SlideShare a Scribd company logo
Cyber security is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks. It's also known as
information technology security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can be divided into a few
common categories.
· Network security is the practice of securing a computer network from intruders,
whether targeted attackers or opportunistic malware.
· Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
· Information security protects the integrity and privacy of data, both in storage and in
transit.
· Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the
procedures that determine how and where data may be stored or shared all fall under
this umbrella.
· Disaster recovery and business continuity define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without
certain resources.
· End-user education addresses the most unpredictable cyber-security factor: people.
Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices. Teaching users to delete suspicious email attachments,
not plug in unidentified USB drives, and various other important lessons is vital for the
security of any organization.

More Related Content

What's hot

Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
Vansh Bathla
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cyber security
Cyber securityCyber security
Cyber security
Sajid Hasan
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 

What's hot (20)

Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyer security

CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
KRISHNARAJ207
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
avinashkumar1912
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
Md Shaifullar Rabbi
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
Emmanuel Gbenga Dada (BSc, MSc, PhD)
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
ItzRoswell1
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
TikdiPatel
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
AnushkaThakur11
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Securing information system
Securing information systemSecuring information system
Securing information system
Tanjim Rasul
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
MuhammadKhalil858111
 
How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?
VRS Technologies
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docx
RoshniChauhan24
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docx
RoshniChauhan24
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 

Similar to Cyer security (20)

CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docx
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docx
 
Network security
Network securityNetwork security
Network security
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 

Recently uploaded

Improving the viability of probiotics by encapsulation methods for developmen...
Improving the viability of probiotics by encapsulation methods for developmen...Improving the viability of probiotics by encapsulation methods for developmen...
Improving the viability of probiotics by encapsulation methods for developmen...
Open Access Research Paper
 
Enhanced action and stakeholder engagement for sustainable peatland management
Enhanced action and stakeholder engagement for sustainable peatland managementEnhanced action and stakeholder engagement for sustainable peatland management
Enhanced action and stakeholder engagement for sustainable peatland management
Global Landscapes Forum (GLF)
 
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptxAGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
BanitaDsouza
 
Top 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdfTop 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdf
Jhon Wick
 
Promoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland managementPromoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland management
Global Landscapes Forum (GLF)
 
Silent nights: The essential role of Nocturnal Pollinators - .pptx
Silent nights: The essential role of Nocturnal Pollinators - .pptxSilent nights: The essential role of Nocturnal Pollinators - .pptx
Silent nights: The essential role of Nocturnal Pollinators - .pptx
Archita Das
 
Celebrating World-environment-day-2024.pdf
Celebrating  World-environment-day-2024.pdfCelebrating  World-environment-day-2024.pdf
Celebrating World-environment-day-2024.pdf
rohankumarsinghrore1
 
How about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shopHow about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shop
laozhuseo02
 
Q&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service PlaybookQ&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service Playbook
World Resources Institute (WRI)
 
Drip Irrigation technology with solar power
Drip Irrigation technology with solar powerDrip Irrigation technology with solar power
Drip Irrigation technology with solar power
anikchanda4
 
Peatlands of Latin America and the Caribbean
Peatlands of Latin America and the CaribbeanPeatlands of Latin America and the Caribbean
Peatlands of Latin America and the Caribbean
Global Landscapes Forum (GLF)
 
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Global Landscapes Forum (GLF)
 
Global Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation AtlasGlobal Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation Atlas
Global Landscapes Forum (GLF)
 
Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...
Open Access Research Paper
 
Overview of the Global Peatlands Assessment
Overview of the Global Peatlands AssessmentOverview of the Global Peatlands Assessment
Overview of the Global Peatlands Assessment
Global Landscapes Forum (GLF)
 
Summary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of AustraliaSummary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of Australia
yasmindemoraes1
 
ENVIRONMENT~ Renewable Energy Sources and their future prospects.
ENVIRONMENT~ Renewable Energy Sources and their future prospects.ENVIRONMENT~ Renewable Energy Sources and their future prospects.
ENVIRONMENT~ Renewable Energy Sources and their future prospects.
tiwarimanvi3129
 
Peatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge EducationPeatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge Education
Global Landscapes Forum (GLF)
 
Wildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environmentWildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environment
amishajha2407
 
Climate Change All over the World .pptx
Climate Change All over the World  .pptxClimate Change All over the World  .pptx
Climate Change All over the World .pptx
sairaanwer024
 

Recently uploaded (20)

Improving the viability of probiotics by encapsulation methods for developmen...
Improving the viability of probiotics by encapsulation methods for developmen...Improving the viability of probiotics by encapsulation methods for developmen...
Improving the viability of probiotics by encapsulation methods for developmen...
 
Enhanced action and stakeholder engagement for sustainable peatland management
Enhanced action and stakeholder engagement for sustainable peatland managementEnhanced action and stakeholder engagement for sustainable peatland management
Enhanced action and stakeholder engagement for sustainable peatland management
 
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptxAGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
 
Top 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdfTop 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdf
 
Promoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland managementPromoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland management
 
Silent nights: The essential role of Nocturnal Pollinators - .pptx
Silent nights: The essential role of Nocturnal Pollinators - .pptxSilent nights: The essential role of Nocturnal Pollinators - .pptx
Silent nights: The essential role of Nocturnal Pollinators - .pptx
 
Celebrating World-environment-day-2024.pdf
Celebrating  World-environment-day-2024.pdfCelebrating  World-environment-day-2024.pdf
Celebrating World-environment-day-2024.pdf
 
How about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shopHow about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shop
 
Q&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service PlaybookQ&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service Playbook
 
Drip Irrigation technology with solar power
Drip Irrigation technology with solar powerDrip Irrigation technology with solar power
Drip Irrigation technology with solar power
 
Peatlands of Latin America and the Caribbean
Peatlands of Latin America and the CaribbeanPeatlands of Latin America and the Caribbean
Peatlands of Latin America and the Caribbean
 
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
 
Global Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation AtlasGlobal Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation Atlas
 
Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...
 
Overview of the Global Peatlands Assessment
Overview of the Global Peatlands AssessmentOverview of the Global Peatlands Assessment
Overview of the Global Peatlands Assessment
 
Summary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of AustraliaSummary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of Australia
 
ENVIRONMENT~ Renewable Energy Sources and their future prospects.
ENVIRONMENT~ Renewable Energy Sources and their future prospects.ENVIRONMENT~ Renewable Energy Sources and their future prospects.
ENVIRONMENT~ Renewable Energy Sources and their future prospects.
 
Peatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge EducationPeatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge Education
 
Wildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environmentWildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environment
 
Climate Change All over the World .pptx
Climate Change All over the World  .pptxClimate Change All over the World  .pptx
Climate Change All over the World .pptx
 

Cyer security

  • 1. Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. · Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. · Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. · Information security protects the integrity and privacy of data, both in storage and in transit. · Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella. · Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources. · End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.