SlideShare a Scribd company logo
1 of 17
HIMALAYAN GROUP OF PROFESSIONAL
INSTITUTIONS
TOPIC : CYBER SECURITY
BY : MISS ANUSHKA THAKUR
Wishing you a very Happy
Engineer’s Day
ENGINEERS ARE THE FUTURE OF THE NATION
INDEX
 Introduction of Cyber Security
 Components of Cyber Security
 Types of Cyber Security
 About India
 Advantages of Cyber Security
 Benefits of Cyber Security Awareness Training
Challenges of Cyber Security
 Cyber security tips
INTRODUCTION
 Cyber security is the practice of
defending computers, servers,
mobile devices, electronic
systems, networks, and data from
malicious attacks.
 It's also known as information
technology security or electronic
information security.
COMPONENTS OF CYBER SECURITY
 Processes
This is how you or any organization responds to attacks, whether just attempted or successful. It
helps guide on how to identify them, protect yourself against them, recover from them, and prevent
them altogether. For organization, this is captured in the ICT Policies and Business Continuity
Plan/Process (BCPs).
 Technology
Technology is the sword/ shield you wield against cyberattacks. It is part of the processes. These are
the various tools you will make use of in mitigating attacks. This can be at the device level, at the
network level, or for cloud infrastructure. Antivirus software, firewalls, Intrusion Detection, and
Intrusion Prevention Systems (IPS & IDS), and DNS Filters all are examples of technology.
 Users
The first two components heavily rely on this one. Users, even with the best-formulated processes
and bleeding-edge technology, can easily self-sabotage and make all that moot. The basics are
essential: strong and unique passwords, not exposing those passwords, checking email addresses,
watching out for fishy attachments, and regular backups. Having a 26-character password is useless
if it is written down on a real or virtual sticky note on your real or virtual desktop.
TYPES OF CYBER
SECURITY
TTTTT
1. Application Security: The use of both software and hardware to ensure that applications are
protected from external threats, even when in development. Applications require constant updates
to stay up to date with any potential threats. Bugs and loopholes can be exploited to devastating
effect.
2. Information Security: InfoSec refers to protecting your data or the data belonging to clients
whether stored or in transit. It involves protecting data in any form, digital or otherwise, from
(unrestricted) access, manipulation, destruction, or disclosure/ distribution. In short, data availability,
privacy, and confidentiality.
3. Operational Security: These are the processes involved when dealing with data security. Handling,
access permissions, networking, data transmission, and data storage.
4. Network Security: This all the processes involved in ensuring that the network is protected from
unauthorized access and external intrusions. A secure networking infrastructure ensures that the
internal network (internet) remains uncompromised.
5. Endpoint Security: While remote access is a necessary component of workflows and business
models nowadays, endpoint security ensures that it does not become a liability. Endpoint devices
are ‘easier’ targets especially if the users are not sensitized to the risks and necessary cautionary
steps.
6. Identity Management: Issuing rights and system access needs to be a well-document
and closely-monitored process. At all times, all user access levels should be monitored
and logged, with 2-step security measures employed to prevent impersonator access.
7. Disaster Recovery/ BCP: Business Continuity Plans (BCPs) are policies that stipulate
the course of action in the event of an attack and/ or loss of data. This includes setting
up off-premise sites for regular backups and to reduce the impact of attacks on
business continuity.
8. End-user Education: The strength of a robust cybersecurity system is only as strong as
the weakest entry point. Users must be educated on cybersecurity best practices like
regular password change, two-factor authentication, and using VPNs when connecting
remotely.
9. Infrastructure Security: This covers the physical aspects of computer infrastructure like
a well-regulated power delivery system, good physical security, fire extinguishers, and
the like.
10. Cloud Security: Cloud services are being incorporated into more business models
and as such, need to be well configured to prevent any successful attacks.
CYBER SECURITY IN INDIA
The United Nations ITU Global Cybersecurity
Agenda has placed India in 10th
place according to the Cyber Security
Ranking of Countries from its previous rank
of 47.
Cyber Security in India is a growing concern
and India has already started working
towards the common goal of protecting
national assets. India has also started to plan
and implement a newer and more improved
Cyber Security Policy by 2022 as the 2013
National Cyber Security Policy and IT Act of
2008 have started to get outclassed by the
advent of more modern hacking methods
and malware.
INIA IS IN THE 11TH PLACE IN CYBER CRIME ALL
OVER THE WORLD.
ADVANTAGES
Evade loss of crucial data .
Valuable information protection .
Risk mitigation .
Recovery time is improved .
Privacy of customer and employee is ensured .
Increase productivity by avoiding website to go down .
Internet security process all the incoming and outgoing
data on our computer .
BENEFITS OF SECURITY AWARENESS TRAINING
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
CHALLENGES OF CYBER SECURITY IN INDIA
One of the most important challenges of India’s cyber security challenges is the fact that there is a
huge lack of uniformity in the kinds of devices that are used to access the internet. This makes it very
hard for technical and legal standards to be set to protect devices and data using government
regulations.
The second challenge is a huge lack of centralized national-level cyber security architecture. India
already has the means to protect critical infrastructure such as the Indian Army’s digital assets,
however, this is not centralized enough to protect the entire country.
There is no end to the possibilities of an attack and the kinds of attacks that can be carried out.
Cyber security attacks can occur at any time and from anywhere. The threat can be of any form and
new vulnerabilities are discovered on a daily basis to compromise the security of systems. This makes
it hard to keep up and incorporate the perfect system that is necessary currently.
Finally, there is an enormous lack of awareness as a National cyber security regulatory policy does
not exist for individuals. Corporations and companies already have and follow all these regulations,
yes, but there should be a supervised framework that must be followed by common internet users as
well.
CYBER SAFETY TIPS
1. Update your software and operating system.
2. Use anti-virus software.
3. Use strong passwords.
4. Do not open email attachments from
unknown senders.
5. Do not click on links in emails from unknown
senders or unfamiliar websites.
6. Avoid using unsecure WiFi networks in
public places.
DF
TTTTTT
Cyber Security.pptx

