SlideShare a Scribd company logo
Data Protection and Security
NAZAR K A
Deputy Manager
ITI Limited
Contact: 9400568432 Nazarka_pkd@itiltd.co.in
DATA and INFORMATION
DATA : A collection of unorganized facts has no
meaning of its own.
( Numbers , Symbols , Characters , Audio or Vidio clips..etc)
INFORMATION: Processed data having some meaning
and it is useful for decision making.
Example. Marklist of astudent , Rank list of a class or University
PROCESS
DATA INFORMATION
CIAand UA
Confidentiality : Data able to access only to authorized
users
Integrity : Data integrity should be ensured
Availability : Data must be available to intended users at
allowed time
Authenticity : Authenticity of a user should be verified
before accessing data.
Utility : Data should have the intended utility.
Data Protection and Security
• Data protection is the process of safeguarding
important data from corruption, compromise or loss
and providing the capability to restore the data to a
functional state should something happen to data as
inaccessible or unusable..
• Data security refers to the process of protecting data from
unauthorized access and data corruption throughout its
lifecycle. Data security includes data encryption,
hashing, tokenization, and key management practices that
protect data across all applications and platforms.
Both are same in some point, by data security we can achieve data protection.
Data protection
•RAID
•Data Backup and Restoration
•Cloud backup
•Disaster Recovery Station
Data security & Data breaches
Data is the most valuable asset for any business. No matter what industry
you are in, it’s critical to take care of your data, whether it is financial
reports, healthcare records or a start-up business plan following are the way
data breaches occures
• Cyberattacks in which hackers bypass your security technologies and get
into your important software or your security platform
• Theft or loss of devices containing protected information
• Data theft by employees or other internal users, such as contractors or
partners
• Human errors such as accidentally sending sensitive data to someone
unauthorized to see it
MALWARE
Malware = MALicious + soft WARE
Malware is intrusive software that is designed to
damage and destroy computers and computer systems.
Malware is a contraction for “malicious software.”
Examples of common malware includes viruses, worms,
Trojan viruses, spyware, adware, and ransomware.
Types of Malware
• viruses : Malicious program without our consent
•Worm. : Hide and replicate fast from PC to PC
•Trojan : Destroy our computer systems
•Ransomware : Restrict our access to PC
•Rootkits : Give unauthorized access to our PC
•Adware : Popup annoying advertisments
•Spyware : Will record and sent our activity in PC
Cyber attack
•A cyber attack is an attempt to disable
computers, steal data, or use a breached
computer system to launch additional attacks.
Cybercriminals use different methods to launch
a cyber attack that includes malware, phishing,
ransomware, man-in-the-middle attack, or
other methods.
AntiVirus
•What is Anti Virus?
Antivirus is a kind of software used to prevent, scan,
detect and delete viruses and other kinds of malicious
software from your computer or laptop.
Once installed, most antivirus software runs
automatically in the background to provide real-time
protection against virus attacks.
Hacking =Unauthorized Computer Access
Hacking is the process of gaining unauthorized access into a
computer system, or group of computer systems. This is
done through cracking of passwords and codes which gives
access to the systems.
The access to a password is obtained by the hacker through
password cracking algorithms programs. Just like any thief, a
hacker will choose the most vulnerable targets they can find.
But instead of using physical tool, they use software to
steal your personal data.
What Hackers are Looking For
Personally Identifiable Information (PII) are
pieces of information like User name and
Password to enable intrude in your system in order
to commit fraud, identity theft, and other financially
damaging crimes against you
It is like a tool used by thief to enter your house
through vulnerable spot.
What is Firewall
• A firewall can be defined as a special type of network security device
or a software program that monitors and filters incoming and
outgoing network traffic based on a defined set of security rules. It
acts as a barrier between internal private networks and external
sources (such as the public Internet).
• The primary purpose of a firewall is to allow non-threatening traffic
and prevent malicious or unwanted data traffic for protecting the
computer from viruses and attacks. A firewall is a cybersecurity tool
that filters network traffic and helps users block malicious software
from accessing the Internet in infected computers.
Why Firewall
• Firewalls are primarily used to prevent malware and network-based
attacks. Additionally, they can help in blocking application-layer
attacks. These firewalls act as a gatekeeper or a barrier. They monitor
every attempt between our computer and another network. They do
not allow data packets to be transferred through them unless the
data is coming or going from a user-specified trusted source.
• Firewalls are designed in such a way that they can react quickly to
detect and counter-attacks throughout the network. They can work
with rules configured to protect the network and perform quick
assessments to find any suspicious activity. In short, we can point to
the firewall as a traffic controller.
Firewall Types
1. HARDWARE FIREWALL : A Special device placed in between internal
network LAN and Gate way to external network WAN
2. SOFTWARE FIREWALL : Software program in the computer for not
allowing data traffic from undesired sites and locations.
3. Cloud Based Firewall : cloud firewalls are hosted in the cloud. This
cloud-delivered model for firewalls is also reffered as FAAS =
Firewall as a Service
We are discussing HARDWARE FIREWALL in following slides.
Position of a hardware firewall

