CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What is Computer Security?
Goals of Computer Security
What to Secure?- Types of Computer Security
Potential Losses due to Security Attacks
Agenda
How to Secure?
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What are Bump Charts?
Bump charts have a relatively simple purpose—they are used to visualize changes in rank over time.
Relevant DimensionTime Dimension
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Why Computer Security?
Good Morning, this is Jon
calling from your
telecommunication company-
I’m working on behalf of your
ICT department. Due to
troubleshooting work I’d like
to ask for your user-ID and
your password
Oh alright. Sure!!
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Goals of Computer Security
Confidentiality
Availability
Data Integrity
Control
Audit
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Confidentiality: Keep your Secrets
Availability
Confidentiality
Data
Integrity
Control
Audit
Typically achieved by:
➢ Physical isolation
➢ Cryptography
➢ Background checks on
People
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Data Integrity: Prevent people from Modifying Data
Availability
Confidentiality
Data
Integrity
Control
Audit
Typically achieved by:
➢ Redundancy
➢ Backups
➢ Checksums & digital
signatures
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Availability: Make Sure you can Use Your System
Availability
Confidentiality
Data
Integrity
Control
Audit
Typically achieved by:
➢ Hardening
➢ Redundancy
➢ Reference Checks on
People
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Control: Regulate your System Usage
Control
Audit
Typically achieved by:
➢ Access Control lists
➢ Physical Security
Confidentiality
Data
Integrity
Availability
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Audit: Something Wrong Happened. How to Undo It?
Control
Audit
Typically achieved by:
➢ Log Files
➢ Human auditors & expert
systems
Confidentiality
Data
Integrity
Availability
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What to Secure?- Types of Computer Security
Physical Security
OS Security
Access
Control
Controlling who gets access to a computer
Permission controlling schemes, making sure users
are authorized to perform certain actions
Managing who can Access what resources, from
physical machines to programs to networks
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Potential Losses due to Security Attacks
Losing your
data
Unethical usage
of Computer
Resources
Reputation
Loss
Identity
Theft
How to Secure?
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Basic Computer Security Checklist
Check if the user is password
protected
Check if the OS is updated
Download software from
reputable sources
Check if the antivirus or
antimalware is installed
Terminate unusual services
running that consumes resources
Check if the firewall is on or
not
Check for your backups
regularly
Clear your private data from
web browsers
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing your OS
Keep your windows OS
up to date
Update your software
Create a Restore point
Install antivirus product
Install a proactive security solution
for multi-layered protection
Backup your
system
Use a standard user
account
Keep your user account
control enabled
Secure your web browser
before going online
Use an encryption software tool
for your hardware
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Antivirus
Scanning Integrity
Interception
Antivirus software, or anti-virus software (abbreviated to AV software), also
known as anti-malware, is a computer program used to prevent, detect, and
remove malware
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: Firewalls
A firewall is a network security system that monitors and controls incoming
and outgoing network traffic based on predetermined security rules
Cisco ASA Series
Checkpoint
Fortinet
Juniper
SonicWALL
pfSense
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: IDS
An intrusion detection system (IDS) is a device or software application that
monitors a network or systems for malicious activity or policy violations
IDS
Firewall Router
Internet
CyberCop MonitorSnort BlackICE Defender Vanguard Enforcer
LAN
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: VPN
A virtual private network extends a secure and encrypted connection to share
data remotely through public networks
Don’t just learn it, MASTER it with
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka

Computer Security | Types of Computer Security | Cybersecurity Course | Edureka

  • 1.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training
  • 2.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training What is Computer Security? Goals of Computer Security What to Secure?- Types of Computer Security Potential Losses due to Security Attacks Agenda How to Secure?
  • 3.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training What are Bump Charts? Bump charts have a relatively simple purpose—they are used to visualize changes in rank over time. Relevant DimensionTime Dimension
  • 4.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Why Computer Security? Good Morning, this is Jon calling from your telecommunication company- I’m working on behalf of your ICT department. Due to troubleshooting work I’d like to ask for your user-ID and your password Oh alright. Sure!!
  • 5.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Goals of Computer Security Confidentiality Availability Data Integrity Control Audit
  • 6.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Confidentiality: Keep your Secrets Availability Confidentiality Data Integrity Control Audit Typically achieved by: ➢ Physical isolation ➢ Cryptography ➢ Background checks on People
  • 7.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Data Integrity: Prevent people from Modifying Data Availability Confidentiality Data Integrity Control Audit Typically achieved by: ➢ Redundancy ➢ Backups ➢ Checksums & digital signatures
  • 8.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Availability: Make Sure you can Use Your System Availability Confidentiality Data Integrity Control Audit Typically achieved by: ➢ Hardening ➢ Redundancy ➢ Reference Checks on People
  • 9.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Control: Regulate your System Usage Control Audit Typically achieved by: ➢ Access Control lists ➢ Physical Security Confidentiality Data Integrity Availability
  • 10.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Audit: Something Wrong Happened. How to Undo It? Control Audit Typically achieved by: ➢ Log Files ➢ Human auditors & expert systems Confidentiality Data Integrity Availability
  • 11.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training What to Secure?- Types of Computer Security Physical Security OS Security Access Control Controlling who gets access to a computer Permission controlling schemes, making sure users are authorized to perform certain actions Managing who can Access what resources, from physical machines to programs to networks
  • 12.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Potential Losses due to Security Attacks Losing your data Unethical usage of Computer Resources Reputation Loss Identity Theft
  • 13.
  • 14.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Basic Computer Security Checklist Check if the user is password protected Check if the OS is updated Download software from reputable sources Check if the antivirus or antimalware is installed Terminate unusual services running that consumes resources Check if the firewall is on or not Check for your backups regularly Clear your private data from web browsers
  • 15.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Securing your OS Keep your windows OS up to date Update your software Create a Restore point Install antivirus product Install a proactive security solution for multi-layered protection Backup your system Use a standard user account Keep your user account control enabled Secure your web browser before going online Use an encryption software tool for your hardware
  • 16.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Antivirus Scanning Integrity Interception Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware
  • 17.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Securing Your Network: Firewalls A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules Cisco ASA Series Checkpoint Fortinet Juniper SonicWALL pfSense
  • 18.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Securing Your Network: IDS An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations IDS Firewall Router Internet CyberCop MonitorSnort BlackICE Defender Vanguard Enforcer LAN
  • 19.
    CYBERSECURITY CERTIFICATION COURSEwww.edureka.co/cybersecurity-certification-training Securing Your Network: VPN A virtual private network extends a secure and encrypted connection to share data remotely through public networks
  • 20.
    Don’t just learnit, MASTER it with