SlideShare a Scribd company logo
1 of 20
Contents
 What is Cyber Security
 Cyber Security Principles
Cyber Security polices
Conclusion
 Cyber security is the protection of internet-connected
systems such as hardware, software and data from cyber
threats.
 Cyber security is the application of technologies,
processes, and controls to protect systems, networks,
programs, devices and data from cyber attacks.
 Cyber security is the practice of protecting critical
systems and sensitive information from digital attacks.
What is Cyber Security
8/16/2022
2
 It aims to reduce the risk of cyber attacks and protect
against the unauthorized exploitation of systems,
networks, and technologies.
 These Cyber attacks are usually aimed at accessing,
changing, or destroying sensitive information, extorting
money from users, or interrupting normal business
processes.
Conn…
8/16/2022
3
8/16/2022
4
Key elements of cybersecurity
 Cyber security principles denote the basic rules should be used
when designing a secure system.
 Compliance:- Compliance is necessary but not enough.
 Risk based security:- Security should be applied consistently with the level
of accepted business risk.
 Simplicity:- The security implemented should simple and not complicated.
 Reusability and flexibility:-Design solutions with flexibility and future
reusability in mind.
Principles of Cyber Security
8/16/2022
5
 Don’t assume trust with out evidence:- The basic principle in
security.
 Secure overall design:- Security should not be treated in silos.
 Defiance in depth:- Defense in depth came with layered approach.
 Least privilege:- Access should be granted with a list privilege objective. No
more no less.
8/16/2022
6
Conn…
 Separation/segregation of duties:- No single actor can
undermine security of the system.
 Failsafe:- In the event of unexpected failure, the system must
remain secure.
 Attack surface reduction:- Limit the functionality exposed to
malicious users.
8/16/2022
7
Conn…
8/16/2022
8
Cyber security policy
Introduction
Cyber security policy : The written document that contain the
behavioral or tactical guideline of all employee that ensuring the
maximum protection from cyber attacks.
Some of the common cyber security policies are
Virus and Spyware Protection policy: This policy ensures the
detection and removal of viruses by reducing security risk.
Application and Device Control: This policy is for the protection
of the system’s resources from different parts of the system.
Host Integrity policy: This policy allows companies to make
changes to a client’s computer for security reasons.
8/16/2022
9
Cyber Security Policies
Access Control Policy: This policy defines the outlines accessible
to the company’s employees in terms of data and information.
Change Management Policy: defines the formal process that
companies need to go through for making IT and security changes.
Information Security Policy: To ensure all end users and
networks within an organization meet minimum IT security and data
protection security requirements.
Incident Response Policy: A policy to manage an incident and
remediate the impact it on the company.
8/16/2022
10
Conn…
Remote Access Policy: defines the method to remotely connect an
organization’s internal networks.
Acceptable Use Of Information Systems Policy: suitable use
of computer device at the company.
 Account Management: This policy establishes a process for creating and
administering accounts that have access to the information.
8/16/2022
11
Conn…
E-Commerce Policy: this policy need for companies which have an
active e-commerce is presence.
E-Mail Policy: focus of means of communication in the formal sector
and regulates the rules for handling emails inside an organization.
Firewall Policy: The firewall is present in all company’s network and
this policy monitors its traffic.
8/16/2022
12
Conn…
Log Management Policy: This is a data entry system where the
companies maintain a record of security performance.
Network Security And VPN Acceptable Use Policy: This policy
defines the process of connecting a company’s network to any host.
Password Policy: This policy indicate create strong passwords
and change them frequently to avoid security breaches.
8/16/2022
13
Conn…
8/16/2022
14
Network security policy
 Patch Management Policy: this policy enables companies to use
software patches to overcome different vulnerabilities.
 Server Security Policy: This policy defines internal server base
configuration standards and restrictions and applicable for servers
owned by the company as well as outsourced by them.
 Social Media Acceptable Use Policy: use of social media in
business has grown rapidly in the last few years and takes care of
these things to maintain security inside the organization.
8/16/2022
15
Conn…
Systems Monitoring And Auditing Policy: This policy is for
monitoring and auditing systems to identify any sort of
inappropriate actions.
 Vulnerability Assessment: In this policy information remains
secure at all levels.
 Website Operation Policy: this policy for communication and
updates of the website and to ensures information protection.
 Server Virtualization: It defines the server virtualization
requirements and how to manage them.
8/16/2022
16
Conn…
Wireless Connectivity Policy: The companies are very particular
about the Wi-Fi networks.
Telecommuting Policy: This policy is for the telecommunication
industry and its employees.
8/16/2022
17
Conn…
8/16/2022
18
Conclusion
8/16/2022
19
8/16/2022
20

