SlideShare a Scribd company logo
Security in IT (Data and
Cyber Security)
 Type of security in IT
 What is a data security
 Why is data security is important
 various services that data security presents
 Important protecting Type of data security
 What is Cyber security
 Why is cyber security important
 Anonymous
 Important features of cyber security
 Computer Security is concerned with four main areas
 Cyber security application
2
Outline
Data security
Cyber security
3
Two type of security in IT
What is Data security
4
 data security is the practice of keeping data
protected from corruption and unauthorized access.
The focus behind data security is to ensure privacy
while protecting personal or corporate data.
Client information, payment information, personal
files, bank account details - all of this information can
be hard to replace and potentially dangerous if it falls
into the wrong hands. Data lost due to disasters such
as a flood or fire is crushing, but losing it to hackers
or a malware infection can have much greater
consequences.
5
Why is Data security important
Risk analysis
Business continuity plan
Security policy
Incident response
6
various services that data security
presents
Establish strong passwords
 Put up a strong firewall
Install antivirus protection
Update your programs regularly
Backup regularly
Monitor diligently
Be careful with e-mail, IM and surfing the Web
Educate your employees
7
Important protecting Type of data
security
Cyber security is the body of
technologies, processes and
practices designed to protect
networks, computers, programs
and data from attack, damage or
unauthorized access.
In a computing context, the
term security implies cyber
security.
8
What is Cyber security
The increasing volume and sophistication of cyber
security threats–including targeting phishing scams,
data theft, and other online vulnerabilities–demand
that we remain vigilant about securing our systems
and information.
9
Why is cyber security important
10
Information Assurance
Privacy Solutions
Compliance
Audit in Visibility
Threat & Vulnerability Assessment
Plans of Action with Milestones(POA&M)
Security Operations Center
11
Important features of cyber security
 Confidentiality:-
Data is only accessed by those with the right to view
the data.
 Integrity:-
Data can be relied upon to be accurate and processed
correctly.
Availability:-
Data should be available to users when needed.
 Authentication:-
are you really communicating with whom you think
you are communicating with
12
Computer Security is concerned with four
main areas:
Secure Email
Prevent tampering of email content, prove message
origin, prevent exposure of email content with
encryption, flexible and secure communication.
Seamlessly integrates with your email clients and
web hosted email applications.
Smart Cards
Enforces Multi-Factor Authentication usually for physical
access control, i.e. opening doors and logging on to
computers. In manufacturing or utilities operations a
typical use is turning on a manufacturing line or a power
station.
Code Signing
Securing your software development process
ensures that your process is being protected and
that the software running on your servers, cloud
and end users cannot be tampered with.
13
Cyber security application
http://www.entrepreneur.com/article/217484
http://www.contrib.andrew.cmu.edu/~aishah/Sec.html
http://www.sio2corp.com/cyber-security-applications/
http:// www.spamlaws.com/data-security.html
14
References
Thank you!
15

More Related Content

What's hot

Information security
Information securityInformation security
Lesson 3
Lesson 3Lesson 3
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
Asst.prof M.Gokilavani
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
Dr. Ramkumar Lakshminarayanan
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Information security
Information securityInformation security
Information security
AlaaMahmoud108
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
MLG College of Learning, Inc
 
Cyber security
Cyber securityCyber security
Cyber security
Akdu095
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 

What's hot (20)

Information security
Information securityInformation security
Information security
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security management
Information security managementInformation security management
Information security management
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Information security
Information securityInformation security
Information security
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 

Viewers also liked

Ba1a115e (2)
Ba1a115e (2)Ba1a115e (2)
Ba1a115e (2)
Sırma Nilhan Yeles
 
The Simpsons
The SimpsonsThe Simpsons
The Simpsons
guiks4
 
Compétition Dacia ISCOM recommandation
Compétition Dacia ISCOM recommandationCompétition Dacia ISCOM recommandation
Compétition Dacia ISCOM recommandation
Claire Beroni
 
AJW_LinkedIn
AJW_LinkedInAJW_LinkedIn
Peggy McDaniel
Peggy McDanielPeggy McDaniel
Peggy McDaniel
Peg McDaniel
 
Fatiha
FatihaFatiha
I2NSF updates [ISOC-JP event, 2015/08/27]
I2NSF updates [ISOC-JP event, 2015/08/27]I2NSF updates [ISOC-JP event, 2015/08/27]
I2NSF updates [ISOC-JP event, 2015/08/27]
Takeshi Takahashi
 
Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...
Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...
Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...
Jisc
 
$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...
$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...
$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...
Paul Backer
 

Viewers also liked (10)

Ba1a115e (2)
Ba1a115e (2)Ba1a115e (2)
Ba1a115e (2)
 
The Simpsons
The SimpsonsThe Simpsons
The Simpsons
 
Compétition Dacia ISCOM recommandation
Compétition Dacia ISCOM recommandationCompétition Dacia ISCOM recommandation
Compétition Dacia ISCOM recommandation
 
AJW_LinkedIn
AJW_LinkedInAJW_LinkedIn
AJW_LinkedIn
 
Peggy McDaniel
Peggy McDanielPeggy McDaniel
Peggy McDaniel
 
Fatiha
FatihaFatiha
Fatiha
 
Mater magistra
Mater magistraMater magistra
Mater magistra
 
I2NSF updates [ISOC-JP event, 2015/08/27]
I2NSF updates [ISOC-JP event, 2015/08/27]I2NSF updates [ISOC-JP event, 2015/08/27]
I2NSF updates [ISOC-JP event, 2015/08/27]
 
Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...
Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...
Leveraging change through digital capability - Esther Barrett, Geoff Elliott,...
 
$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...
$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...
$60 Billion in US Extraterritorial Enforcement, Lecture Slides, Hong Kong, Fa...
 

Similar to Security in it

Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
SharmaAnirudh2
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
arjunnegi34
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
Vograce
 
Introduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdfIntroduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdf
Naruto103394
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
online Marketing
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
AKGVG & ASSOCIATES Chartered Accountants
 
brif enpoint.pptx
brif enpoint.pptxbrif enpoint.pptx
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Secninjaz Technologies LLP
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
malik298381
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Security in it (20)

Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
fundamental of IT Security and what is IT security
fundamental of IT Security and  what is IT securityfundamental of IT Security and  what is IT security
fundamental of IT Security and what is IT security
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
Introduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdfIntroduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdf
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
brif enpoint.pptx
brif enpoint.pptxbrif enpoint.pptx
brif enpoint.pptx
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 

Security in it

  • 1. Security in IT (Data and Cyber Security)
  • 2.  Type of security in IT  What is a data security  Why is data security is important  various services that data security presents  Important protecting Type of data security  What is Cyber security  Why is cyber security important  Anonymous  Important features of cyber security  Computer Security is concerned with four main areas  Cyber security application 2 Outline
  • 4. What is Data security 4  data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
  • 5. Client information, payment information, personal files, bank account details - all of this information can be hard to replace and potentially dangerous if it falls into the wrong hands. Data lost due to disasters such as a flood or fire is crushing, but losing it to hackers or a malware infection can have much greater consequences. 5 Why is Data security important
  • 6. Risk analysis Business continuity plan Security policy Incident response 6 various services that data security presents
  • 7. Establish strong passwords  Put up a strong firewall Install antivirus protection Update your programs regularly Backup regularly Monitor diligently Be careful with e-mail, IM and surfing the Web Educate your employees 7 Important protecting Type of data security
  • 8. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. 8 What is Cyber security
  • 9. The increasing volume and sophistication of cyber security threats–including targeting phishing scams, data theft, and other online vulnerabilities–demand that we remain vigilant about securing our systems and information. 9 Why is cyber security important
  • 10. 10
  • 11. Information Assurance Privacy Solutions Compliance Audit in Visibility Threat & Vulnerability Assessment Plans of Action with Milestones(POA&M) Security Operations Center 11 Important features of cyber security
  • 12.  Confidentiality:- Data is only accessed by those with the right to view the data.  Integrity:- Data can be relied upon to be accurate and processed correctly. Availability:- Data should be available to users when needed.  Authentication:- are you really communicating with whom you think you are communicating with 12 Computer Security is concerned with four main areas:
  • 13. Secure Email Prevent tampering of email content, prove message origin, prevent exposure of email content with encryption, flexible and secure communication. Seamlessly integrates with your email clients and web hosted email applications. Smart Cards Enforces Multi-Factor Authentication usually for physical access control, i.e. opening doors and logging on to computers. In manufacturing or utilities operations a typical use is turning on a manufacturing line or a power station. Code Signing Securing your software development process ensures that your process is being protected and that the software running on your servers, cloud and end users cannot be tampered with. 13 Cyber security application