Cyber security
Presented by,
Anshitha PA
Reg. No-18131481
● What is Cyber Security
● Types of cyber security
● CIA
● Treats to CIA
● Types of hackers
● Cyber attacks
● How does cybersecurity works
● Advantages of cyber security
● Different cybersecurity job roles
● Courses and certifications
Cyber security
Cyber security itself is a process, a design and
architecture created to protect network and devices from
attacks, damage or unauthorized access
5 main types of cyber security
Critical
Application
infrastructure Network security
security
security
Internet of things
Cloud security
(IoT) security
Confidentiality, Integrity, and Availability have
CIA served as the industry standard for computer
security since the time of first mainframes
The principles of confidentiality
assert that informations and
functions can be accessed only by
authorized parties
Eg: Military secrets The principles of a
Availability assert
that system,
functions, and data
must be available on
The principles of integrity assert demand according
that informations and functions can to agreed. Upon
be added, altered, or removed only parameters based
by authorized people and means. on levels of service
Eg:incorrect date entered by a user Eg: Gmail login
in the database
Threats to CIA
Cyber crime
Hacking
Cyber crime
Cyber crime is any criminal activity that involves a
computer, network device or a network
Computers
Computer Computer as the
incidental to the
assisted crimes target crimes
crimes
Eg:Fraud, Denial of Eg: Sniffing, viruses Eg: List of
Service (DOS) customers for
traffickers
Types of hackers
Black hat Grey hat White
hat
Individuals professing
Individuals with
Individuals who work both hacker skills and using them
extraordinary computing
offensively and defensively for defensive purposes and
skills resorting to malicious
at various times also known as security
or destructive activities
analyst
Types of hackers
Suicide hacker Script kiddie Cyber terrorist
State responsed
Hacktivist
hacker
Red hat hacker Blue hat hacker Green hat hacker
Malicious insider National support
Cyber attacks
DOS(Denial of
service)
Man in the middle
Malware attack
attack
Phishing attack Drive by attack
Cross - state scripting Password attack
attack
Eaves dropping
SQL injection attack
attack
Birthday attack
How does
cybersecurity works?
1 2 way authentication
Secure password 2
3 Regular updates
Anti-virus 4
5 Firewall
No 6
Phishing
7 Cryptography (encryption)
8
Secure DNS
Advantages of cyber security
● Protection against unwanted software
● Maintain privacy and security data
● Preserving valuable resources
● Provides new career opportunities
● Keeping Cyber space safe and clean
Different cybersecurity job roles
Job roles Preferred certifications Sarary per
annum
Chief information security Certified information security manager(CISM), USA- $180,835
officer (CISO) Certified information systems security India - Rs 25,49,020
professional(CISSP)
Security architect Certified information system security USA- $ 123,856
professional(CISSP) India - Rs 20,14765
Penetration tester Certified ethical hacker(CEH), Certified expert USA- $ 117,218
Penetration tester(CEPT) India - Rs 4,96,666
Cyber security engineer Knowledge of programming languages C, C++, USA- $96312
Java and python India - Rs 7,29,000
Malware analyst GIAC Reverse engineering malware(GREM) USA- $80491
India - Rs 6,11,613
Computer forensic analyst Certified forensic computer examiner(CFCE), USA- $71772
Certified computer examiner(CCE) India - Rs 8,69,000
Courses and certifications
Note : Hacking is a punishable offense in India with
imprisonment up to 3 years, or with fine up to two lakh
rupees, or with both. Chapter IX Section 43 of IT act,
2000 prescribes a penalty for the damage to computer or
computer system. It is a common thing which happens
whenever a computer system is hacked.
References
● introduction to cybersecurity
● How to become a certified critical hacker(CEH)
● cyber security career , jobs and salary