More Related Content

Similar to CYBER SECURITY.pptx

create your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfcreate your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdf
FORTUNE2505
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
bikheet
 

Similar to CYBER SECURITY.pptx (20)

Cloud native patterns antipatterns
Cloud native patterns antipatternsCloud native patterns antipatterns
Cloud native patterns antipatterns
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
5 Essential Things to Know About Your Cloud Network Monitoring
5 Essential Things to Know About Your Cloud Network Monitoring5 Essential Things to Know About Your Cloud Network Monitoring
5 Essential Things to Know About Your Cloud Network Monitoring
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
create your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfcreate your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdf
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

CYBER SECURITY.pptx

  • 1. Contents  What is Cyber Security  Cyber Security Principles Cyber Security polices Conclusion
  • 2.  Cyber security is the protection of internet-connected systems such as hardware, software and data from cyber threats.  Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.  Cyber security is the practice of protecting critical systems and sensitive information from digital attacks. What is Cyber Security 8/16/2022 2
  • 3.  It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.  These Cyber attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Conn… 8/16/2022 3
  • 5.  Cyber security principles denote the basic rules should be used when designing a secure system.  Compliance:- Compliance is necessary but not enough.  Risk based security:- Security should be applied consistently with the level of accepted business risk.  Simplicity:- The security implemented should simple and not complicated.  Reusability and flexibility:-Design solutions with flexibility and future reusability in mind. Principles of Cyber Security 8/16/2022 5
  • 6.  Don’t assume trust with out evidence:- The basic principle in security.  Secure overall design:- Security should not be treated in silos.  Defiance in depth:- Defense in depth came with layered approach.  Least privilege:- Access should be granted with a list privilege objective. No more no less. 8/16/2022 6 Conn…
  • 7.  Separation/segregation of duties:- No single actor can undermine security of the system.  Failsafe:- In the event of unexpected failure, the system must remain secure.  Attack surface reduction:- Limit the functionality exposed to malicious users. 8/16/2022 7 Conn…
  • 8. 8/16/2022 8 Cyber security policy Introduction Cyber security policy : The written document that contain the behavioral or tactical guideline of all employee that ensuring the maximum protection from cyber attacks.
  • 9. Some of the common cyber security policies are Virus and Spyware Protection policy: This policy ensures the detection and removal of viruses by reducing security risk. Application and Device Control: This policy is for the protection of the system’s resources from different parts of the system. Host Integrity policy: This policy allows companies to make changes to a client’s computer for security reasons. 8/16/2022 9 Cyber Security Policies
  • 10. Access Control Policy: This policy defines the outlines accessible to the company’s employees in terms of data and information. Change Management Policy: defines the formal process that companies need to go through for making IT and security changes. Information Security Policy: To ensure all end users and networks within an organization meet minimum IT security and data protection security requirements. Incident Response Policy: A policy to manage an incident and remediate the impact it on the company. 8/16/2022 10 Conn…
  • 11. Remote Access Policy: defines the method to remotely connect an organization’s internal networks. Acceptable Use Of Information Systems Policy: suitable use of computer device at the company.  Account Management: This policy establishes a process for creating and administering accounts that have access to the information. 8/16/2022 11 Conn…
  • 12. E-Commerce Policy: this policy need for companies which have an active e-commerce is presence. E-Mail Policy: focus of means of communication in the formal sector and regulates the rules for handling emails inside an organization. Firewall Policy: The firewall is present in all company’s network and this policy monitors its traffic. 8/16/2022 12 Conn…
  • 13. Log Management Policy: This is a data entry system where the companies maintain a record of security performance. Network Security And VPN Acceptable Use Policy: This policy defines the process of connecting a company’s network to any host. Password Policy: This policy indicate create strong passwords and change them frequently to avoid security breaches. 8/16/2022 13 Conn…
  • 15.  Patch Management Policy: this policy enables companies to use software patches to overcome different vulnerabilities.  Server Security Policy: This policy defines internal server base configuration standards and restrictions and applicable for servers owned by the company as well as outsourced by them.  Social Media Acceptable Use Policy: use of social media in business has grown rapidly in the last few years and takes care of these things to maintain security inside the organization. 8/16/2022 15 Conn…
  • 16. Systems Monitoring And Auditing Policy: This policy is for monitoring and auditing systems to identify any sort of inappropriate actions.  Vulnerability Assessment: In this policy information remains secure at all levels.  Website Operation Policy: this policy for communication and updates of the website and to ensures information protection.  Server Virtualization: It defines the server virtualization requirements and how to manage them. 8/16/2022 16 Conn…
  • 17. Wireless Connectivity Policy: The companies are very particular about the Wi-Fi networks. Telecommuting Policy: This policy is for the telecommunication industry and its employees. 8/16/2022 17 Conn…