1 / 9

Cyber Security and its categories.

Beautifully designed slides covering basic information on Cyber Security and its categories.<br>(Part-1)<br>More slides will be coming.<br><br>Learn all about Cyber Security from the experts and become pro in no time.<br><br>Visit - https://hackersguru.in<br>Hackers Guru<br><br>Source - https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security<br>

hackersguru
Télécharger la présentation

Cyber Security and its categories.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WHATISCYBER SECURITY? ByHackersGuru

  2. Thepracticeof defending - Computers - Servers, - Mobiledevices - Electronicsystems, networks, and - Data frommaliciousattack Thetermappliesinavarietyofcontexts, frombusinesstomobilecomputing, and canbedividedintoafewcommon categories.

  3. NetworkSecurity Thepracticeofsecuringacomputernetworkfromintruders, whether targetedattackersoropportunisticmalware.

  4. Applicationsecurity Practiceofkeepingsoftwareanddevicesfreeofthreatstoprevent securityvulnerabilitiessuchasunauthorizedaccessandmodification.

  5. Informationsecurity Protects the integrity and privacy of data, both in storage and in transit. Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and a vailability of IT systems and business data.

  6. Operationalsecurity Is a risk management process that encourages managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands.

  7. Disasterrecoveryandbusinesscontinuity Definehowanorganizationrespondstoacyber-securityincidentorany othereventthatcausesthelossofoperationsordata. Disasterrecovery policiesdictatehowtheorganizationrestoresitsoperationsandinformation toreturntothesameoperatingcapacityasbeforetheevent.

  8. End-usereducation Anyonecanaccidentallyintroduceavirustoanotherwisesecuresystem byfailingtofollowgoodsecuritypractices. Educatinguserstodelete suspiciousemailattachments, notpluginunidentifiedUSBdrives, and variousotherimportantlessonsisvitalforthesecurityofanyorganization.

  9. Deal With Threats Like a Pro

More Related