4. -The goal of Cyber-security is to shield data from being
stolen, bargained or assaulted.
-Cyber-security can be estimated by in any event one of
three objectives
The
C.I.A.
Triad
C
O
N
C
E
P
T
8. Skills And Technologies for Cyber-Security
Integrity
Backups
Check-sums
Data Corrective
Codes
Confidentiality
Encryption
Access Control
Authentication
Authorization
Physical Security
Availability
Physical
Protection
Computational
Redundancies.
9. Confidentiality
Encryption
Encryption is a method of transforming information to make it unreadable for unauthorized users by
using an algorithm.
The transformation of data uses a secret key (an encryption key) so that the transformed data can only
be read by using another secret key (decryption key).
Asymmetric-key Symmetric-key
11. Confidentiality
Access Control
Access control defines rules and policies for limiting access to a system or to physical or virtual
resources.
It is a process by which users are granted access and certain privileges to systems, resources or
information.
In access control systems, users need to present credentials before they can be granted access such as a
person's name / badge or a computer's serial number.
12.
13. Confidentiality
Authentication
Authentication is a procedure that guarantees and affirms a client's character or job that somebody has. It
tends to be done in various ways, yet it is typically founded on a blend of-
▪something the individual has (like a smart card or a radio key for putting away mystery keys).
▪something the individual knows (like a secret key/password),
▪something the individual is (like a human with a biometric (fingerprint/retina/face geometry)).
14. Confidentiality
Authorization
Authorization is a security mechanism which gives permission to do or have something.
It is used to determine a person or system is allowed access to resources, based on an access control
policy, including computer programs, files, services, data and application features.
It is normally preceded by authentication for user identity verification.
15. Confidentiality
Physical Security
Physical security describes measures designed to deny the unauthorized access of IT assets like
facilities, equipment, personnel, resources and other properties from damage.
It protects these assets from physical threats including theft, vandalism, fire and natural disasters.
16. Integrity
Backups
Backup is the periodic archiving of data.
It is a process of making copies of data or data files to use in the event when the original data or data
files are lost or destroyed.
It is also used to make copies for historical purposes, such as for longitudinal studies, statistics or for
historical records or to meet the requirements of a data retention policy.
17. Integrity
Check-Sums
A checksum is a numerical value used to verify the integrity of a file or a data transfer.
In other words, it is the computation of a function that maps the contents of a file to a numerical value.
They are typically used to compare two sets of data to make sure that they are the same.
A checksum function depends on the entire contents of a file.
It is designed in a way that even a small change to the input file (such as flipping a single bit) likely to
results in different output value.
19. Integrity
Data Corrective Codes
It is a technique for storing information so that little changes can be effectively distinguished and
consequently remedied.
20. Availability
Physical Protections
Computational Redundancies
-Physical safeguard means to keep information available even in the event of physical challenges. It
ensure sensitive information and critical information technology are housed in secure areas.
-It is applied as fault tolerant against accidental faults. It protects computers and storage devices that
serve as fallbacks in the case of failures.
23. Role
Hence, in each and every aspect of information technology, be it hardware, software, cloud, platform, we
need cybersecurity to get ourselves out of the vulnerability of data thefts and misuses.
Cybersecurity is the only field that can ensure that our data is safe and transmitted within the secured
and monitored protocols.
Security breakers or crackers (popularly known as hackers) are consistently creating new cyber attacks
to find backdoors or traps to go inside or get access to a system or its data for some negative purposes.
The main role of cybersecurity id to constantly find those attacks, decipher them and continuously
maintain the integrity of user data.
24. Career Opportunities
Cyber security professionals, or information
security analysts, have a wide range of
responsibilities.
Cyber security careers are complex and many
roles can be found with banks, retailers and
government organizations. On the job, you can
expect to safeguard an organization's files and
network, install firewalls, create security plans
and monitor activity. If a breach occurs, you'll
be responsible for identifying the problem and
finding a solution quickly.
Because of the frequency of cyber attacks,
careers are varied and qualified professionals
are in demand.
25. Security Specialist
Incident Responder
Cryptographer
Security Analyst
Security Architect
Ethical Hacker
Security Consultant
Security Manager
Security Administrator
Vulnerability Accessor
Computer Forensic Expert
Penetration Tester
CDO (Chief Data Officer)
CTO (Chief Technical Officer)
CISO (Chief Information Security Officer)
CSO (Chief Security Officer)
CIO (Chief Information Officer)
E
A P
ADMIN
ntry-Level
dvanced-Level
rofessional-level