** Edureka Cybersecurity Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this tutorial include:
1. What is Computer security?
2. Goals of Computer security
3. What to secure?- Types of computer security
4. Potential losses due to cyber attacks
5. How to secure?
2. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What is Computer Security?
Goals of Computer Security
What to Secure?- Types of Computer Security
Potential Losses due to Security Attacks
Agenda
How to Secure?
3. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What are Bump Charts?
Bump charts have a relatively simple purpose—they are used to visualize changes in rank over time.
Relevant DimensionTime Dimension
4. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Why Computer Security?
Good Morning, this is Jon
calling from your
telecommunication company-
I’m working on behalf of your
ICT department. Due to
troubleshooting work I’d like
to ask for your user-ID and
your password
Oh alright. Sure!!
5. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Goals of Computer Security
Confidentiality
Availability
Data Integrity
Control
Audit
6. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Confidentiality: Keep your Secrets
Availability
Confidentiality
Data
Integrity
Control
Audit
Typically achieved by:
➢ Physical isolation
➢ Cryptography
➢ Background checks on
People
7. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Data Integrity: Prevent people from Modifying Data
Availability
Confidentiality
Data
Integrity
Control
Audit
Typically achieved by:
➢ Redundancy
➢ Backups
➢ Checksums & digital
signatures
8. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Availability: Make Sure you can Use Your System
Availability
Confidentiality
Data
Integrity
Control
Audit
Typically achieved by:
➢ Hardening
➢ Redundancy
➢ Reference Checks on
People
9. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Control: Regulate your System Usage
Control
Audit
Typically achieved by:
➢ Access Control lists
➢ Physical Security
Confidentiality
Data
Integrity
Availability
10. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Audit: Something Wrong Happened. How to Undo It?
Control
Audit
Typically achieved by:
➢ Log Files
➢ Human auditors & expert
systems
Confidentiality
Data
Integrity
Availability
11. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What to Secure?- Types of Computer Security
Physical Security
OS Security
Access
Control
Controlling who gets access to a computer
Permission controlling schemes, making sure users
are authorized to perform certain actions
Managing who can Access what resources, from
physical machines to programs to networks
12. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Potential Losses due to Security Attacks
Losing your
data
Unethical usage
of Computer
Resources
Reputation
Loss
Identity
Theft
14. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Basic Computer Security Checklist
Check if the user is password
protected
Check if the OS is updated
Download software from
reputable sources
Check if the antivirus or
antimalware is installed
Terminate unusual services
running that consumes resources
Check if the firewall is on or
not
Check for your backups
regularly
Clear your private data from
web browsers
15. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing your OS
Keep your windows OS
up to date
Update your software
Create a Restore point
Install antivirus product
Install a proactive security solution
for multi-layered protection
Backup your
system
Use a standard user
account
Keep your user account
control enabled
Secure your web browser
before going online
Use an encryption software tool
for your hardware
16. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Antivirus
Scanning Integrity
Interception
Antivirus software, or anti-virus software (abbreviated to AV software), also
known as anti-malware, is a computer program used to prevent, detect, and
remove malware
17. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: Firewalls
A firewall is a network security system that monitors and controls incoming
and outgoing network traffic based on predetermined security rules
Cisco ASA Series
Checkpoint
Fortinet
Juniper
SonicWALL
pfSense
18. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: IDS
An intrusion detection system (IDS) is a device or software application that
monitors a network or systems for malicious activity or policy violations
IDS
Firewall Router
Internet
CyberCop MonitorSnort BlackICE Defender Vanguard Enforcer
LAN
19. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: VPN
A virtual private network extends a secure and encrypted connection to share
data remotely through public networks