Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Cyber Security.pptx
1. HIMALAYAN GROUP OF PROFESSIONAL
INSTITUTIONS
TOPIC : CYBER SECURITY
BY : MISS ANUSHKA THAKUR
2. Wishing you a very Happy
Engineer’s Day
ENGINEERS ARE THE FUTURE OF THE NATION
3. INDEX
Introduction of Cyber Security
Components of Cyber Security
Types of Cyber Security
About India
Advantages of Cyber Security
Benefits of Cyber Security Awareness Training
Challenges of Cyber Security
Cyber security tips
4. INTRODUCTION
Cyber security is the practice of
defending computers, servers,
mobile devices, electronic
systems, networks, and data from
malicious attacks.
It's also known as information
technology security or electronic
information security.
5. COMPONENTS OF CYBER SECURITY
Processes
This is how you or any organization responds to attacks, whether just attempted or successful. It
helps guide on how to identify them, protect yourself against them, recover from them, and prevent
them altogether. For organization, this is captured in the ICT Policies and Business Continuity
Plan/Process (BCPs).
Technology
Technology is the sword/ shield you wield against cyberattacks. It is part of the processes. These are
the various tools you will make use of in mitigating attacks. This can be at the device level, at the
network level, or for cloud infrastructure. Antivirus software, firewalls, Intrusion Detection, and
Intrusion Prevention Systems (IPS & IDS), and DNS Filters all are examples of technology.
Users
The first two components heavily rely on this one. Users, even with the best-formulated processes
and bleeding-edge technology, can easily self-sabotage and make all that moot. The basics are
essential: strong and unique passwords, not exposing those passwords, checking email addresses,
watching out for fishy attachments, and regular backups. Having a 26-character password is useless
if it is written down on a real or virtual sticky note on your real or virtual desktop.
7. TTTTT
1. Application Security: The use of both software and hardware to ensure that applications are
protected from external threats, even when in development. Applications require constant updates
to stay up to date with any potential threats. Bugs and loopholes can be exploited to devastating
effect.
2. Information Security: InfoSec refers to protecting your data or the data belonging to clients
whether stored or in transit. It involves protecting data in any form, digital or otherwise, from
(unrestricted) access, manipulation, destruction, or disclosure/ distribution. In short, data availability,
privacy, and confidentiality.
3. Operational Security: These are the processes involved when dealing with data security. Handling,
access permissions, networking, data transmission, and data storage.
4. Network Security: This all the processes involved in ensuring that the network is protected from
unauthorized access and external intrusions. A secure networking infrastructure ensures that the
internal network (internet) remains uncompromised.
5. Endpoint Security: While remote access is a necessary component of workflows and business
models nowadays, endpoint security ensures that it does not become a liability. Endpoint devices
are ‘easier’ targets especially if the users are not sensitized to the risks and necessary cautionary
steps.
8. 6. Identity Management: Issuing rights and system access needs to be a well-document
and closely-monitored process. At all times, all user access levels should be monitored
and logged, with 2-step security measures employed to prevent impersonator access.
7. Disaster Recovery/ BCP: Business Continuity Plans (BCPs) are policies that stipulate
the course of action in the event of an attack and/ or loss of data. This includes setting
up off-premise sites for regular backups and to reduce the impact of attacks on
business continuity.
8. End-user Education: The strength of a robust cybersecurity system is only as strong as
the weakest entry point. Users must be educated on cybersecurity best practices like
regular password change, two-factor authentication, and using VPNs when connecting
remotely.
9. Infrastructure Security: This covers the physical aspects of computer infrastructure like
a well-regulated power delivery system, good physical security, fire extinguishers, and
the like.
10. Cloud Security: Cloud services are being incorporated into more business models
and as such, need to be well configured to prevent any successful attacks.
9. CYBER SECURITY IN INDIA
The United Nations ITU Global Cybersecurity
Agenda has placed India in 10th
place according to the Cyber Security
Ranking of Countries from its previous rank
of 47.
Cyber Security in India is a growing concern
and India has already started working
towards the common goal of protecting
national assets. India has also started to plan
and implement a newer and more improved
Cyber Security Policy by 2022 as the 2013
National Cyber Security Policy and IT Act of
2008 have started to get outclassed by the
advent of more modern hacking methods
and malware.
10. INIA IS IN THE 11TH PLACE IN CYBER CRIME ALL
OVER THE WORLD.
11.
12. ADVANTAGES
Evade loss of crucial data .
Valuable information protection .
Risk mitigation .
Recovery time is improved .
Privacy of customer and employee is ensured .
Increase productivity by avoiding website to go down .
Internet security process all the incoming and outgoing
data on our computer .
14. CHALLENGES OF CYBER SECURITY IN INDIA
One of the most important challenges of India’s cyber security challenges is the fact that there is a
huge lack of uniformity in the kinds of devices that are used to access the internet. This makes it very
hard for technical and legal standards to be set to protect devices and data using government
regulations.
The second challenge is a huge lack of centralized national-level cyber security architecture. India
already has the means to protect critical infrastructure such as the Indian Army’s digital assets,
however, this is not centralized enough to protect the entire country.
There is no end to the possibilities of an attack and the kinds of attacks that can be carried out.
Cyber security attacks can occur at any time and from anywhere. The threat can be of any form and
new vulnerabilities are discovered on a daily basis to compromise the security of systems. This makes
it hard to keep up and incorporate the perfect system that is necessary currently.
Finally, there is an enormous lack of awareness as a National cyber security regulatory policy does
not exist for individuals. Corporations and companies already have and follow all these regulations,
yes, but there should be a supervised framework that must be followed by common internet users as
well.
15. CYBER SAFETY TIPS
1. Update your software and operating system.
2. Use anti-virus software.
3. Use strong passwords.
4. Do not open email attachments from
unknown senders.
5. Do not click on links in emails from unknown
senders or unfamiliar websites.
6. Avoid using unsecure WiFi networks in
public places.