SlideShare une entreprise Scribd logo
1  sur  15
CYBER
SECURITY
CYBER + SECURITY = CYBER
SECURITY
Cyber means relating
to or characteristic of
the culture of
computers,
information
technology, and
virtual reality.
Security means the
state of being free
from danger of
threats.
CYBER SECURITY
CYBER SECURITY REFERS TO A BODY OF
TECHNOLOGIES, PROCESSES AND PRACTICES
DESIGNED TO PROTECT NETWORKS, DEVICES,
PROGRAMS AND DATA FROM ATTACK, DAMAGE
OR UNAUTHORISED ACCESS.
APPLICATION SECURITY
INFORMATION SECURITY
DISASTER RECOVERY
NETWORK SECURITY
OPERATIONAL SECURITY
END-USER EDUCATION
APPLICATION SECURITY:
APPLICATION SECURITY ENCOMPASSES MEASURES OR COUNTER-
MEASURES THAT ARE TAKEN DURING THE DEVELOPMENT LIFE-
CYCLE TO PROTECT APPLICATIONS FROM THREATS THAT CAN
COME THROUGH FLAWS IN THE APPLICATION DESIGN,
DEVELOPMENT, DEPLOYMENT, UPGRADE OR MAINTENANCE.
SOME BASICS TECHNIQUES ARE:
INPUT PARAMETER VALIDATION
USER/ROLL AUTHORIZATION
AUDITING AND LOGGING
INFORMATION SECURITY:
INFORMATION SECURITY PROTECTS INFORMATION FROM
ANOTHORIZED ACCESS TO AVOID IDENTITY THEFT AND TO
PROTECT PRIVACY.M MAJOR TECHNICQUES USED TO COVER
ARE:
IDENTIFICATION OF USER
AUTHORIZATION OF USER
AUTHENTICATION OF USER
CYPTOGRAPHY
DISASTER RECOVERY PLANNING:
DISASTER RECOVERY PLANNING IS A PROCESS THAT
INCLUDES PERFORMING RISK ASSESSMENT,
ESTABLISHING PRIORITIES, DEVELOPING RECOVERY
STRATEGIES IN CASE OF A DISASTER. ANY BUSINESS
SHOULD HAVE A CONCRETE PLAN FOR DISASTER
RECOVERY TO RESUME NORMAL BUSINESS
OPERATIONS AS QUICKLY AS POSSIBLE AFTER A
DISASTER.
NETWORK SECURITY:
NETWORK SECURITY INCLUDES ACTIVITES TO PROTECT THE USABILITY
RELIABILITY INTEGRITY AND SAFETY OF THE NETWORK. EFFECTIVE
NETWORK SECURITY TARGETS A VARIETY OF THREATS AND STOP THEM
FROM ENTERING OR SPREADING ON THE NETWORK. NETWORK
SECURITY COMPONENTS INCLUDE
ANTIVIRUS AND ANTI SPYWARE
FIREWALL, TO BLOCK UNAUTHORISED ACCESS TO YOUR NETWORK
INSTRUCTION, PREVENTION SYSTEM TO IDENTIFY FAST SPREADING
THREATS
RANSOMEWARE:
TYPE OF MALWARE THAT INVOLVE AN ATTACKER
LOCKING THE VICTIMS COMPUTER SYSTEM FILES
TYPICALLY THROUGH ENCRYPTION.
MALWARE:
ANY FILE OR PROGRAM USED TO HARM A
COMPUTER USER SUCH AS WORMS COMPUTER VIRUS.
SOCIAL ENGINEERING:
AN ATTACK THAT REALISE ON HUMAN INTERACTION
TO TRICK USER INTO BREAKING SECURITY PROCEDURES
IN ORDER TO GAIN SENSITIVE INFORMATION THAT IS
TYPICALLY PROTECTED.
BUSINESS PROTECTION:
USED AGAINST MALWARE,
RANSOMEWARE, SOCIAL ENGINEERING.
PROTECTION FOR DATA AND NETWORKS.
PREVENTION OF UNAUTHORISED USES.
PROTECTION FOR END-USERS.
IMPROVES RECOVERY TIME AFTER A
BREACH.
CYBER SECURITY VENDORS
IN THIS FIELD WE TYPICALLY USE END POINT NETWORK
AND ADVANCE THREAT PROTECTION SECURITY AS WELL AS
DATA LOSE PREVENTION.
THE THREE COMMONLY KNOWN CYBER SECURITY
VENDOR INCLUDE:
1.CISCO
2.MCAFEE
3.TREND MICRO
DEPARTMENT OF
SCIENCE AND
HUMANITIES
PRESENTED BY:
1.J.ABITHA
2.N.PRATHIBA
Cyber security

Contenu connexe

Tendances

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 

Tendances (20)