More Related Content

Similar to Cyber Security.pptx

Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfCareerera
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................MuhammadKhalil858111
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxInfosectrain3
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxInfosectrain3
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxinfosec train
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 

Similar to Cyber Security.pptx (20)

Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 

Recently uploaded

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 

Recently uploaded (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Cyber Security.pptx

  • 1. HIMALAYAN GROUP OF PROFESSIONAL INSTITUTIONS TOPIC : CYBER SECURITY BY : MISS ANUSHKA THAKUR
  • 2. Wishing you a very Happy Engineer’s Day ENGINEERS ARE THE FUTURE OF THE NATION
  • 3. INDEX  Introduction of Cyber Security  Components of Cyber Security  Types of Cyber Security  About India  Advantages of Cyber Security  Benefits of Cyber Security Awareness Training Challenges of Cyber Security  Cyber security tips
  • 4. INTRODUCTION  Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.  It's also known as information technology security or electronic information security.
  • 5. COMPONENTS OF CYBER SECURITY  Processes This is how you or any organization responds to attacks, whether just attempted or successful. It helps guide on how to identify them, protect yourself against them, recover from them, and prevent them altogether. For organization, this is captured in the ICT Policies and Business Continuity Plan/Process (BCPs).  Technology Technology is the sword/ shield you wield against cyberattacks. It is part of the processes. These are the various tools you will make use of in mitigating attacks. This can be at the device level, at the network level, or for cloud infrastructure. Antivirus software, firewalls, Intrusion Detection, and Intrusion Prevention Systems (IPS & IDS), and DNS Filters all are examples of technology.  Users The first two components heavily rely on this one. Users, even with the best-formulated processes and bleeding-edge technology, can easily self-sabotage and make all that moot. The basics are essential: strong and unique passwords, not exposing those passwords, checking email addresses, watching out for fishy attachments, and regular backups. Having a 26-character password is useless if it is written down on a real or virtual sticky note on your real or virtual desktop.
  • 7. TTTTT 1. Application Security: The use of both software and hardware to ensure that applications are protected from external threats, even when in development. Applications require constant updates to stay up to date with any potential threats. Bugs and loopholes can be exploited to devastating effect. 2. Information Security: InfoSec refers to protecting your data or the data belonging to clients whether stored or in transit. It involves protecting data in any form, digital or otherwise, from (unrestricted) access, manipulation, destruction, or disclosure/ distribution. In short, data availability, privacy, and confidentiality. 3. Operational Security: These are the processes involved when dealing with data security. Handling, access permissions, networking, data transmission, and data storage. 4. Network Security: This all the processes involved in ensuring that the network is protected from unauthorized access and external intrusions. A secure networking infrastructure ensures that the internal network (internet) remains uncompromised. 5. Endpoint Security: While remote access is a necessary component of workflows and business models nowadays, endpoint security ensures that it does not become a liability. Endpoint devices are ‘easier’ targets especially if the users are not sensitized to the risks and necessary cautionary steps.
