Professional Documents
Culture Documents
Cyber Security (Autosaved)
Cyber Security (Autosaved)
Presented by :
Rajesh and Riza
Intr0duction :-
The term cyber security is used to refer to the security offered through on-line services to protect your online
information.
With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are
increasing also.
Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber
attacks. It is made up of two words one is cyber and other is security.
Cyber is related to the technology which contains systems, network and programs or data. Whereas security related
to the protection which includes systems security, network security and application and information security.
TO UNDERSTAND
Virus
Hacker
Malware
Trojan horses
Password cracking
Viruses and worms
A virus is a program that is loaded into your computer without your knowledge and runs against your wishes
Securing password
Passwords are a means by which a user proves that they are authorized to use a computing
device. A single device may have multiple users, each with their own password.
Passwords are not unlike a lock-and-key system, in which only the right key will enable a person
to have access.
Use always a strong password.
Hacker
Application security
Network defence
Intrusion detection
Endpoint protection
governance, risk and compliance
APPLICATION SECURITY
When weaknesses are found in an application’s security, they fix them before the
software is released.
Network defence
Network Defense is a form of cyber security for the securing of military and government computer systems. Like
everyone else in the world, national agencies also have to secure their systems against malicious cyber attacks.
Specialist work to protect, monitor, analyze, detect, and respond to unauthorized actions on a network.
Firewalls are an essential part of network defense, and studying them captures aspects of confidentiality and
availability.
INTRUSION
DETECTION
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious
activity and issues alerts when such activity is discovered.
It is a software application that scans a network or a system for harmful activity or policy breaching.
Using intrusion detection programs, specialists monitor the network for suspicious activity, such as multiple sign-in
attempts.
ENDPOINT PROTECTION
The internet of things has significantly increased the number of endpoints in a network. Specialists in this area
ensure that these devices are not at risk.
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely
bridged to client devices.
The connection of laptops, tablets, mobile phones, Internet Of Things devices and other wireless devices to
corporate networks creates attack paths for security threats.
GOVERNANCE, RISK AND
COMPLIANCE
Governance, risk management and compliance (GRC) is the term covering an organization's approach across these
three practices: Governance, risk management, and compliance.
Governance, risk management, and compliance are three related facets that aim to assure an organization reliably
achieves objectives, addresses uncertainty and acts with integrity.
Governance is the combination of processes established and executed by the directors (or the board of directors) that
are reflected in the organization's structure and how it is managed and led toward achieving goals.
Risk management is predicting and managing risks that could hinder the organization from reliably achieving its
objectives under uncertaint.
Cyber security Thank you