SlideShare a Scribd company logo
1 of 27
Download to read offline
A P E E K I N T O C Y B E R - S E C U R I T Y
- Prem Raval
- Nishi Patel
THERE IS NO SUCH WORD CALLED 'SECURITY'
¯_(ツ)_/¯
Cyber + Security
I
N
T
R
O
D
U
C
T
I
O
N
Protection of Inter-Connected systems.
Set of principles designed for
dodging online network threats.
Knowing ongoing cyber-attacks and
methods to avoid them.
-The goal of Cyber-security is to shield data from being
stolen, bargained or assaulted.
-Cyber-security can be estimated by in any event one of
three objectives
The
C.I.A.
Triad
C
O
N
C
E
P
T
Confidentiality
Confidentiality refers to protecting
information from being accessed by
unauthorized parties.
Integrity
Integrity refers to ensuring the
authenticity of the information.
Availability
Availability means that information
is accessible by authorized users.
Skills And Technologies for Cyber-Security
Integrity
Backups
Check-sums
Data Corrective
Codes
Confidentiality
Encryption
Access Control
Authentication
Authorization
Physical Security
Availability
Physical
Protection
Computational
Redundancies.
Confidentiality
Encryption
Encryption is a method of transforming information to make it unreadable for unauthorized users by
using an algorithm.
The transformation of data uses a secret key (an encryption key) so that the transformed data can only
be read by using another secret key (decryption key).
Asymmetric-key  Symmetric-key
Symmetric-key  Asymmetric-key
Confidentiality
Access Control
Access control defines rules and policies for limiting access to a system or to physical or virtual
resources.
It is a process by which users are granted access and certain privileges to systems, resources or
information.
In access control systems, users need to present credentials before they can be granted access such as a
person's name / badge or a computer's serial number.
Confidentiality
Authentication
Authentication is a procedure that guarantees and affirms a client's character or job that somebody has. It
tends to be done in various ways, yet it is typically founded on a blend of-
▪something the individual has (like a smart card or a radio key for putting away mystery keys).
▪something the individual knows (like a secret key/password),
▪something the individual is (like a human with a biometric (fingerprint/retina/face geometry)).
Confidentiality
Authorization
Authorization is a security mechanism which gives permission to do or have something.
It is used to determine a person or system is allowed access to resources, based on an access control
policy, including computer programs, files, services, data and application features.
It is normally preceded by authentication for user identity verification.
Confidentiality
Physical Security
Physical security describes measures designed to deny the unauthorized access of IT assets like
facilities, equipment, personnel, resources and other properties from damage.
It protects these assets from physical threats including theft, vandalism, fire and natural disasters.
Integrity
Backups
Backup is the periodic archiving of data.
It is a process of making copies of data or data files to use in the event when the original data or data
files are lost or destroyed.
It is also used to make copies for historical purposes, such as for longitudinal studies, statistics or for
historical records or to meet the requirements of a data retention policy.
Integrity
Check-Sums
A checksum is a numerical value used to verify the integrity of a file or a data transfer.
In other words, it is the computation of a function that maps the contents of a file to a numerical value.
They are typically used to compare two sets of data to make sure that they are the same.
A checksum function depends on the entire contents of a file.
It is designed in a way that even a small change to the input file (such as flipping a single bit) likely to
results in different output value.
The
Checksum
Process
Integrity
Data Corrective Codes
It is a technique for storing information so that little changes can be effectively distinguished and
consequently remedied.
Availability
Physical Protections
Computational Redundancies
-Physical safeguard means to keep information available even in the event of physical challenges. It
ensure sensitive information and critical information technology are housed in secure areas.
-It is applied as fault tolerant against accidental faults. It protects computers and storage devices that
serve as fallbacks in the case of failures.
Role Of Cyber Security in ITS
Data
Role
Hence, in each and every aspect of information technology, be it hardware, software, cloud, platform, we
need cybersecurity to get ourselves out of the vulnerability of data thefts and misuses.
Cybersecurity is the only field that can ensure that our data is safe and transmitted within the secured
and monitored protocols.
Security breakers or crackers (popularly known as hackers) are consistently creating new cyber attacks
to find backdoors or traps to go inside or get access to a system or its data for some negative purposes.
The main role of cybersecurity id to constantly find those attacks, decipher them and continuously
maintain the integrity of user data.
Career Opportunities
Cyber security professionals, or information
security analysts, have a wide range of
responsibilities.
Cyber security careers are complex and many
roles can be found with banks, retailers and
government organizations. On the job, you can
expect to safeguard an organization's files and
network, install firewalls, create security plans
and monitor activity. If a breach occurs, you'll
be responsible for identifying the problem and
finding a solution quickly.
Because of the frequency of cyber attacks,
careers are varied and qualified professionals
are in demand.
Security Specialist
Incident Responder
Cryptographer
Security Analyst
Security Architect
Ethical Hacker
Security Consultant
Security Manager
Security Administrator
Vulnerability Accessor
Computer Forensic Expert
Penetration Tester
CDO (Chief Data Officer)
CTO (Chief Technical Officer)
CISO (Chief Information Security Officer)
CSO (Chief Security Officer)
CIO (Chief Information Officer)
E
A P
ADMIN
ntry-Level
dvanced-Level
rofessional-level
Bibliography
https://www.javatpoint.com/cyber-security-introduction
https://www.fireeye.com/current-threats/what-is-cyber-
security.html
https://www.cybersecurityeducation.org/careers/
https://randed.com/cybersecurity-roles/?lang=en
Rowe, Dale & Lunt, Barry & Ekstrom, Joseph. (2011). The role
of cyber-security in information technology education. 113-
122. 10.1145/2047594.2047628.
Thank You
- Prem Raval
-Nishi Patel

