Introduction to Cyber Security

Stephen Lahanas
Stephen LahanasPrincipal Consultant - Semantech Inc.
 
Our Purpose   Copyright 2010 Semantech Inc., All Rights Reserved ,[object Object],[object Object],[object Object],[object Object]
The First  in a Series…   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
The Impact of Cyber Security Copyright 2010, All Rights Reserved
The  Cultural  Impact   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
The  Official  Impact   Nations are redefining how they do business and spending an ever-growing amount of money on security-related mitigation. But is it working?   To date, it only seems as though the problem is getting worse and Cyber adversaries have a cost advantage that puts defenders at a permanent disadvantage.  Copyright 2010 Semantech Inc., All Rights Reserved
The  Solution  Impact   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Defining Cyber Security Copyright 2010 Semantech Inc., All Rights Reserved
Technology  & Modern Life   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
[object Object],[object Object],[object Object],What is  CyberSpace ?   Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Warfare?   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Security ?   ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Security is  Symbiotic Cyber Security as a concept represents a radical departure from the previous view of IT-related security.  In the past, security was often viewed as a separate discipline or as an afterthought. Cyber Security acknowledges that IT security must be symbiotic from now on…  Copyright 2010 Semantech Inc., All Rights Reserved
Cyber is  not  Hype ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
What Cyber Security  Isn’t ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Problem Space  Taxonomy ,[object Object],[object Object],[object Object],[object Object],[object Object],For the purposes of this presentation we will examine Cyber Security from five perspectives: Copyright 2010 Semantech Inc., All Rights Reserved
Threat Management Copyright 2010, All Rights Reserved
What is  Threat Management ,[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Understanding Cyber  Threats Copyright 2010 Semantech Inc., All Rights Reserved
Cyber  Threats are Patterns ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Information Assurance Copyright 2010, All Rights Reserved
Confidentiality  -   Confidential information must only be accessed, used, copied, or disclosed by users who have been authorized, Integrity  - Integrity means data can not be created, changed, or deleted without proper authorization. Authenticity  - Authenticity is necessary to ensure that the users or objects (like documents) are genuine (they have not been forged or fabricated). Availability  - Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. Non-Repudiation  - When one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.  Network and System Security capabilities when viewed together map to the core tenants of Information Assurance: Information Assurance  Defined Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Assurance  ? ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Mission  Assurance ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Infrastructure Management Copyright 2010 Semantech Inc., All Rights Reserved
The  Data Center ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
The  Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Today &  Tomorrow Infrastructure will become  intelligent … Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Operations Copyright 2010 Semantech Inc., All Rights Reserved
What is Cyber  Operations  ? ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Principle -  Defensive Complexity ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Ops &  NETOPS ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Integration Copyright 2010 Semantech Inc., All Rights Reserved
Cyber Integration in  Context Copyright 2010 Semantech Inc., All Rights Reserved
What is  Cyber Integration  ? ,[object Object],[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
We must redefine how we manage  complexity … Cyber  Semantics Copyright 2010 Semantech Inc., All Rights Reserved
Conclusion ,[object Object],[object Object],[object Object],Copyright 2010 Semantech Inc., All Rights Reserved
CCS Practice Contact Information CCS Integration Partners… For more information, visit  http://www.cyber-ccs.com   or contact: Stephen Lahanas [email_address] Copyright 2010 Semantech Inc., All Rights Reserved
1 de 38

Recomendados

Introduction to cyber security amos por
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
3.2K visualizações19 slides
Cyber Security por
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
6.6K visualizações18 slides
Cyber security por
Cyber securityCyber security
Cyber securityManjushree Mashal
3.2K visualizações41 slides
Cyber Security por
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
11.2K visualizações22 slides
Basics of Information System Security por
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
1.3K visualizações10 slides
Cybersecurity 1. intro to cybersecurity por
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
29.6K visualizações20 slides

Mais conteúdo relacionado

Mais procurados

Information security in todays world por
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
897 visualizações46 slides
CYBER SECURITY por
CYBER SECURITYCYBER SECURITY
CYBER SECURITYMohammad Shakirul islam
1.8K visualizações32 slides
Ransomware attacks por
Ransomware attacksRansomware attacks
Ransomware attacksTexas Medical Liability Trust
1.7K visualizações11 slides
Introduction to Network Security por
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
6.2K visualizações28 slides
Types of attacks por
Types of attacksTypes of attacks
Types of attacksVivek Gandhi
22.8K visualizações25 slides
Ransomware por
RansomwareRansomware
RansomwareAkshita Pillai
12.6K visualizações29 slides

Mais procurados(20)

Information security in todays world por Sibghatullah Khattak
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak897 visualizações
Introduction to Network Security por John Ely Masculino
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino6.2K visualizações
Types of attacks por Vivek Gandhi
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi22.8K visualizações
Ransomware por Akshita Pillai
RansomwareRansomware
Ransomware
Akshita Pillai12.6K visualizações
Cyber security por Rishav Sadhu
Cyber securityCyber security
Cyber security
Rishav Sadhu5.9K visualizações
Cyber security & Importance of Cyber Security por Mohammed Adam
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam72.1K visualizações
what is data security full ppt por Shahbaz Khan
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan26.7K visualizações
cyber security presentation.pptx por kishore golla
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla11.8K visualizações
Cybersecurity Attack Vectors: How to Protect Your Organization por TriCorps Technologies
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies3.8K visualizações
Cybercrime and Security por Noushad Hasan
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan1.5K visualizações
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri... por Edureka!
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!2.6K visualizações
INFORMATION SECURITY por Ahmed Moussa
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa154.5K visualizações
Cybersecurity por A. Shamel
CybersecurityCybersecurity
Cybersecurity
A. Shamel486 visualizações
Cyber security por Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel4K visualizações
Cybersecurity trends - What to expect in 2023 por PECB
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB 2.8K visualizações
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA por Dheeraj Kataria
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria588 visualizações
Cyber security por Sachith Lekamge
Cyber security Cyber security
Cyber security
Sachith Lekamge1.6K visualizações
Introduction To Information Security por belsis
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis20.4K visualizações

