1 / 17

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecurity Course | Edureka

** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **<br>This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:<br>Need for cybersecurity<br>What is cybersecurity<br>Fundamentals of cybersecurity<br>Cyberattack Incident<br><br>Follow us to never miss an update in the future.<br><br>Instagram: https://www.instagram.com/edureka_learning/<br>Facebook: https://www.facebook.com/edurekaIN/<br>Twitter: https://twitter.com/edurekain<br>LinkedIn: https://www.linkedin.com/company/edureka

EdurekaIN
Télécharger la présentation

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecurity Course | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Agenda 02 04 01 03 Ensuring Cybersecurity: Scenario Cybersecurity Fundamentals What is Cybersecurity Security? Need for cybersecurity Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  2. Need For Cybersecurity Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  3. Digital Era Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  4. Cyberattacks Malware Ransomware Phishing Malvertising DDoS MITM Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  5. What Is Cybersecurity? Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  6. Cybersecurity Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Information Security Application Security Operational Security Network Security Disaster Security End-user Education Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  7. Fundamentals Of Cybersecurity Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  8. CIA Triad Availability Integrity Confidentiality Availability is making sure that authorized parties are able to access the information when needed Integrity refers to protecting information from being modified by unauthorized parties. Confidentiality is about preventing the disclosure of data to unauthorized parties. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  9. CIA Triad Broken Down Availability Integrity Confidentiality •DDoS attacks •Ransomware Attacks •Disrupting Server •Web Penetration •Unauthorised Scans •Remote Controlling •Cracking Encrypted Data •Man In The Middle •Installing Spyware •Doxxing Attacks •Regular Backup •Data Replication •Adequate communication bandwidth •Intrusion Detection •Cryptography •Hashing •Access Control •Encryption •Biometric Verification Countermeasures Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  10. The Three Pillars of Cybersecurity People Processes Technology Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  11. Cyberattack Incident Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  12. Meet Wendy Book Appointments Make Payments Manage Accounts Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  13. Incident Book Appointments Make Payments Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  14. Solution – Incident Response Team Identify the source and performs business impact analysis Detects logs and access control issues Contains the threat paths to stop further damage Active Response System Prioritizes recovery and install prevention software Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  15. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related