More Related Content

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 

Similar to Cyber security

Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And PrivacyManan Gadhiya
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 

Similar to Cyber security (20)

security IDS
security IDSsecurity IDS
security IDS
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
I0516064
I0516064I0516064
I0516064
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
Data security
Data securityData security
Data security
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Cyber security

  • 1. A P E E K I N T O C Y B E R - S E C U R I T Y - Prem Raval - Nishi Patel THERE IS NO SUCH WORD CALLED 'SECURITY' ¯_(ツ)_/¯
  • 3. I N T R O D U C T I O N Protection of Inter-Connected systems. Set of principles designed for dodging online network threats. Knowing ongoing cyber-attacks and methods to avoid them.
  • 4. -The goal of Cyber-security is to shield data from being stolen, bargained or assaulted. -Cyber-security can be estimated by in any event one of three objectives The C.I.A. Triad C O N C E P T
  • 5. Confidentiality Confidentiality refers to protecting information from being accessed by unauthorized parties.
  • 6. Integrity Integrity refers to ensuring the authenticity of the information.
  • 7. Availability Availability means that information is accessible by authorized users.
  • 8. Skills And Technologies for Cyber-Security Integrity Backups Check-sums Data Corrective Codes Confidentiality Encryption Access Control Authentication Authorization Physical Security Availability Physical Protection Computational Redundancies.
  • 9. Confidentiality Encryption Encryption is a method of transforming information to make it unreadable for unauthorized users by using an algorithm. The transformation of data uses a secret key (an encryption key) so that the transformed data can only be read by using another secret key (decryption key). Asymmetric-key  Symmetric-key
  • 11. Confidentiality Access Control Access control defines rules and policies for limiting access to a system or to physical or virtual resources. It is a process by which users are granted access and certain privileges to systems, resources or information. In access control systems, users need to present credentials before they can be granted access such as a person's name / badge or a computer's serial number.
  • 12.
  • 13. Confidentiality Authentication Authentication is a procedure that guarantees and affirms a client's character or job that somebody has. It tends to be done in various ways, yet it is typically founded on a blend of- ▪something the individual has (like a smart card or a radio key for putting away mystery keys). ▪something the individual knows (like a secret key/password), ▪something the individual is (like a human with a biometric (fingerprint/retina/face geometry)).
  • 14. Confidentiality Authorization Authorization is a security mechanism which gives permission to do or have something. It is used to determine a person or system is allowed access to resources, based on an access control policy, including computer programs, files, services, data and application features. It is normally preceded by authentication for user identity verification.
  • 15. Confidentiality Physical Security Physical security describes measures designed to deny the unauthorized access of IT assets like facilities, equipment, personnel, resources and other properties from damage. It protects these assets from physical threats including theft, vandalism, fire and natural disasters.
  • 16. Integrity Backups Backup is the periodic archiving of data. It is a process of making copies of data or data files to use in the event when the original data or data files are lost or destroyed. It is also used to make copies for historical purposes, such as for longitudinal studies, statistics or for historical records or to meet the requirements of a data retention policy.
  • 17. Integrity Check-Sums A checksum is a numerical value used to verify the integrity of a file or a data transfer. In other words, it is the computation of a function that maps the contents of a file to a numerical value. They are typically used to compare two sets of data to make sure that they are the same. A checksum function depends on the entire contents of a file. It is designed in a way that even a small change to the input file (such as flipping a single bit) likely to results in different output value.
  • 19. Integrity Data Corrective Codes It is a technique for storing information so that little changes can be effectively distinguished and consequently remedied.
  • 20. Availability Physical Protections Computational Redundancies -Physical safeguard means to keep information available even in the event of physical challenges. It ensure sensitive information and critical information technology are housed in secure areas. -It is applied as fault tolerant against accidental faults. It protects computers and storage devices that serve as fallbacks in the case of failures.
  • 21. Role Of Cyber Security in ITS
  • 22. Data
  • 23. Role Hence, in each and every aspect of information technology, be it hardware, software, cloud, platform, we need cybersecurity to get ourselves out of the vulnerability of data thefts and misuses. Cybersecurity is the only field that can ensure that our data is safe and transmitted within the secured and monitored protocols. Security breakers or crackers (popularly known as hackers) are consistently creating new cyber attacks to find backdoors or traps to go inside or get access to a system or its data for some negative purposes. The main role of cybersecurity id to constantly find those attacks, decipher them and continuously maintain the integrity of user data.
  • 24. Career Opportunities Cyber security professionals, or information security analysts, have a wide range of responsibilities. Cyber security careers are complex and many roles can be found with banks, retailers and government organizations. On the job, you can expect to safeguard an organization's files and network, install firewalls, create security plans and monitor activity. If a breach occurs, you'll be responsible for identifying the problem and finding a solution quickly. Because of the frequency of cyber attacks, careers are varied and qualified professionals are in demand.
  • 25. Security Specialist Incident Responder Cryptographer Security Analyst Security Architect Ethical Hacker Security Consultant Security Manager Security Administrator Vulnerability Accessor Computer Forensic Expert Penetration Tester CDO (Chief Data Officer) CTO (Chief Technical Officer) CISO (Chief Information Security Officer) CSO (Chief Security Officer) CIO (Chief Information Officer) E A P ADMIN ntry-Level dvanced-Level rofessional-level
  • 27. Thank You - Prem Raval -Nishi Patel