Security in IT (Data and
Cyber Security)
 Type of security in IT
 What is a data security
 Why is data security is important
 various services that data security presents
 Important protecting Type of data security
 What is Cyber security
 Why is cyber security important
 Anonymous
 Important features of cyber security
 Computer Security is concerned with four main areas
 Cyber security application
2
Outline
Data security
Cyber security
3
Two type of security in IT
What is Data security
4
 data security is the practice of keeping data
protected from corruption and unauthorized access.
The focus behind data security is to ensure privacy
while protecting personal or corporate data.
Client information, payment information, personal
files, bank account details - all of this information can
be hard to replace and potentially dangerous if it falls
into the wrong hands. Data lost due to disasters such
as a flood or fire is crushing, but losing it to hackers
or a malware infection can have much greater
consequences.
5
Why is Data security important
Risk analysis
Business continuity plan
Security policy
Incident response
6
various services that data security
presents
Establish strong passwords
 Put up a strong firewall
Install antivirus protection
Update your programs regularly
Backup regularly
Monitor diligently
Be careful with e-mail, IM and surfing the Web
Educate your employees
7
Important protecting Type of data
security
Cyber security is the body of
technologies, processes and
practices designed to protect
networks, computers, programs
and data from attack, damage or
unauthorized access.
In a computing context, the
term security implies cyber
security.
8
What is Cyber security
The increasing volume and sophistication of cyber
security threats–including targeting phishing scams,
data theft, and other online vulnerabilities–demand
that we remain vigilant about securing our systems
and information.
9
Why is cyber security important
10
Information Assurance
Privacy Solutions
Compliance
Audit in Visibility
Threat & Vulnerability Assessment
Plans of Action with Milestones(POA&M)
Security Operations Center
11
Important features of cyber security
 Confidentiality:-
Data is only accessed by those with the right to view
the data.
 Integrity:-
Data can be relied upon to be accurate and processed
correctly.
Availability:-
Data should be available to users when needed.
 Authentication:-
are you really communicating with whom you think
you are communicating with
12
Computer Security is concerned with four
main areas:
Secure Email
Prevent tampering of email content, prove message
origin, prevent exposure of email content with
encryption, flexible and secure communication.
Seamlessly integrates with your email clients and
web hosted email applications.
Smart Cards
Enforces Multi-Factor Authentication usually for physical
access control, i.e. opening doors and logging on to
computers. In manufacturing or utilities operations a
typical use is turning on a manufacturing line or a power
station.
Code Signing
Securing your software development process
ensures that your process is being protected and
that the software running on your servers, cloud
and end users cannot be tampered with.
13
Cyber security application
http://www.entrepreneur.com/article/217484
http://www.contrib.andrew.cmu.edu/~aishah/Sec.html
http://www.sio2corp.com/cyber-security-applications/
http:// www.spamlaws.com/data-security.html
14
References
Thank you!
15

Security in it

  • 1.
    Security in IT(Data and Cyber Security)
  • 2.
     Type ofsecurity in IT  What is a data security  Why is data security is important  various services that data security presents  Important protecting Type of data security  What is Cyber security  Why is cyber security important  Anonymous  Important features of cyber security  Computer Security is concerned with four main areas  Cyber security application 2 Outline
  • 3.
  • 4.
    What is Datasecurity 4  data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
  • 5.
    Client information, paymentinformation, personal files, bank account details - all of this information can be hard to replace and potentially dangerous if it falls into the wrong hands. Data lost due to disasters such as a flood or fire is crushing, but losing it to hackers or a malware infection can have much greater consequences. 5 Why is Data security important
  • 6.
    Risk analysis Business continuityplan Security policy Incident response 6 various services that data security presents
  • 7.
    Establish strong passwords Put up a strong firewall Install antivirus protection Update your programs regularly Backup regularly Monitor diligently Be careful with e-mail, IM and surfing the Web Educate your employees 7 Important protecting Type of data security
  • 8.
    Cyber security isthe body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. 8 What is Cyber security
  • 9.
    The increasing volumeand sophistication of cyber security threats–including targeting phishing scams, data theft, and other online vulnerabilities–demand that we remain vigilant about securing our systems and information. 9 Why is cyber security important
  • 10.
  • 11.
    Information Assurance Privacy Solutions Compliance Auditin Visibility Threat & Vulnerability Assessment Plans of Action with Milestones(POA&M) Security Operations Center 11 Important features of cyber security
  • 12.
     Confidentiality:- Data isonly accessed by those with the right to view the data.  Integrity:- Data can be relied upon to be accurate and processed correctly. Availability:- Data should be available to users when needed.  Authentication:- are you really communicating with whom you think you are communicating with 12 Computer Security is concerned with four main areas:
  • 13.
    Secure Email Prevent tamperingof email content, prove message origin, prevent exposure of email content with encryption, flexible and secure communication. Seamlessly integrates with your email clients and web hosted email applications. Smart Cards Enforces Multi-Factor Authentication usually for physical access control, i.e. opening doors and logging on to computers. In manufacturing or utilities operations a typical use is turning on a manufacturing line or a power station. Code Signing Securing your software development process ensures that your process is being protected and that the software running on your servers, cloud and end users cannot be tampered with. 13 Cyber security application
  • 14.
  • 15.