SlideShare a Scribd company logo
CYBER
SECURITY
CYBER + SECURITY = CYBER
SECURITY
Cyber means relating
to or characteristic of
the culture of
computers,
information
technology, and
virtual reality.
Security means the
state of being free
from danger of
threats.
CYBER SECURITY
CYBER SECURITY REFERS TO A BODY OF
TECHNOLOGIES, PROCESSES AND PRACTICES
DESIGNED TO PROTECT NETWORKS, DEVICES,
PROGRAMS AND DATA FROM ATTACK, DAMAGE
OR UNAUTHORISED ACCESS.
APPLICATION SECURITY
INFORMATION SECURITY
DISASTER RECOVERY
NETWORK SECURITY
OPERATIONAL SECURITY
END-USER EDUCATION
APPLICATION SECURITY:
APPLICATION SECURITY ENCOMPASSES MEASURES OR COUNTER-
MEASURES THAT ARE TAKEN DURING THE DEVELOPMENT LIFE-
CYCLE TO PROTECT APPLICATIONS FROM THREATS THAT CAN
COME THROUGH FLAWS IN THE APPLICATION DESIGN,
DEVELOPMENT, DEPLOYMENT, UPGRADE OR MAINTENANCE.
SOME BASICS TECHNIQUES ARE:
INPUT PARAMETER VALIDATION
USER/ROLL AUTHORIZATION
AUDITING AND LOGGING
INFORMATION SECURITY:
INFORMATION SECURITY PROTECTS INFORMATION FROM
ANOTHORIZED ACCESS TO AVOID IDENTITY THEFT AND TO
PROTECT PRIVACY.M MAJOR TECHNICQUES USED TO COVER
ARE:
IDENTIFICATION OF USER
AUTHORIZATION OF USER
AUTHENTICATION OF USER
CYPTOGRAPHY
DISASTER RECOVERY PLANNING:
DISASTER RECOVERY PLANNING IS A PROCESS THAT
INCLUDES PERFORMING RISK ASSESSMENT,
ESTABLISHING PRIORITIES, DEVELOPING RECOVERY
STRATEGIES IN CASE OF A DISASTER. ANY BUSINESS
SHOULD HAVE A CONCRETE PLAN FOR DISASTER
RECOVERY TO RESUME NORMAL BUSINESS
OPERATIONS AS QUICKLY AS POSSIBLE AFTER A
DISASTER.
NETWORK SECURITY:
NETWORK SECURITY INCLUDES ACTIVITES TO PROTECT THE USABILITY
RELIABILITY INTEGRITY AND SAFETY OF THE NETWORK. EFFECTIVE
NETWORK SECURITY TARGETS A VARIETY OF THREATS AND STOP THEM
FROM ENTERING OR SPREADING ON THE NETWORK. NETWORK
SECURITY COMPONENTS INCLUDE
ANTIVIRUS AND ANTI SPYWARE
FIREWALL, TO BLOCK UNAUTHORISED ACCESS TO YOUR NETWORK
INSTRUCTION, PREVENTION SYSTEM TO IDENTIFY FAST SPREADING
THREATS
RANSOMEWARE:
TYPE OF MALWARE THAT INVOLVE AN ATTACKER
LOCKING THE VICTIMS COMPUTER SYSTEM FILES
TYPICALLY THROUGH ENCRYPTION.
MALWARE:
ANY FILE OR PROGRAM USED TO HARM A
COMPUTER USER SUCH AS WORMS COMPUTER VIRUS.
SOCIAL ENGINEERING:
AN ATTACK THAT REALISE ON HUMAN INTERACTION
TO TRICK USER INTO BREAKING SECURITY PROCEDURES
IN ORDER TO GAIN SENSITIVE INFORMATION THAT IS
TYPICALLY PROTECTED.
BUSINESS PROTECTION:
USED AGAINST MALWARE,
RANSOMEWARE, SOCIAL ENGINEERING.
PROTECTION FOR DATA AND NETWORKS.
PREVENTION OF UNAUTHORISED USES.
PROTECTION FOR END-USERS.
IMPROVES RECOVERY TIME AFTER A
BREACH.
CYBER SECURITY VENDORS
IN THIS FIELD WE TYPICALLY USE END POINT NETWORK
AND ADVANCE THREAT PROTECTION SECURITY AS WELL AS
DATA LOSE PREVENTION.
THE THREE COMMONLY KNOWN CYBER SECURITY
VENDOR INCLUDE:
1.CISCO
2.MCAFEE
3.TREND MICRO
DEPARTMENT OF
SCIENCE AND
HUMANITIES
PRESENTED BY:
1.J.ABITHA
2.N.PRATHIBA
Cyber security

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber Security
Cyber SecurityCyber Security
Cyber security
Cyber securityCyber security
Cyber security
Satbharai Sethar
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Cyber security
Cyber securityCyber security
Cyber security
RavikantGautam8
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
cyber security
cyber security cyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber security

CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
LeslieMenardPerez
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
MuhammadKhalil858111
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
KRISHNARAJ207
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
ItzRoswell1
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Cyber security
Cyber securityCyber security
Cyber security
Rahul Dey
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
KumarjitDutta7
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
OllieShoresna
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
Webtrills1
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
Alan Rudd
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
NehaKumari203874
 

Similar to Cyber security (20)

CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Network security
Network security Network security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Cyber security
Cyber securityCyber security
Cyber security
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Network security
Network securityNetwork security
Network security
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 

Recently uploaded

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 

Recently uploaded (20)

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 

Cyber security

  • 2. CYBER + SECURITY = CYBER SECURITY Cyber means relating to or characteristic of the culture of computers, information technology, and virtual reality. Security means the state of being free from danger of threats.
  • 3. CYBER SECURITY CYBER SECURITY REFERS TO A BODY OF TECHNOLOGIES, PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS, DEVICES, PROGRAMS AND DATA FROM ATTACK, DAMAGE OR UNAUTHORISED ACCESS.
  • 4. APPLICATION SECURITY INFORMATION SECURITY DISASTER RECOVERY NETWORK SECURITY OPERATIONAL SECURITY END-USER EDUCATION
  • 5. APPLICATION SECURITY: APPLICATION SECURITY ENCOMPASSES MEASURES OR COUNTER- MEASURES THAT ARE TAKEN DURING THE DEVELOPMENT LIFE- CYCLE TO PROTECT APPLICATIONS FROM THREATS THAT CAN COME THROUGH FLAWS IN THE APPLICATION DESIGN, DEVELOPMENT, DEPLOYMENT, UPGRADE OR MAINTENANCE. SOME BASICS TECHNIQUES ARE: INPUT PARAMETER VALIDATION USER/ROLL AUTHORIZATION AUDITING AND LOGGING
  • 6.
  • 7. INFORMATION SECURITY: INFORMATION SECURITY PROTECTS INFORMATION FROM ANOTHORIZED ACCESS TO AVOID IDENTITY THEFT AND TO PROTECT PRIVACY.M MAJOR TECHNICQUES USED TO COVER ARE: IDENTIFICATION OF USER AUTHORIZATION OF USER AUTHENTICATION OF USER CYPTOGRAPHY
  • 8. DISASTER RECOVERY PLANNING: DISASTER RECOVERY PLANNING IS A PROCESS THAT INCLUDES PERFORMING RISK ASSESSMENT, ESTABLISHING PRIORITIES, DEVELOPING RECOVERY STRATEGIES IN CASE OF A DISASTER. ANY BUSINESS SHOULD HAVE A CONCRETE PLAN FOR DISASTER RECOVERY TO RESUME NORMAL BUSINESS OPERATIONS AS QUICKLY AS POSSIBLE AFTER A DISASTER.
  • 9. NETWORK SECURITY: NETWORK SECURITY INCLUDES ACTIVITES TO PROTECT THE USABILITY RELIABILITY INTEGRITY AND SAFETY OF THE NETWORK. EFFECTIVE NETWORK SECURITY TARGETS A VARIETY OF THREATS AND STOP THEM FROM ENTERING OR SPREADING ON THE NETWORK. NETWORK SECURITY COMPONENTS INCLUDE ANTIVIRUS AND ANTI SPYWARE FIREWALL, TO BLOCK UNAUTHORISED ACCESS TO YOUR NETWORK INSTRUCTION, PREVENTION SYSTEM TO IDENTIFY FAST SPREADING THREATS
  • 10. RANSOMEWARE: TYPE OF MALWARE THAT INVOLVE AN ATTACKER LOCKING THE VICTIMS COMPUTER SYSTEM FILES TYPICALLY THROUGH ENCRYPTION. MALWARE: ANY FILE OR PROGRAM USED TO HARM A COMPUTER USER SUCH AS WORMS COMPUTER VIRUS. SOCIAL ENGINEERING: AN ATTACK THAT REALISE ON HUMAN INTERACTION TO TRICK USER INTO BREAKING SECURITY PROCEDURES IN ORDER TO GAIN SENSITIVE INFORMATION THAT IS TYPICALLY PROTECTED.
  • 11. BUSINESS PROTECTION: USED AGAINST MALWARE, RANSOMEWARE, SOCIAL ENGINEERING. PROTECTION FOR DATA AND NETWORKS. PREVENTION OF UNAUTHORISED USES. PROTECTION FOR END-USERS. IMPROVES RECOVERY TIME AFTER A BREACH.
  • 12. CYBER SECURITY VENDORS IN THIS FIELD WE TYPICALLY USE END POINT NETWORK AND ADVANCE THREAT PROTECTION SECURITY AS WELL AS DATA LOSE PREVENTION. THE THREE COMMONLY KNOWN CYBER SECURITY VENDOR INCLUDE: 1.CISCO 2.MCAFEE 3.TREND MICRO
  • 13.
  • 14. DEPARTMENT OF SCIENCE AND HUMANITIES PRESENTED BY: 1.J.ABITHA 2.N.PRATHIBA