyst
Types of hackers

Suicide hacker Script kiddie Cyber terrorist

State responsed
Hacktivist
hacker

Red hat hacker Blue hat hacker Green hat hacker

Malicious insider National support


Cyber attacks
DOS(Denial of
service)
Man in the middle
Malware attack
attack

Phishing attack Drive by attack

Cross - state scripting Password attack


attack

Eaves dropping
SQL injection attack
attack
Birthday attack
How does
cybersecurity works?
1 2 way authentication
Secure password 2

3 Regular updates
Anti-virus 4

5 Firewall
No 6
Phishing
7 Cryptography (encryption)

8
Secure DNS
Advantages of cyber security

● Protection against unwanted software


● Maintain privacy and security data
● Preserving valuable resources
● Provides new career opportunities
● Keeping Cyber space safe and clean
Different cybersecurity job roles

Job roles Preferred certifications Sarary per


annum
Chief information security Certified information security manager(CISM), USA- $180,835
officer (CISO) Certified information systems security India - Rs 25,49,020
professional(CISSP)

Security architect Certified information system security USA- $ 123,856


professional(CISSP) India - Rs 20,14765

Penetration tester Certified ethical hacker(CEH), Certified expert USA- $ 117,218


Penetration tester(CEPT) India - Rs 4,96,666

Cyber security engineer Knowledge of programming languages C, C++, USA- $96312


Java and python India - Rs 7,29,000

Malware analyst GIAC Reverse engineering malware(GREM) USA- $80491


India - Rs 6,11,613

Computer forensic analyst Certified forensic computer examiner(CFCE), USA- $71772


Certified computer examiner(CCE) India - Rs 8,69,000
Courses and certifications
Note : Hacking is a punishable offense in India with
imprisonment up to 3 years, or with fine up to two lakh
rupees, or with both. Chapter IX Section 43 of IT act,
2000 prescribes a penalty for the damage to computer or
computer system. It is a common thing which happens
whenever a computer system is hacked.
References

● introduction to cybersecurity

● How to become a certified critical hacker(CEH)

● cyber security career , jobs and salary

You might also like