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
cyber security
cyber security cyber security
cyber security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Similaire à Cyber security

network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................MuhammadKhalil858111
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxKRISHNARAJ207
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research PaperPankaj Jha
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfWebtrills1
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 

Similaire à Cyber security (20)

CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Network security
Network security Network security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Cyber security
Cyber securityCyber security
Cyber security
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Network security
Network securityNetwork security
Network security
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 

Dernier

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 

Dernier (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 

Cyber security

  • 2. CYBER + SECURITY = CYBER SECURITY Cyber means relating to or characteristic of the culture of computers, information technology, and virtual reality. Security means the state of being free from danger of threats.
  • 3. CYBER SECURITY CYBER SECURITY REFERS TO A BODY OF TECHNOLOGIES, PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS, DEVICES, PROGRAMS AND DATA FROM ATTACK, DAMAGE OR UNAUTHORISED ACCESS.
  • 4. APPLICATION SECURITY INFORMATION SECURITY DISASTER RECOVERY NETWORK SECURITY OPERATIONAL SECURITY END-USER EDUCATION
  • 5. APPLICATION SECURITY: APPLICATION SECURITY ENCOMPASSES MEASURES OR COUNTER- MEASURES THAT ARE TAKEN DURING THE DEVELOPMENT LIFE- CYCLE TO PROTECT APPLICATIONS FROM THREATS THAT CAN COME THROUGH FLAWS IN THE APPLICATION DESIGN, DEVELOPMENT, DEPLOYMENT, UPGRADE OR MAINTENANCE. SOME BASICS TECHNIQUES ARE: INPUT PARAMETER VALIDATION USER/ROLL AUTHORIZATION AUDITING AND LOGGING
  • 6.
  • 7. INFORMATION SECURITY: INFORMATION SECURITY PROTECTS INFORMATION FROM ANOTHORIZED ACCESS TO AVOID IDENTITY THEFT AND TO PROTECT PRIVACY.M MAJOR TECHNICQUES USED TO COVER ARE: IDENTIFICATION OF USER AUTHORIZATION OF USER AUTHENTICATION OF USER CYPTOGRAPHY
  • 8. DISASTER RECOVERY PLANNING: DISASTER RECOVERY PLANNING IS A PROCESS THAT INCLUDES PERFORMING RISK ASSESSMENT, ESTABLISHING PRIORITIES, DEVELOPING RECOVERY STRATEGIES IN CASE OF A DISASTER. ANY BUSINESS SHOULD HAVE A CONCRETE PLAN FOR DISASTER RECOVERY TO RESUME NORMAL BUSINESS OPERATIONS AS QUICKLY AS POSSIBLE AFTER A DISASTER.
  • 9. NETWORK SECURITY: NETWORK SECURITY INCLUDES ACTIVITES TO PROTECT THE USABILITY RELIABILITY INTEGRITY AND SAFETY OF THE NETWORK. EFFECTIVE NETWORK SECURITY TARGETS A VARIETY OF THREATS AND STOP THEM FROM ENTERING OR SPREADING ON THE NETWORK. NETWORK SECURITY COMPONENTS INCLUDE ANTIVIRUS AND ANTI SPYWARE FIREWALL, TO BLOCK UNAUTHORISED ACCESS TO YOUR NETWORK INSTRUCTION, PREVENTION SYSTEM TO IDENTIFY FAST SPREADING THREATS
  • 10. RANSOMEWARE: TYPE OF MALWARE THAT INVOLVE AN ATTACKER LOCKING THE VICTIMS COMPUTER SYSTEM FILES TYPICALLY THROUGH ENCRYPTION. MALWARE: ANY FILE OR PROGRAM USED TO HARM A COMPUTER USER SUCH AS WORMS COMPUTER VIRUS. SOCIAL ENGINEERING: AN ATTACK THAT REALISE ON HUMAN INTERACTION TO TRICK USER INTO BREAKING SECURITY PROCEDURES IN ORDER TO GAIN SENSITIVE INFORMATION THAT IS TYPICALLY PROTECTED.
  • 11. BUSINESS PROTECTION: USED AGAINST MALWARE, RANSOMEWARE, SOCIAL ENGINEERING. PROTECTION FOR DATA AND NETWORKS. PREVENTION OF UNAUTHORISED USES. PROTECTION FOR END-USERS. IMPROVES RECOVERY TIME AFTER A BREACH.
  • 12. CYBER SECURITY VENDORS IN THIS FIELD WE TYPICALLY USE END POINT NETWORK AND ADVANCE THREAT PROTECTION SECURITY AS WELL AS DATA LOSE PREVENTION. THE THREE COMMONLY KNOWN CYBER SECURITY VENDOR INCLUDE: 1.CISCO 2.MCAFEE 3.TREND MICRO
  • 13.
  • 14. DEPARTMENT OF SCIENCE AND HUMANITIES PRESENTED BY: 1.J.ABITHA 2.N.PRATHIBA