SlideShare uma empresa Scribd logo
1 de 38
 
Our Purpose   Copyright 2010 Semantech Inc., All Rights Reserved ,[object Object],[object Object],[object Object],[object Object]
The First  in a Series…   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
The Impact of Cyber Security Copyright 2010, All Rights Reserved
The  Cultural  Impact   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
The  Official  Impact   Nations are redefining how they do business and spending an ever-growing amount of money on security-related mitigation. But is it working?   To date, it only seems as though the problem is getting worse and Cyber adversaries have a cost advantage that puts defenders at a permanent disadvantage.  Copyright 2010 Semantech Inc., All Rights Reserved
The  Solution  Impact   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Defining Cyber Security Copyright 2010 Semantech Inc., All Rights Reserved
Technology  & Modern Life   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
[object Object],[object Object],[object Object],What is  CyberSpace ?   Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Warfare?   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Security ?   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Security is  Symbiotic Cyber Security as a concept represents a radical departure from the previous view of IT-related security.  In the past, security was often viewed as a separate discipline or as an afterthought. Cyber Security acknowledges that IT security must be symbiotic from now on…  Copyright 2010 Semantech Inc., All Rights Reserved
Cyber is  not  Hype ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
What Cyber Security  Isn’t ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Problem Space  Taxonomy ,[object Object],[object Object],[object Object],[object Object],[object Object],For the purposes of this presentation we will examine Cyber Security from five perspectives: Copyright 2010 Semantech Inc., All Rights Reserved
Threat Management Copyright 2010, All Rights Reserved
What is  Threat Management ,[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Understanding Cyber  Threats Copyright 2010 Semantech Inc., All Rights Reserved
Cyber  Threats are Patterns ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Information Assurance Copyright 2010, All Rights Reserved
Confidentiality  -   Confidential information must only be accessed, used, copied, or disclosed by users who have been authorized, Integrity  - Integrity means data can not be created, changed, or deleted without proper authorization. Authenticity  - Authenticity is necessary to ensure that the users or objects (like documents) are genuine (they have not been forged or fabricated). Availability  - Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. Non-Repudiation  - When one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.  Network and System Security capabilities when viewed together map to the core tenants of Information Assurance: Information Assurance  Defined Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Assurance  ? ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Mission  Assurance ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Infrastructure Management Copyright 2010 Semantech Inc., All Rights Reserved
The  Data Center ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
The  Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Today &  Tomorrow Infrastructure will become  intelligent … Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Operations Copyright 2010 Semantech Inc., All Rights Reserved
What is Cyber  Operations  ? ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Principle -  Defensive Complexity ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Ops &  NETOPS ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Integration Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Integration in  Context Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Integration  ? ,[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
We must redefine how we manage  complexity … Cyber  Semantics Copyright 2010 Semantech Inc., All Rights Reserved
Conclusion ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
CCS Practice Contact Information CCS Integration Partners… For more information, visit  http://www.cyber-ccs.com   or contact: Stephen Lahanas [email_address] Copyright 2010 Semantech Inc., All Rights Reserved

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Network security
Network security Network security
Network security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
cyber security
cyber securitycyber security
cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network security
Network securityNetwork security
Network security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 

Destaque

C the basic concepts
C the basic conceptsC the basic concepts
C the basic concepts
Abhinav Vatsa
 
Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8
Abdul Basit
 
Organizational communication
Organizational communicationOrganizational communication
Organizational communication
Ningsih SM
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
Haitham El-Ghareeb
 

Destaque (20)

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Capability maturity model
Capability maturity modelCapability maturity model
Capability maturity model
 
Metaprogramming JavaScript
Metaprogramming  JavaScriptMetaprogramming  JavaScript
Metaprogramming JavaScript
 
Why Project Managers (Understandably) Hate the CMMI -- and What to Do About It
Why Project Managers (Understandably) Hate the CMMI -- and What to Do About ItWhy Project Managers (Understandably) Hate the CMMI -- and What to Do About It
Why Project Managers (Understandably) Hate the CMMI -- and What to Do About It
 
A Simple Introduction To CMMI For Beginer
A Simple Introduction To CMMI For BeginerA Simple Introduction To CMMI For Beginer
A Simple Introduction To CMMI For Beginer
 
Organizational Communication
Organizational CommunicationOrganizational Communication
Organizational Communication
 
Principles and Practices in Continuous Deployment at Etsy
Principles and Practices in Continuous Deployment at EtsyPrinciples and Practices in Continuous Deployment at Etsy
Principles and Practices in Continuous Deployment at Etsy
 
Oracle Sql Tuning
Oracle Sql TuningOracle Sql Tuning
Oracle Sql Tuning
 
Paris ML meetup
Paris ML meetupParis ML meetup
Paris ML meetup
 
C the basic concepts
C the basic conceptsC the basic concepts
C the basic concepts
 
Project Management With Scrum
Project Management With ScrumProject Management With Scrum
Project Management With Scrum
 
Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8
 
Gear Cutting Presentation for Polytechnic College Students of India
Gear Cutting Presentation for Polytechnic College Students of IndiaGear Cutting Presentation for Polytechnic College Students of India
Gear Cutting Presentation for Polytechnic College Students of India
 
Organizational communication
Organizational communicationOrganizational communication
Organizational communication
 
Capability Maturity Model
Capability Maturity ModelCapability Maturity Model
Capability Maturity Model
 
6 Thinking Hats
6 Thinking Hats6 Thinking Hats
6 Thinking Hats
 
Root cause analysis - tools and process
Root cause analysis - tools and processRoot cause analysis - tools and process
Root cause analysis - tools and process
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
 

Semelhante a Introduction to Cyber Security

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Network Security Is Important For Protecting Your Computer
Network Security Is Important For Protecting Your ComputerNetwork Security Is Important For Protecting Your Computer
Network Security Is Important For Protecting Your Computer
Angie Willis
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Lana Sorrels
 

Semelhante a Introduction to Cyber Security (14)

Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Network Security Is Important For Protecting Your Computer
Network Security Is Important For Protecting Your ComputerNetwork Security Is Important For Protecting Your Computer
Network Security Is Important For Protecting Your Computer
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 

Mais de Stephen Lahanas

Mais de Stephen Lahanas (20)

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - Intro
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate Capabilties
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political Ontology
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & Search
 
Semantic intelligence
Semantic intelligenceSemantic intelligence
Semantic intelligence
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem Spaces
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorx
 
Virtual Trade Mission
Virtual Trade MissionVirtual Trade Mission
Virtual Trade Mission
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive Overview
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011
 
Dynamic Learning
Dynamic LearningDynamic Learning
Dynamic Learning
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems Integration
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP Solutions
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture Fusion
 
Policy Integration
Policy IntegrationPolicy Integration
Policy Integration
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference Architecture
 

Introduction to Cyber Security

  • 1.  
  • 2.
  • 3.
  • 4. The Impact of Cyber Security Copyright 2010, All Rights Reserved
  • 5.
  • 6. The Official Impact Nations are redefining how they do business and spending an ever-growing amount of money on security-related mitigation. But is it working? To date, it only seems as though the problem is getting worse and Cyber adversaries have a cost advantage that puts defenders at a permanent disadvantage. Copyright 2010 Semantech Inc., All Rights Reserved
  • 7.
  • 8. Defining Cyber Security Copyright 2010 Semantech Inc., All Rights Reserved
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Security is Symbiotic Cyber Security as a concept represents a radical departure from the previous view of IT-related security. In the past, security was often viewed as a separate discipline or as an afterthought. Cyber Security acknowledges that IT security must be symbiotic from now on… Copyright 2010 Semantech Inc., All Rights Reserved
  • 14.
  • 15.
  • 16.
  • 17. Threat Management Copyright 2010, All Rights Reserved
  • 18.
  • 19. Understanding Cyber Threats Copyright 2010 Semantech Inc., All Rights Reserved
  • 20.
  • 21. Information Assurance Copyright 2010, All Rights Reserved
  • 22. Confidentiality - Confidential information must only be accessed, used, copied, or disclosed by users who have been authorized, Integrity - Integrity means data can not be created, changed, or deleted without proper authorization. Authenticity - Authenticity is necessary to ensure that the users or objects (like documents) are genuine (they have not been forged or fabricated). Availability - Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. Non-Repudiation - When one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. Network and System Security capabilities when viewed together map to the core tenants of Information Assurance: Information Assurance Defined Copyright 2010 Semantech Inc., All Rights Reserved
  • 23.
  • 24.
  • 25. Infrastructure Management Copyright 2010 Semantech Inc., All Rights Reserved
  • 26.
  • 27.
  • 28. Today & Tomorrow Infrastructure will become intelligent … Copyright 2010 Semantech Inc., All Rights Reserved
  • 29. Cyber Operations Copyright 2010 Semantech Inc., All Rights Reserved
  • 30.
  • 31.
  • 32.
  • 33. Cyber Integration Copyright 2010 Semantech Inc., All Rights Reserved
  • 34. Cyber Integration in Context Copyright 2010 Semantech Inc., All Rights Reserved
  • 35.
  • 36. We must redefine how we manage complexity … Cyber Semantics Copyright 2010 Semantech Inc., All Rights Reserved
  • 37.
  • 38. CCS Practice Contact Information CCS Integration Partners… For more information, visit http://www.cyber-ccs.com or contact: Stephen Lahanas [email_address] Copyright 2010 Semantech Inc., All Rights Reserved

Notas do Editor

  1. This presentation is the first in a series of Slidecasts on Cyber Security. The goal of these briefings is to help raise awareness to the need for more comprehensive and proactive solutions.
  2. * Note – Federation in the context of “Coordination thru Federation” refers to the ability of organizations in separate chains of command to work with one another in a federated manner to coordinate on cyber security mitigation.