SECURITIES
Computer security, cyber
security or information technology
security (IT security) is the protection
of computersystems and networks fr
om information disclosure, theft of or
damage to their hardware, software,
or electronic data, as well as from
the disruption or misdirection of the
services they provide.
Cyber system:
It is the combination of all
the resources that provides
cyber services. Resources
can be any facility,
equipment, procedures and
communications.
System security:
A computer system has many numbers of
security threads. The main objective of the
system security is to provide protection of
information. It also includes the
development of security measures.
There are some most common security
threads
Malware: it can be treated as malware software. It
contains disturbing or annoying software or program
code. It can be any virus, spyware or malicious root kit.
Virus: the virus can spread from one computer to
another with the help of email, file or software. It can
delete, corrupt or modify your complete data.
Trojan: it is a type of malware. It is designed to
damage or steals your information from your system. A
Trojan can do anything inside your system.
Spam: it refers to the spamming. In
the case of security spam used to define email
spam. Spam messages can contain infected
links that can harm your system.
Network security
Is a broad term. It is the set of
rules and procedures to protect
the network. In simple terms it is
the process of adopting security
measures related to physical and
software, to protect the network
infrastructure from unauthorized
activity.
Types of Network
security
It is important for all organization and small
businesses to protect their network from
attackers and hackers. Following are the types of
network securities.
Network access control: to ensure the network
security, access control should be limited or to be
given only authorized members. For example, you
could grant administrators complete access but
refuse to access some important file and folders.
Antivirus/malware: Use some best antivirus and anti-
malware software that will protect the network from
worms, Trojans and Ran some wares
Firewall: it is a network security system to protect the network from all
unauthorized activity. It permits or blocks the traffic according to the defined set of
rules. It can be a software utility or hardware device that acts as a filter for all
incoming traffic and connections.
Email security: attackers use personal information then create a phishing
campaign to deceive recipients. Email security is required for controlling these
types of phishing emails in order to prevent the loss of sensitive data
.
Application security: application security is very important because
attackers can enter into your network by using the weaknesses or holes of the
application. It is possible for any application to incorporates the software and
hardware you select for removing those holes and weaknesses.
VPN: It stands for the virtual private network. It provides network security by
encrypting the connection from an endpoint to network. It is another type of
network security which uses IP sec or secure sockets in remote-access VPN. It is
used for authenticating the communication between user and device
.
Wireless security: wireless networks are less secure than wired networks. It
is easy to break wireless network so the wireless security must be strong enough.
Use only that devices that provide the best security to the wireless network.
Why is Cyber Security Important
for Companies Today?
Often some organizations take their data security lightly and
as a result, they fall victim to cyber attacks. In fact, our
companies are still not immune to these evolving cyber
attacks. But thanks to these fast-developing technology
standards today, cyber security has become a priority for
every organization across the world.
Think you are secure online? Think again!
It is a serious matter of how cyber attacks are
shaping in every form possible in order to stay one
step ahead of the development in technology.
Phishing, ransom ware, cyber scams are some of
the common yet highly dangerous cyber attacks that
are designed with the motive to access and exploit
the user’s sensitive data and extort money out of it.
•Rise of Cyber Crimes
Be it a large scale or a small scale firm, hackers and cyber criminals spare
no one. Rather, they lookout for opportunities to exploit data and get money
out of these firms. Over the past year, the average cost of cyber crime for
an organization has increased 23% more than last year. With the
introduction of new technologies, the chances of cyber threats and risks are
also rapidly increasing
•Growth of Iot Devices
The introduction of Iot technology i.e. Internet of Things, has not only
simplified and speed up our tasks but has also created a pit of new
vulnerabilities for hackers to exploit. No matter how advanced security
measures we take, Cyber criminals will always stay one step ahead to
attempt cyber crimes. If these internet-connected devices are not managed
properly then they can provide a gateway to business to hackers or cyber
criminals!
•Bridge to Security Gap
Human resources and IT resources have always been one of the
most important aspects of any organization. Regardless of their
dependency on each other, there has always been a security gap
between both aspects. In order to bridge this gap, it is important to
provide individuals working in an organization with the right cyber
security awareness training. Training for employees is necessary to
bridge the gap of cyber security skills and to create a cyber-resilient
working culture in the organization.
Well, now you know why bridging the security gap is important!
ForensicsffFORENSICS
Forensic science is a combination of forensics and science. It means
applying scientific methods, tools and procedures for solving the
crime. The “forensic” word comes from the Latin word that means
public. Forensic science is a science used in public, in court or in the
justice system.
Applications of forensic science
•Inspection of physical evidence
•Clear and short reporting
•Understanding of data
•Management of tests
Forensic science is further classified:
•Forensic toxicology
•Forensic geology
•Forensic Botany
•Forensic DNA analysis
•Digital Forensic
•Forensic pathology
•Forensic archaeology
•Forensic podiatry
Forensics science can be a challenging task for new students because it has a very vast area. It covers many
subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as
mathematics.

