Professional Documents
Culture Documents
ON
“CYBER SECURITY"
SUBMITTED BY
SUDHARANI. K .S
01.ITRODUCTION
1.1BACKGROUND
02.SYSTEM ARCHITECTURE
2.1 WAYS TO IMPROVE CYBER SECURITY
03.APPLICATIONS
04.ADVANTAGES
05.DISADVANTAGES
CONCLUSION
REFERENCES
INTRODUCTION
Computers are everywhere. Almost everything that we do
in our daily lives depends on computers and computer
networks. The Internet has become a mission-critical
infrastructure for governments, companies, and financial
institutions.
Computers and networks are used for controlling and
managing manufacturing processes, water supplies, the
electric power grid, air traffic control systems, and stock
market systems, to mention a few. As a consequence,
network attack s have started to impact the practical
aspects of our lives.
BACKGROUND
1 As time sharing systems emerged in the mid to late 1960s
and multiple jobs and users were able to run at the same time,
controlling the access to the data on the system became a
major point of concern.
2 One solution that was used was to process classified data
one level at a time and “sanitize” the system after the jobs
from one level were run and before the jobs for the next level
were run.
3This approach to computer security was known as periods
processing because the jobs for each level were all run in their
particular period of the day. This was an inefficient way to
use the system, and an effort was made to find more efficient
software solutions to the multilevel security problem.
SYSTEM ARCHITECTURE
System Architecture
Cyber security is also know as computer security.
Patch Management
Scroll down for all the latest news and information on patch
management.
Secure Coding
Scroll down for all the latest news and information on secure coding.
Strict Regulations
Restrictive to resources