  • 8. 6. Identity Management: Issuing rights and system access needs to be a well-document and closely-monitored process. At all times, all user access levels should be monitored and logged, with 2-step security measures employed to prevent impersonator access. 7. Disaster Recovery/ BCP: Business Continuity Plans (BCPs) are policies that stipulate the course of action in the event of an attack and/ or loss of data. This includes setting up off-premise sites for regular backups and to reduce the impact of attacks on business continuity. 8. End-user Education: The strength of a robust cybersecurity system is only as strong as the weakest entry point. Users must be educated on cybersecurity best practices like regular password change, two-factor authentication, and using VPNs when connecting remotely. 9. Infrastructure Security: This covers the physical aspects of computer infrastructure like a well-regulated power delivery system, good physical security, fire extinguishers, and the like. 10. Cloud Security: Cloud services are being incorporated into more business models and as such, need to be well configured to prevent any successful attacks.
  • 9. CYBER SECURITY IN INDIA The United Nations ITU Global Cybersecurity Agenda has placed India in 10th place according to the Cyber Security Ranking of Countries from its previous rank of 47. Cyber Security in India is a growing concern and India has already started working towards the common goal of protecting national assets. India has also started to plan and implement a newer and more improved Cyber Security Policy by 2022 as the 2013 National Cyber Security Policy and IT Act of 2008 have started to get outclassed by the advent of more modern hacking methods and malware.
  • 10. INIA IS IN THE 11TH PLACE IN CYBER CRIME ALL OVER THE WORLD.
  • 11.
  • 12. ADVANTAGES Evade loss of crucial data . Valuable information protection . Risk mitigation . Recovery time is improved . Privacy of customer and employee is ensured . Increase productivity by avoiding website to go down . Internet security process all the incoming and outgoing data on our computer .
  • 13. BENEFITS OF SECURITY AWARENESS TRAINING . . . . . . . . . . . . . . . . . .
  • 14. CHALLENGES OF CYBER SECURITY IN INDIA One of the most important challenges of India’s cyber security challenges is the fact that there is a huge lack of uniformity in the kinds of devices that are used to access the internet. This makes it very hard for technical and legal standards to be set to protect devices and data using government regulations. The second challenge is a huge lack of centralized national-level cyber security architecture. India already has the means to protect critical infrastructure such as the Indian Army’s digital assets, however, this is not centralized enough to protect the entire country. There is no end to the possibilities of an attack and the kinds of attacks that can be carried out. Cyber security attacks can occur at any time and from anywhere. The threat can be of any form and new vulnerabilities are discovered on a daily basis to compromise the security of systems. This makes it hard to keep up and incorporate the perfect system that is necessary currently. Finally, there is an enormous lack of awareness as a National cyber security regulatory policy does not exist for individuals. Corporations and companies already have and follow all these regulations, yes, but there should be a supervised framework that must be followed by common internet users as well.
  • 15. CYBER SAFETY TIPS 1. Update your software and operating system. 2. Use anti-virus software. 3. Use strong passwords. 4. Do not open email attachments from unknown senders. 5. Do not click on links in emails from unknown senders or unfamiliar websites. 6. Avoid using unsecure WiFi networks in public places.