ppt on securities.pptx

  • 1.
  • 2.
    Computer security, cyber securityor information technology security (IT security) is the protection of computersystems and networks fr om information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  • 3.
    Cyber system: It isthe combination of all the resources that provides cyber services. Resources can be any facility, equipment, procedures and communications. System security: A computer system has many numbers of security threads. The main objective of the system security is to provide protection of information. It also includes the development of security measures.
  • 4.
    There are somemost common security threads Malware: it can be treated as malware software. It contains disturbing or annoying software or program code. It can be any virus, spyware or malicious root kit. Virus: the virus can spread from one computer to another with the help of email, file or software. It can delete, corrupt or modify your complete data. Trojan: it is a type of malware. It is designed to damage or steals your information from your system. A Trojan can do anything inside your system. Spam: it refers to the spamming. In the case of security spam used to define email spam. Spam messages can contain infected links that can harm your system.
  • 5.
    Network security Is abroad term. It is the set of rules and procedures to protect the network. In simple terms it is the process of adopting security measures related to physical and software, to protect the network infrastructure from unauthorized activity.
  • 6.
    Types of Network security Itis important for all organization and small businesses to protect their network from attackers and hackers. Following are the types of network securities. Network access control: to ensure the network security, access control should be limited or to be given only authorized members. For example, you could grant administrators complete access but refuse to access some important file and folders. Antivirus/malware: Use some best antivirus and anti- malware software that will protect the network from worms, Trojans and Ran some wares
  • 7.
    Firewall: it isa network security system to protect the network from all unauthorized activity. It permits or blocks the traffic according to the defined set of rules. It can be a software utility or hardware device that acts as a filter for all incoming traffic and connections. Email security: attackers use personal information then create a phishing campaign to deceive recipients. Email security is required for controlling these types of phishing emails in order to prevent the loss of sensitive data . Application security: application security is very important because attackers can enter into your network by using the weaknesses or holes of the application. It is possible for any application to incorporates the software and hardware you select for removing those holes and weaknesses. VPN: It stands for the virtual private network. It provides network security by encrypting the connection from an endpoint to network. It is another type of network security which uses IP sec or secure sockets in remote-access VPN. It is used for authenticating the communication between user and device . Wireless security: wireless networks are less secure than wired networks. It is easy to break wireless network so the wireless security must be strong enough. Use only that devices that provide the best security to the wireless network.
  • 8.
    Why is CyberSecurity Important for Companies Today? Often some organizations take their data security lightly and as a result, they fall victim to cyber attacks. In fact, our companies are still not immune to these evolving cyber attacks. But thanks to these fast-developing technology standards today, cyber security has become a priority for every organization across the world.
  • 9.
    Think you aresecure online? Think again! It is a serious matter of how cyber attacks are shaping in every form possible in order to stay one step ahead of the development in technology. Phishing, ransom ware, cyber scams are some of the common yet highly dangerous cyber attacks that are designed with the motive to access and exploit the user’s sensitive data and extort money out of it.
  • 10.
    •Rise of CyberCrimes Be it a large scale or a small scale firm, hackers and cyber criminals spare no one. Rather, they lookout for opportunities to exploit data and get money out of these firms. Over the past year, the average cost of cyber crime for an organization has increased 23% more than last year. With the introduction of new technologies, the chances of cyber threats and risks are also rapidly increasing •Growth of Iot Devices The introduction of Iot technology i.e. Internet of Things, has not only simplified and speed up our tasks but has also created a pit of new vulnerabilities for hackers to exploit. No matter how advanced security measures we take, Cyber criminals will always stay one step ahead to attempt cyber crimes. If these internet-connected devices are not managed properly then they can provide a gateway to business to hackers or cyber criminals!
  • 11.
    •Bridge to SecurityGap Human resources and IT resources have always been one of the most important aspects of any organization. Regardless of their dependency on each other, there has always been a security gap between both aspects. In order to bridge this gap, it is important to provide individuals working in an organization with the right cyber security awareness training. Training for employees is necessary to bridge the gap of cyber security skills and to create a cyber-resilient working culture in the organization. Well, now you know why bridging the security gap is important!
  • 12.
    ForensicsffFORENSICS Forensic science isa combination of forensics and science. It means applying scientific methods, tools and procedures for solving the crime. The “forensic” word comes from the Latin word that means public. Forensic science is a science used in public, in court or in the justice system. Applications of forensic science •Inspection of physical evidence •Clear and short reporting •Understanding of data •Management of tests Forensic science is further classified: •Forensic toxicology •Forensic geology •Forensic Botany •Forensic DNA analysis •Digital Forensic •Forensic pathology •Forensic archaeology •Forensic podiatry Forensics science can be a challenging task for new students because it has a very vast area. It covers many subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as mathematics.