More Related Content

What's hot

Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
Intruders
IntrudersIntruders
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 

What's hot (20)

Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Intruders
IntrudersIntruders
Intruders
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Data protection and security

IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
Information security
Information securityInformation security
Information security
IshaRana14
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
himanshuratnama
 
Cyber security
Cyber security Cyber security
Cyber security
ankit yadav
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 

Similar to Data protection and security (20)

IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
cyber security
cyber security cyber security
cyber security
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Computer security and
Computer security andComputer security and
Computer security and
 
Information security
Information securityInformation security
Information security
 
презентация1
презентация1презентация1
презентация1
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 

Data protection and security

  • 1. Data Protection and Security NAZAR K A Deputy Manager ITI Limited Contact: 9400568432 Nazarka_pkd@itiltd.co.in
  • 2. DATA and INFORMATION DATA : A collection of unorganized facts has no meaning of its own. ( Numbers , Symbols , Characters , Audio or Vidio clips..etc) INFORMATION: Processed data having some meaning and it is useful for decision making. Example. Marklist of astudent , Rank list of a class or University PROCESS DATA INFORMATION
  • 3. CIAand UA Confidentiality : Data able to access only to authorized users Integrity : Data integrity should be ensured Availability : Data must be available to intended users at allowed time Authenticity : Authenticity of a user should be verified before accessing data. Utility : Data should have the intended utility.
  • 4. Data Protection and Security • Data protection is the process of safeguarding important data from corruption, compromise or loss and providing the capability to restore the data to a functional state should something happen to data as inaccessible or unusable.. • Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms. Both are same in some point, by data security we can achieve data protection.
  • 5. Data protection •RAID •Data Backup and Restoration •Cloud backup •Disaster Recovery Station
  • 6. Data security & Data breaches Data is the most valuable asset for any business. No matter what industry you are in, it’s critical to take care of your data, whether it is financial reports, healthcare records or a start-up business plan following are the way data breaches occures • Cyberattacks in which hackers bypass your security technologies and get into your important software or your security platform • Theft or loss of devices containing protected information • Data theft by employees or other internal users, such as contractors or partners • Human errors such as accidentally sending sensitive data to someone unauthorized to see it
  • 7. MALWARE Malware = MALicious + soft WARE Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
  • 8. Types of Malware • viruses : Malicious program without our consent •Worm. : Hide and replicate fast from PC to PC •Trojan : Destroy our computer systems •Ransomware : Restrict our access to PC •Rootkits : Give unauthorized access to our PC •Adware : Popup annoying advertisments •Spyware : Will record and sent our activity in PC
  • 9. Cyber attack •A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch a cyber attack that includes malware, phishing, ransomware, man-in-the-middle attack, or other methods.
  • 10. AntiVirus •What is Anti Virus? Antivirus is a kind of software used to prevent, scan, detect and delete viruses and other kinds of malicious software from your computer or laptop. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.
  • 11. Hacking =Unauthorized Computer Access Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. The access to a password is obtained by the hacker through password cracking algorithms programs. Just like any thief, a hacker will choose the most vulnerable targets they can find. But instead of using physical tool, they use software to steal your personal data.
  • 12. What Hackers are Looking For Personally Identifiable Information (PII) are pieces of information like User name and Password to enable intrude in your system in order to commit fraud, identity theft, and other financially damaging crimes against you It is like a tool used by thief to enter your house through vulnerable spot.
  • 13. What is Firewall • A firewall can be defined as a special type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a defined set of security rules. It acts as a barrier between internal private networks and external sources (such as the public Internet). • The primary purpose of a firewall is to allow non-threatening traffic and prevent malicious or unwanted data traffic for protecting the computer from viruses and attacks. A firewall is a cybersecurity tool that filters network traffic and helps users block malicious software from accessing the Internet in infected computers.
  • 14. Why Firewall • Firewalls are primarily used to prevent malware and network-based attacks. Additionally, they can help in blocking application-layer attacks. These firewalls act as a gatekeeper or a barrier. They monitor every attempt between our computer and another network. They do not allow data packets to be transferred through them unless the data is coming or going from a user-specified trusted source. • Firewalls are designed in such a way that they can react quickly to detect and counter-attacks throughout the network. They can work with rules configured to protect the network and perform quick assessments to find any suspicious activity. In short, we can point to the firewall as a traffic controller.
  • 15. Firewall Types 1. HARDWARE FIREWALL : A Special device placed in between internal network LAN and Gate way to external network WAN 2. SOFTWARE FIREWALL : Software program in the computer for not allowing data traffic from undesired sites and locations. 3. Cloud Based Firewall : cloud firewalls are hosted in the cloud. This cloud-delivered model for firewalls is also reffered as FAAS = Firewall as a Service We are discussing HARDWARE FIREWALL in following slides.
  • 16. Position of a hardware firewall