0% found this document useful (0 votes)
46 views14 pages

Cyber Security

Cybersecurity encompasses technologies and practices aimed at preventing cyberattacks and protecting systems, applications, and sensitive data. The rising costs of data breaches and ransomware highlight the importance of robust cybersecurity measures across various domains, including network, application, and cloud security. The CIA triad—confidentiality, integrity, and availability—serves as the foundational principles for ensuring data security.

Uploaded by

vijeta malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views14 pages

Cyber Security

Cybersecurity encompasses technologies and practices aimed at preventing cyberattacks and protecting systems, applications, and sensitive data. The rising costs of data breaches and ransomware highlight the importance of robust cybersecurity measures across various domains, including network, application, and cloud security. The CIA triad—confidentiality, integrity, and availability—serves as the foundational principles for ensuring data security.

Uploaded by

vijeta malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Dr.

Tej Kaur
Guest Faculty
IFSC
What is it???
• Cybersecurity refers to any technology, measure or practice for
preventing cyberattacks or mitigating their impact.
• Cybersecurity aims to protect individuals’ and organizations’
systems, applications, computing devices, sensitive data and
financial assets against simple and annoying computer viruses,
sophisticated and costly ransomware attacks, and everything in
between.
• Cyber security is the protection of internet-connected systems,
including hardware, software and data, from cyber-attacks.
News….
• Cyberattacks have the power to disrupt, damage or
destroy businesses—and the cost to victims keeps
rising. For example, according to IBM's Cost of a Data
Breach 2023 report,
The average cost of a data breach in 2023 was USD
4.45 million, up 15 percent over the last there years;
The average cost of a ransomware-related data
breach in 2023 was even higher, at USD 5.13 million.
• The information technology (IT) trends of the past few years
the rise in cloud computing adoption, network complexity, remote
work and work from home, bring your own device (BYOD) programs,
and connected devices and sensors in everything from doorbells to cars
to assembly lines

have resulted in tremendous business advantages and human progress,


but have also created exponentially more ways for cybercriminals to
attack.
• Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks,
and data from malicious attacks.
• It's also known as information technology security
or electronic information security.
• The term applies in a variety of contexts, from business
to mobile computing, and can be divided into a few
common categories.
Types of Cybersecurity
A strong cybersecurity strategy protects all relevant IT infrastructure layers or
domains against cyberthreats and cybercrime.

1. Critical infrastructure security

It protects the computer systems, applications, networks, data and


digital assets that a society depends on for national security, economic
health and public safety.
In the United States the National Institute of Standards and Technology
(NIST) has developed a cybersecurity framework to help IT providers in this
area, and the U.S. Department of Homeland Security’ Cybersecurity and
Infrastructure Security Agency (CISA) provides additional guidance.
2. Network security

it prevents unauthorized access to network resources, and


detects and stops cyberattacks and network security breaches in
progress—while at the same time ensuring that authorized users
have secure access to the network resources they need, when
they need them.

3. Endpoint security

Endpoints—servers, desktops, laptops, mobile devices—remain


the primary entry point for cyberattacks. Endpoint security
protects these devices and their users against attacks, and also
protects the network against adversaries who leverage endpoints
to launch attacks.
4. Application security

Application security protects applications running on-


premises and in the cloud, preventing unauthorized
access to and use of applications and related
data, and preventing flaws or vulnerabilities in
application design that hackers can use to infiltrate the
network.
Modern application development methods—i.e. DevOps
and DevSecOps—build security and security testing into
the development process.
5. Cloud security

Cloud security secures an organization’s cloud-based


services and assets—applications, data, storage,
development tools, virtual servers and cloud
infrastructure.
Generally speaking, cloud security operates on the
shared responsibility model: the cloud provider is
responsible for securing the services they deliver and the
infrastructure used to deliver them, while the customer is
responsible for protecting their data, code and other
assets they store or run in the cloud.
6. Information security

Information security (InfoSec) pertains to protection of all


an organization's important information—digital files and
data, paper documents, physical media, even human
speech—against unauthorized access, disclosure, use or
alteration.
Data security, the protection of digital information,
is a subset of information security and the focus of most
cybersecurity-related InfoSec measures.
7. Mobile security

• Mobile security encompasses a number of disciplines


and technologies specific to smartphones and mobile
devices, including mobile application management
(MAM) and enterprise mobility management (EMM).
• More recently, mobile security is available as part of
unified endpoint management (UEM) solutions that
enable configuration and security management for all
endpoints—not just mobile devices but desktop,
laptops, and more) from a single console.
Importance of Cyber Security
• To protect the information from various attacks possible from both
the insiders and outsiders of an information system.
• There are threats online that are impossible for security software to
detect.
• Becoming educated about threats and the best practices against them
will make it immensely harder for a cybercriminal to access your data.
• The first step in defense against data breaches is being aware.
• Monitor your financial accounts on a regular basis.
• change your password semi-annually.
• educate yourself and others about all of the implications of a data
breach and what can be done in the event that you fall victim to one.
CIA TRIAD
• The primary
objective of cyber
security is to protect
data.
• The security
community
commonly refers to a
triangle of three
related principles
that ensure data is
secure, known as the
CIA triad:
• Confidentiality — ensuring sensitive data is only accessible
to those people who actually need it, and are permitted to
access according to organizational policies, while blocking
access to others.

• Integrity — making sure data and systems are not modified


due to actions by threat actors, or accidental modification.
Measures should be taken to prevent corruption or loss of
sensitive data, and to speedily recover from such an event if
it occurs.

• Availability — ensuring that data remains available and


useful for its end-users, and that this access is not hindered
by system malfunction, cyber attacks, or even security
measures themselves.

You might also like