SlideShare une entreprise Scribd logo
1  sur  8
Why is Cyber Security Important?
Cyber security is the body of technologies and process which practices
protection of network, computers, data and programs from unauthorized
access, cyber threats, attacks or damages. It deals with controlling physical
access to hardware alongside protecting harm coming via network access
and code injection. The sole purpose of cyber security is to defend the
integrity of computing assets belonging to or connecting to an
organization’s network.
For an attacker, reducing a system’s information assurance become easier,
with an increase in vulnerability. The vulnerability is a term which refers to
flaws in a system that can leave it to open attack.
With vulnerability being on the rise, the necessity of a strong cyber security
infrastructure is self-evident. A proliferation of cyber attacks is causing
increasing damage to companies, governments and individuals. Along with the
increasing number of cyber security attacks, the severity of the same is also on
the rise. They are becoming exponentially destructive and targeting a broad
array of information and attack vendors. These lead to cyber security being
an important Business Continuity Planning (BCP) issue and to
improve the same, a Cyber Security Audit is a great investment.
Around 80% of all cyber accidents are caused by human error. Companies are
spending millions on cyber security awareness programs but what they are
seeking is a more sophisticated program that delivers a quantifiable
and worthwhile return on investment in security awareness.
To prevent vulnerabilities, a holistic and synergic approach is required. And to
achieve that a few necessary steps are to train employees, develop a cyber defense
strategy, prepare and implement a strict security policy, employ intelligence tools
and engage in proactive cyber-security strategy.
 Digital security has turned out to be a standout amongst the most
indispensable components of business security, congruity, and arranging.
Endeavoring to bind a correct definition for it can be hard, regardless of
whether because of considering muddying of the waters by for advertising
activities or because the quick moving nature of the danger scene implies
things are pushed in and out.
 To begin with, digital security isn't the same as information insurance,
which is more worried about protection and how information is utilized,
as opposed to just how secure it is. In spite of the fact that it's anything
but difficult to conflate protection and security, they're altogether
different things. Putting iron bars over a window includes security, yet
does nothing for protection while putting a drapery up has the invert
impact.
 Application security
 Data security
 System security
 Fiasco recuperation/business coherence arranging
 Operational security
 End-client training
NCSA prompts that organizations must be set up to "react to the
inescapable digital episode, reestablish ordinary operations, and
guarantee that organization resources and the organization's notoriety
are secured." NCSA's rules for leading digital hazard appraisals
concentrate on three key territories: recognizing your association's
"crown jewels," or your most important data requiring insurance;
distinguishing the dangers and dangers confronting that data, and
laying out the harm your association would bring about should that
information be lost or wrongfully uncovered. Digital hazard evaluations
ought to likewise consider any directions that affect the way your
organization gathers, stores, and secures information, for example, PCI-
DSS, HIPAA, SOX, FISMA, and others. Following a digital hazard
evaluation, create and actualize an arrangement to alleviate digital
hazard, ensure the "crown jewels" plot in your appraisal, and adequately
identify and react to security occurrences.
Reference:
https://goo.gl/nhdtXU
Thank You

Contenu connexe

Tendances

Tendances (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Similaire à What is cyber security

The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
Susan Darby
 
digital marketing
digital marketingdigital marketing
digital marketing
abdullahanwarabdulla
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 

Similaire à What is cyber security (20)

Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
digital marketing
digital marketingdigital marketing
digital marketing
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdf
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Cybersecurity Software Development Services.
Cybersecurity Software Development Services.Cybersecurity Software Development Services.
Cybersecurity Software Development Services.
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Protect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk AdvisoryProtect Your Digital Privacy | Cyberroot Risk Advisory
Protect Your Digital Privacy | Cyberroot Risk Advisory
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
16231
1623116231
16231
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

What is cyber security

  • 1. Why is Cyber Security Important?
  • 2. Cyber security is the body of technologies and process which practices protection of network, computers, data and programs from unauthorized access, cyber threats, attacks or damages. It deals with controlling physical access to hardware alongside protecting harm coming via network access and code injection. The sole purpose of cyber security is to defend the integrity of computing assets belonging to or connecting to an organization’s network.
  • 3. For an attacker, reducing a system’s information assurance become easier, with an increase in vulnerability. The vulnerability is a term which refers to flaws in a system that can leave it to open attack. With vulnerability being on the rise, the necessity of a strong cyber security infrastructure is self-evident. A proliferation of cyber attacks is causing increasing damage to companies, governments and individuals. Along with the increasing number of cyber security attacks, the severity of the same is also on the rise. They are becoming exponentially destructive and targeting a broad array of information and attack vendors. These lead to cyber security being an important Business Continuity Planning (BCP) issue and to improve the same, a Cyber Security Audit is a great investment.
  • 4. Around 80% of all cyber accidents are caused by human error. Companies are spending millions on cyber security awareness programs but what they are seeking is a more sophisticated program that delivers a quantifiable and worthwhile return on investment in security awareness. To prevent vulnerabilities, a holistic and synergic approach is required. And to achieve that a few necessary steps are to train employees, develop a cyber defense strategy, prepare and implement a strict security policy, employ intelligence tools and engage in proactive cyber-security strategy.
  • 5.  Digital security has turned out to be a standout amongst the most indispensable components of business security, congruity, and arranging. Endeavoring to bind a correct definition for it can be hard, regardless of whether because of considering muddying of the waters by for advertising activities or because the quick moving nature of the danger scene implies things are pushed in and out.  To begin with, digital security isn't the same as information insurance, which is more worried about protection and how information is utilized, as opposed to just how secure it is. In spite of the fact that it's anything but difficult to conflate protection and security, they're altogether different things. Putting iron bars over a window includes security, yet does nothing for protection while putting a drapery up has the invert impact.
  • 6.  Application security  Data security  System security  Fiasco recuperation/business coherence arranging  Operational security  End-client training
  • 7. NCSA prompts that organizations must be set up to "react to the inescapable digital episode, reestablish ordinary operations, and guarantee that organization resources and the organization's notoriety are secured." NCSA's rules for leading digital hazard appraisals concentrate on three key territories: recognizing your association's "crown jewels," or your most important data requiring insurance; distinguishing the dangers and dangers confronting that data, and laying out the harm your association would bring about should that information be lost or wrongfully uncovered. Digital hazard evaluations ought to likewise consider any directions that affect the way your organization gathers, stores, and secures information, for example, PCI- DSS, HIPAA, SOX, FISMA, and others. Following a digital hazard evaluation, create and actualize an arrangement to alleviate digital hazard, ensure the "crown jewels" plot in your appraisal, and adequately identify and react to security occurrences.