You are on page 1of 16

Cyber security

Presented by :
Rajesh and Riza
Intr0duction :-
The term cyber security is used to refer to the security offered through on-line services to protect your online
information.

With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are
increasing also.

Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber
attacks. It is made up of two words one is cyber and other is security.

Cyber is related to the technology which contains systems, network and programs or data. Whereas security related
to the protection which includes systems security, network security and application and information security.
TO UNDERSTAND

What is the need of cyber


What is the meaning of
security
word cyber

How to implement and maintain


What are the security
security of a cyber field around
problems in cyber
us.
field
Meaning of the word cyber

It is a combining form relating to information


technology ,the internet, and virtual reality

The word “cyber” denotes a relationship with


information technology i.e, computer .

It can relate to all aspects of computing ,including


storing data, processing data accessing data and
linking data.
Need of cyber security
Cybersecurity is important because it include everything that pertains to protecting our sensitive data, personally identifiable
information (PII), protected health information (PHI),
personal information, intellectual property, data, and governmental and industry information systems from theft and damage
attempte
Major security problems

 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and worms

A virus is a program that is loaded into your computer without your knowledge and runs against your wishes
Securing password

Passwords are a means by which a user proves that they are authorized to use a computing
device. A single device may have multiple users, each with their own password.

 Passwords are not unlike a lock-and-key system, in which only the right key will enable a person
to have access.
Use always a strong password.
Hacker

A computer hacker is a computer expert who uses


their technical knowledge to achieve a goal or
overcome an obstacle, within a computerized system
by non-standard means.
Branches of cyber security

 Application security
 Network defence
 Intrusion detection
 Endpoint protection
 governance, risk and compliance
APPLICATION SECURITY

Individuals in application security test applications looking for vulnerabilities.

When weaknesses are found in an application’s security, they fix them before the
software is released.
Network defence

Network Defense is a form of cyber security for the securing of military and government computer systems. Like
everyone else in the world, national agencies also have to secure their systems against malicious cyber attacks.

Specialist work to protect, monitor, analyze, detect, and respond to unauthorized actions on a network.

Firewalls are an essential part of network defense, and studying them captures aspects of confidentiality and
availability.
INTRUSION
DETECTION

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious
activity and issues alerts when such activity is discovered.

It is a software application that scans a network or a system for harmful activity or policy breaching.

Using intrusion detection programs, specialists monitor the network for suspicious activity, such as multiple sign-in
attempts.
ENDPOINT PROTECTION

The internet of things has significantly increased the number of endpoints in a network. Specialists in this area
ensure that these devices are not at risk.

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely
bridged to client devices.

The connection of laptops, tablets, mobile phones, Internet Of Things devices and other wireless devices to
corporate networks creates attack paths for security threats.
GOVERNANCE, RISK AND
COMPLIANCE

Governance, risk management and compliance (GRC) is the term covering an organization's approach across these
three practices: Governance, risk management, and compliance.

Governance, risk management, and compliance are three related facets that aim to assure an organization reliably
achieves objectives, addresses uncertainty and acts with integrity.

Governance is the combination of processes established and executed by the directors (or the board of directors) that
are reflected in the organization's structure and how it is managed and led toward achieving goals.

Risk management is predicting and managing risks that could hinder the organization from reliably achieving its
objectives under uncertaint.
Cyber security Thank you

You might also like