Cyber Security and its categories. - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security and its categories.

Description:

Beautifully designed s covering basic information on Cyber Security and its categories. (Part-1) More s will be coming. Learn all about Cyber Security from the experts and become pro in no time. Visit - Hackers Guru Source - – PowerPoint PPT presentation

Number of Views:174

less

Transcript and Presenter's Notes

Title: Cyber Security and its categories.


1
WHAT IS CYBER SECURITY?
By Hackers Guru
2
The practice of defending
  • Computers
  • Servers,
  • Mobile devices
  • Electronic systems, networks, and
  • Data
  • from malicious attack
  • The term applies in a variety of contexts, from
    business to mobile computing, and can be divided
    into a few common categories.

3
Network Security
The practice of securing a computer network from
intruders, whether targeted attackers or
opportunistic malware.
4
Application security
Practice of keeping software and devices free of
threats to prevent security vulnerabilities such
as unauthorized access and modification.
5
Information security
Protects the integrity and privacy of data, both
in storage and in transit. Infosec programs are
built around the core objectives of the CIA
triad maintaining the confidentiality,
integrity and a vailability of IT systems and
business data.
6
Operational security
Is a risk management process that encourages
managers to view operations from the perspective
of an adversary in order to protect sensitive
information from falling into the wrong hands.
7
Disaster recovery and business continuity
Define how an organization responds to a
cyber-security incident or any other event that
causes the loss of operations or data. Disaster
recovery policies dictate how the organization
restores its operations and information to
return to the same operating capacity as before
the event.
8
End-user education
Anyone can accidentally introduce a virus to an
otherwise secure system by failing to follow
good security practices. Educating users to
delete suspicious email attachments, not plug in
unidentified USB drives, and various other
important lessons is vital for the security of
any organization.
9
Deal With Threats Like a Pro
Write a Comment
User Comments (0)
About PowerShow.com