SlideShare uma empresa Scribd logo
1 de 12
SECURITIES
Computer security, cyber
security or information technology
security (IT security) is the protection
of computersystems and networks fr
om information disclosure, theft of or
damage to their hardware, software,
or electronic data, as well as from
the disruption or misdirection of the
services they provide.
Cyber system:
It is the combination of all
the resources that provides
cyber services. Resources
can be any facility,
equipment, procedures and
communications.
System security:
A computer system has many numbers of
security threads. The main objective of the
system security is to provide protection of
information. It also includes the
development of security measures.
There are some most common security
threads
Malware: it can be treated as malware software. It
contains disturbing or annoying software or program
code. It can be any virus, spyware or malicious root kit.
Virus: the virus can spread from one computer to
another with the help of email, file or software. It can
delete, corrupt or modify your complete data.
Trojan: it is a type of malware. It is designed to
damage or steals your information from your system. A
Trojan can do anything inside your system.
Spam: it refers to the spamming. In
the case of security spam used to define email
spam. Spam messages can contain infected
links that can harm your system.
Network security
Is a broad term. It is the set of
rules and procedures to protect
the network. In simple terms it is
the process of adopting security
measures related to physical and
software, to protect the network
infrastructure from unauthorized
activity.
Types of Network
security
It is important for all organization and small
businesses to protect their network from
attackers and hackers. Following are the types of
network securities.
Network access control: to ensure the network
security, access control should be limited or to be
given only authorized members. For example, you
could grant administrators complete access but
refuse to access some important file and folders.
Antivirus/malware: Use some best antivirus and anti-
malware software that will protect the network from
worms, Trojans and Ran some wares
Firewall: it is a network security system to protect the network from all
unauthorized activity. It permits or blocks the traffic according to the defined set of
rules. It can be a software utility or hardware device that acts as a filter for all
incoming traffic and connections.
Email security: attackers use personal information then create a phishing
campaign to deceive recipients. Email security is required for controlling these
types of phishing emails in order to prevent the loss of sensitive data
.
Application security: application security is very important because
attackers can enter into your network by using the weaknesses or holes of the
application. It is possible for any application to incorporates the software and
hardware you select for removing those holes and weaknesses.
VPN: It stands for the virtual private network. It provides network security by
encrypting the connection from an endpoint to network. It is another type of
network security which uses IP sec or secure sockets in remote-access VPN. It is
used for authenticating the communication between user and device
.
Wireless security: wireless networks are less secure than wired networks. It
is easy to break wireless network so the wireless security must be strong enough.
Use only that devices that provide the best security to the wireless network.
Why is Cyber Security Important
for Companies Today?
Often some organizations take their data security lightly and
as a result, they fall victim to cyber attacks. In fact, our
companies are still not immune to these evolving cyber
attacks. But thanks to these fast-developing technology
standards today, cyber security has become a priority for
every organization across the world.
Think you are secure online? Think again!
It is a serious matter of how cyber attacks are
shaping in every form possible in order to stay one
step ahead of the development in technology.
Phishing, ransom ware, cyber scams are some of
the common yet highly dangerous cyber attacks that
are designed with the motive to access and exploit
the user’s sensitive data and extort money out of it.
•Rise of Cyber Crimes
Be it a large scale or a small scale firm, hackers and cyber criminals spare
no one. Rather, they lookout for opportunities to exploit data and get money
out of these firms. Over the past year, the average cost of cyber crime for
an organization has increased 23% more than last year. With the
introduction of new technologies, the chances of cyber threats and risks are
also rapidly increasing
•Growth of Iot Devices
The introduction of Iot technology i.e. Internet of Things, has not only
simplified and speed up our tasks but has also created a pit of new
vulnerabilities for hackers to exploit. No matter how advanced security
measures we take, Cyber criminals will always stay one step ahead to
attempt cyber crimes. If these internet-connected devices are not managed
properly then they can provide a gateway to business to hackers or cyber
criminals!
•Bridge to Security Gap
Human resources and IT resources have always been one of the
most important aspects of any organization. Regardless of their
dependency on each other, there has always been a security gap
between both aspects. In order to bridge this gap, it is important to
provide individuals working in an organization with the right cyber
security awareness training. Training for employees is necessary to
bridge the gap of cyber security skills and to create a cyber-resilient
working culture in the organization.
Well, now you know why bridging the security gap is important!
ForensicsffFORENSICS
Forensic science is a combination of forensics and science. It means
applying scientific methods, tools and procedures for solving the
crime. The “forensic” word comes from the Latin word that means
public. Forensic science is a science used in public, in court or in the
justice system.
Applications of forensic science
•Inspection of physical evidence
•Clear and short reporting
•Understanding of data
•Management of tests
Forensic science is further classified:
•Forensic toxicology
•Forensic geology
•Forensic Botany
•Forensic DNA analysis
•Digital Forensic
•Forensic pathology
•Forensic archaeology
•Forensic podiatry
Forensics science can be a challenging task for new students because it has a very vast area. It covers many
subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as
mathematics.

