SlideShare una empresa de Scribd logo
1 de 8
Why is Cyber Security Important?
Cyber security is the body of technologies and process which practices
protection of network, computers, data and programs from unauthorized
access, cyber threats, attacks or damages. It deals with controlling physical
access to hardware alongside protecting harm coming via network access
and code injection. The sole purpose of cyber security is to defend the
integrity of computing assets belonging to or connecting to an
organization’s network.
For an attacker, reducing a system’s information assurance become easier,
with an increase in vulnerability. The vulnerability is a term which refers to
flaws in a system that can leave it to open attack.
With vulnerability being on the rise, the necessity of a strong cyber security
infrastructure is self-evident. A proliferation of cyber attacks is causing
increasing damage to companies, governments and individuals. Along with the
increasing number of cyber security attacks, the severity of the same is also on
the rise. They are becoming exponentially destructive and targeting a broad
array of information and attack vendors. These lead to cyber security being
an important Business Continuity Planning (BCP) issue and to
improve the same, a Cyber Security Audit is a great investment.
Around 80% of all cyber accidents are caused by human error. Companies are
spending millions on cyber security awareness programs but what they are
seeking is a more sophisticated program that delivers a quantifiable
and worthwhile return on investment in security awareness.
To prevent vulnerabilities, a holistic and synergic approach is required. And to
achieve that a few necessary steps are to train employees, develop a cyber defense
strategy, prepare and implement a strict security policy, employ intelligence tools
and engage in proactive cyber-security strategy.
 Digital security has turned out to be a standout amongst the most
indispensable components of business security, congruity, and arranging.
Endeavoring to bind a correct definition for it can be hard, regardless of
whether because of considering muddying of the waters by for advertising
activities or because the quick moving nature of the danger scene implies
things are pushed in and out.
 To begin with, digital security isn't the same as information insurance,
which is more worried about protection and how information is utilized,
as opposed to just how secure it is. In spite of the fact that it's anything
but difficult to conflate protection and security, they're altogether
different things. Putting iron bars over a window includes security, yet
does nothing for protection while putting a drapery up has the invert
impact.
 Application security
 Data security
 System security
 Fiasco recuperation/business coherence arranging
 Operational security
 End-client training
NCSA prompts that organizations must be set up to "react to the
inescapable digital episode, reestablish ordinary operations, and
guarantee that organization resources and the organization's notoriety
are secured." NCSA's rules for leading digital hazard appraisals
concentrate on three key territories: recognizing your association's
"crown jewels," or your most important data requiring insurance;
distinguishing the dangers and dangers confronting that data, and
laying out the harm your association would bring about should that
information be lost or wrongfully uncovered. Digital hazard evaluations
ought to likewise consider any directions that affect the way your
organization gathers, stores, and secures information, for example, PCI-
DSS, HIPAA, SOX, FISMA, and others. Following a digital hazard
evaluation, create and actualize an arrangement to alleviate digital
hazard, ensure the "crown jewels" plot in your appraisal, and adequately
identify and react to security occurrences.
Reference:
https://goo.gl/nhdtXU
Thank You

Más contenido relacionado

La actualidad más candente

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

La actualidad más candente (20)

Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Information Security
Information SecurityInformation Security
Information Security
 
Information security
Information securityInformation security
Information security
 

Similar a What is cyber security

The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
Susan Darby
 
digital marketing
digital marketingdigital marketing
digital marketing
abdullahanwarabdulla
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 

Similar a What is cyber security (20)

Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
digital marketing
digital marketingdigital marketing
digital marketing
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdf
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Cybersecurity Software Development Services.
Cybersecurity Software Development Services.Cybersecurity Software Development Services.
Cybersecurity Software Development Services.
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Protect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk AdvisoryProtect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk Advisory
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
16231
1623116231
16231
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

What is cyber security

  • 1. Why is Cyber Security Important?
  • 2. Cyber security is the body of technologies and process which practices protection of network, computers, data and programs from unauthorized access, cyber threats, attacks or damages. It deals with controlling physical access to hardware alongside protecting harm coming via network access and code injection. The sole purpose of cyber security is to defend the integrity of computing assets belonging to or connecting to an organization’s network.
  • 3. For an attacker, reducing a system’s information assurance become easier, with an increase in vulnerability. The vulnerability is a term which refers to flaws in a system that can leave it to open attack. With vulnerability being on the rise, the necessity of a strong cyber security infrastructure is self-evident. A proliferation of cyber attacks is causing increasing damage to companies, governments and individuals. Along with the increasing number of cyber security attacks, the severity of the same is also on the rise. They are becoming exponentially destructive and targeting a broad array of information and attack vendors. These lead to cyber security being an important Business Continuity Planning (BCP) issue and to improve the same, a Cyber Security Audit is a great investment.
  • 4. Around 80% of all cyber accidents are caused by human error. Companies are spending millions on cyber security awareness programs but what they are seeking is a more sophisticated program that delivers a quantifiable and worthwhile return on investment in security awareness. To prevent vulnerabilities, a holistic and synergic approach is required. And to achieve that a few necessary steps are to train employees, develop a cyber defense strategy, prepare and implement a strict security policy, employ intelligence tools and engage in proactive cyber-security strategy.
  • 5.  Digital security has turned out to be a standout amongst the most indispensable components of business security, congruity, and arranging. Endeavoring to bind a correct definition for it can be hard, regardless of whether because of considering muddying of the waters by for advertising activities or because the quick moving nature of the danger scene implies things are pushed in and out.  To begin with, digital security isn't the same as information insurance, which is more worried about protection and how information is utilized, as opposed to just how secure it is. In spite of the fact that it's anything but difficult to conflate protection and security, they're altogether different things. Putting iron bars over a window includes security, yet does nothing for protection while putting a drapery up has the invert impact.
  • 6.  Application security  Data security  System security  Fiasco recuperation/business coherence arranging  Operational security  End-client training
  • 7. NCSA prompts that organizations must be set up to "react to the inescapable digital episode, reestablish ordinary operations, and guarantee that organization resources and the organization's notoriety are secured." NCSA's rules for leading digital hazard appraisals concentrate on three key territories: recognizing your association's "crown jewels," or your most important data requiring insurance; distinguishing the dangers and dangers confronting that data, and laying out the harm your association would bring about should that information be lost or wrongfully uncovered. Digital hazard evaluations ought to likewise consider any directions that affect the way your organization gathers, stores, and secures information, for example, PCI- DSS, HIPAA, SOX, FISMA, and others. Following a digital hazard evaluation, create and actualize an arrangement to alleviate digital hazard, ensure the "crown jewels" plot in your appraisal, and adequately identify and react to security occurrences.