Sunteți pe pagina 1din 26

CYBER SECURITY

IS THE BODY OF TECHNOLOGIES PROCESSES AND PRACTICES DESIGNED TO PROTECT

•Networks
•Computers
•Programs
•Data from attack
•Damage
•Unauthorized access

Jatins
1
RISKS OF COMPUTER SECURITY
•Loss or damage to computer hardware
•Software
•Data
• Information
Some breaches to computer security are accidental, but
some are planned. Any illegal act involving a computer is
generally referred to as a computer crime.

Jatins
2
SECURITY SYSTEM

Information systems security is INFOSEC, refers to the


processes and methodologies involved with keeping :
•Information confidential
•Available
•Assuring its integrity
It also refers to: Access controls, which prevent unauthorized
personnel from entering or accessing a system.

Jatins
3
CYBER TECHNOLOGY
Field of technology that deals with the development of:
•Artificial devices
•Machines
•Techniques
•Intelligence
•Components

Jatins
4
Jatins
5
COMPUTER PROTECTION
Virus protection software is designed to prevent
viruses, worms and Trojan horses from getting onto a
computer as well as remove any malicious software
code that has already infected computer.

Jatins
6
Governments, military, corporations, financial institutions, hospitals
and other businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume and
sophistication of cyber attacks, ongoing attention is required to
protect sensitive business and personal information, as well as
safeguard national security.

Jatins
7
AREAS OF CYBER SECURITY
Data in a database or on the file system
Application Security or a system resource

unauthorized access, use, disclosure, disruption,


modification, or destruction in order to provide
Information Security confidentiality, integrity, and availability

Disaster recovery is the area of security planning


Disaster recovery that deals with protecting an organization from
the effects of significant negative events.

policies and practices adopted to prevent and


Network Security monitor unauthorized access, misuse,
modification, or denial of a computer network
and network-accessible resources.

Jatins
8
Identify Threats

Cyber Securities
Weakness

Exploitation of Weakness

Plan to reduce Threats

Protections on Weakness
Jatins
9
SECURE COMPUTER FROM ONLINE
THREATS WHILE SURFING INTERNET

1. Enable windows automatic updates feature

2. Install antivirus software


3. Activate windows firewall

4. Enable pop up blocker of your browser

5. Clean cookies and session data after using internet

6. Be aware from email spam

7. Be aware from phishing and internet frauds

Jatins
10
Jatins
11
COMPUTER SECURITY - THREATS

• Intrusions
– Any attempt to gain unauthorized access to a system
– Cracking
– Hacking
– Social Engineering
– War-driving
WHAT IS CYBERCRIME?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Virus
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
CYBERCRIME COMPONENTS
• Computers

• Cell Phones

• PDA’s

• Game Consoles
COMPUTER SECURITY - TERMINOLOGY
• Script Kiddies
– Someone that calls themselves a ‘hacker’ but really
isn’t

• Ethical Hacker
– Someone hired to hack a system to find vulnerabilities
and report on them.
– Also called a ‘sneaker’
Jatins
16
Allow a program or feature through window Firewall
Setting for each type of Network
Jatins
18
Jatins
19
Jatins
20
Jatins
21
Jatins
22
Jatins
23
Jatins
24
Jatins
25
Jatins
26

S-ar putea să vă placă și