Mais conteúdo relacionado

Semelhante a ppt on securities.pptx

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfNeilStark1
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 

Semelhante a ppt on securities.pptx (20)

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 

Mais de muskaangoel15

091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdf091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdfmuskaangoel15
 
Chapter 7 Human memory.ppt
Chapter 7 Human memory.pptChapter 7 Human memory.ppt
Chapter 7 Human memory.pptmuskaangoel15
 
chap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.pptchap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.pptmuskaangoel15
 
ban on plastic bags.pdf
ban on plastic bags.pdfban on plastic bags.pdf
ban on plastic bags.pdfmuskaangoel15
 
tf02922647_win32.potx
tf02922647_win32.potxtf02922647_win32.potx
tf02922647_win32.potxmuskaangoel15
 

Mais de muskaangoel15 (8)

091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdf091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
 
WRITING SKILL.pptx
WRITING SKILL.pptxWRITING SKILL.pptx
WRITING SKILL.pptx
 
icai weightage.pdf
icai weightage.pdficai weightage.pdf
icai weightage.pdf
 
Chapter 7 Human memory.ppt
Chapter 7 Human memory.pptChapter 7 Human memory.ppt
Chapter 7 Human memory.ppt
 
XII CH 1 PPT.pptx
XII CH 1 PPT.pptxXII CH 1 PPT.pptx
XII CH 1 PPT.pptx
 
chap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.pptchap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.ppt
 
ban on plastic bags.pdf
ban on plastic bags.pdfban on plastic bags.pdf
ban on plastic bags.pdf
 
tf02922647_win32.potx
tf02922647_win32.potxtf02922647_win32.potx
tf02922647_win32.potx
 

Último

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 

Último (20)

Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 

ppt on securities.pptx

  • 2. Computer security, cyber security or information technology security (IT security) is the protection of computersystems and networks fr om information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  • 3. Cyber system: It is the combination of all the resources that provides cyber services. Resources can be any facility, equipment, procedures and communications. System security: A computer system has many numbers of security threads. The main objective of the system security is to provide protection of information. It also includes the development of security measures.
  • 4. There are some most common security threads Malware: it can be treated as malware software. It contains disturbing or annoying software or program code. It can be any virus, spyware or malicious root kit. Virus: the virus can spread from one computer to another with the help of email, file or software. It can delete, corrupt or modify your complete data. Trojan: it is a type of malware. It is designed to damage or steals your information from your system. A Trojan can do anything inside your system. Spam: it refers to the spamming. In the case of security spam used to define email spam. Spam messages can contain infected links that can harm your system.
  • 5. Network security Is a broad term. It is the set of rules and procedures to protect the network. In simple terms it is the process of adopting security measures related to physical and software, to protect the network infrastructure from unauthorized activity.
  • 6. Types of Network security It is important for all organization and small businesses to protect their network from attackers and hackers. Following are the types of network securities. Network access control: to ensure the network security, access control should be limited or to be given only authorized members. For example, you could grant administrators complete access but refuse to access some important file and folders. Antivirus/malware: Use some best antivirus and anti- malware software that will protect the network from worms, Trojans and Ran some wares
  • 7. Firewall: it is a network security system to protect the network from all unauthorized activity. It permits or blocks the traffic according to the defined set of rules. It can be a software utility or hardware device that acts as a filter for all incoming traffic and connections. Email security: attackers use personal information then create a phishing campaign to deceive recipients. Email security is required for controlling these types of phishing emails in order to prevent the loss of sensitive data . Application security: application security is very important because attackers can enter into your network by using the weaknesses or holes of the application. It is possible for any application to incorporates the software and hardware you select for removing those holes and weaknesses. VPN: It stands for the virtual private network. It provides network security by encrypting the connection from an endpoint to network. It is another type of network security which uses IP sec or secure sockets in remote-access VPN. It is used for authenticating the communication between user and device . Wireless security: wireless networks are less secure than wired networks. It is easy to break wireless network so the wireless security must be strong enough. Use only that devices that provide the best security to the wireless network.
  • 8. Why is Cyber Security Important for Companies Today? Often some organizations take their data security lightly and as a result, they fall victim to cyber attacks. In fact, our companies are still not immune to these evolving cyber attacks. But thanks to these fast-developing technology standards today, cyber security has become a priority for every organization across the world.
  • 9. Think you are secure online? Think again! It is a serious matter of how cyber attacks are shaping in every form possible in order to stay one step ahead of the development in technology. Phishing, ransom ware, cyber scams are some of the common yet highly dangerous cyber attacks that are designed with the motive to access and exploit the user’s sensitive data and extort money out of it.
  • 10. •Rise of Cyber Crimes Be it a large scale or a small scale firm, hackers and cyber criminals spare no one. Rather, they lookout for opportunities to exploit data and get money out of these firms. Over the past year, the average cost of cyber crime for an organization has increased 23% more than last year. With the introduction of new technologies, the chances of cyber threats and risks are also rapidly increasing •Growth of Iot Devices The introduction of Iot technology i.e. Internet of Things, has not only simplified and speed up our tasks but has also created a pit of new vulnerabilities for hackers to exploit. No matter how advanced security measures we take, Cyber criminals will always stay one step ahead to attempt cyber crimes. If these internet-connected devices are not managed properly then they can provide a gateway to business to hackers or cyber criminals!
  • 11. •Bridge to Security Gap Human resources and IT resources have always been one of the most important aspects of any organization. Regardless of their dependency on each other, there has always been a security gap between both aspects. In order to bridge this gap, it is important to provide individuals working in an organization with the right cyber security awareness training. Training for employees is necessary to bridge the gap of cyber security skills and to create a cyber-resilient working culture in the organization. Well, now you know why bridging the security gap is important!
  • 12. ForensicsffFORENSICS Forensic science is a combination of forensics and science. It means applying scientific methods, tools and procedures for solving the crime. The “forensic” word comes from the Latin word that means public. Forensic science is a science used in public, in court or in the justice system. Applications of forensic science •Inspection of physical evidence •Clear and short reporting •Understanding of data •Management of tests Forensic science is further classified: •Forensic toxicology •Forensic geology •Forensic Botany •Forensic DNA analysis •Digital Forensic •Forensic pathology •Forensic archaeology •Forensic podiatry Forensics science can be a challenging task for new students because it has a very vast area. It covers many subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as mathematics.