Destaque

Cyber security threats for 2017 por
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
26K visualizações30 slides
Cyber Security 2017 Challenges por
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
20.6K visualizações27 slides
Capability maturity model por
Capability maturity modelCapability maturity model
Capability maturity modelRoy Antony Arnold G
5.2K visualizações28 slides
Metaprogramming JavaScript por
Metaprogramming  JavaScriptMetaprogramming  JavaScript
Metaprogramming JavaScriptdanwrong
43.6K visualizações94 slides
Why Project Managers (Understandably) Hate the CMMI -- and What to Do About It por
Why Project Managers (Understandably) Hate the CMMI -- and What to Do About ItWhy Project Managers (Understandably) Hate the CMMI -- and What to Do About It
Why Project Managers (Understandably) Hate the CMMI -- and What to Do About ItLeading Edge Process Consultants LLC
13.8K visualizações155 slides
A Simple Introduction To CMMI For Beginer por
A Simple Introduction To CMMI For BeginerA Simple Introduction To CMMI For Beginer
A Simple Introduction To CMMI For BeginerManas Das
11.6K visualizações22 slides

Destaque(20)

Cyber security threats for 2017 por Ramiro Cid
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid26K visualizações
Cyber Security 2017 Challenges por Leandro Bennaton
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton20.6K visualizações
Capability maturity model por Roy Antony Arnold G
Capability maturity modelCapability maturity model
Capability maturity model
Roy Antony Arnold G5.2K visualizações
Metaprogramming JavaScript por danwrong
Metaprogramming  JavaScriptMetaprogramming  JavaScript
Metaprogramming JavaScript
danwrong43.6K visualizações
A Simple Introduction To CMMI For Beginer por Manas Das
A Simple Introduction To CMMI For BeginerA Simple Introduction To CMMI For Beginer
A Simple Introduction To CMMI For Beginer
Manas Das11.6K visualizações
Organizational Communication por Dr. Vickram Aadityaa
Organizational CommunicationOrganizational Communication
Organizational Communication
Dr. Vickram Aadityaa11.5K visualizações
Principles and Practices in Continuous Deployment at Etsy por Mike Brittain
Principles and Practices in Continuous Deployment at EtsyPrinciples and Practices in Continuous Deployment at Etsy
Principles and Practices in Continuous Deployment at Etsy
Mike Brittain94K visualizações
Oracle Sql Tuning por Chris Adkin
Oracle Sql TuningOracle Sql Tuning
Oracle Sql Tuning
Chris Adkin18.8K visualizações
Paris ML meetup por Yves Raimond
Paris ML meetupParis ML meetup
Paris ML meetup
Yves Raimond96.5K visualizações
C the basic concepts por Abhinav Vatsa
C the basic conceptsC the basic concepts
C the basic concepts
Abhinav Vatsa58.2K visualizações
Project Management With Scrum por Tommy Norman
Project Management With ScrumProject Management With Scrum
Project Management With Scrum
Tommy Norman22.8K visualizações
Capability maturity model cmm lecture 8 por Abdul Basit
Capability maturity model cmm lecture 8Capability maturity model cmm lecture 8
Capability maturity model cmm lecture 8
Abdul Basit4K visualizações
Gear Cutting Presentation for Polytechnic College Students of India por kichu
Gear Cutting Presentation for Polytechnic College Students of IndiaGear Cutting Presentation for Polytechnic College Students of India
Gear Cutting Presentation for Polytechnic College Students of India
kichu37.2K visualizações
Organizational communication por Ningsih SM
Organizational communicationOrganizational communication
Organizational communication
Ningsih SM52.7K visualizações
Capability Maturity Model por Uzair Akram
Capability Maturity ModelCapability Maturity Model
Capability Maturity Model
Uzair Akram10.7K visualizações
6 Thinking Hats por Iftekhar Alam
6 Thinking Hats6 Thinking Hats
6 Thinking Hats
Iftekhar Alam79.5K visualizações
Root cause analysis - tools and process por Charles Cotter, PhD
Root cause analysis - tools and processRoot cause analysis - tools and process
Root cause analysis - tools and process
Charles Cotter, PhD66.4K visualizações
Object Oriented Analysis and Design por Haitham El-Ghareeb
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
Haitham El-Ghareeb74.5K visualizações
Agile Transformation and Cultural Change por Johnny Ordóñez
 Agile Transformation and Cultural Change Agile Transformation and Cultural Change
Agile Transformation and Cultural Change
Johnny Ordóñez88.2K visualizações

Similar a Introduction to Cyber Security

Similarities And Weaknesses Of Vulnerability Scanners por
Similarities And Weaknesses Of Vulnerability ScannersSimilarities And Weaknesses Of Vulnerability Scanners
Similarities And Weaknesses Of Vulnerability ScannersJennifer Slattery
2 visualizações42 slides
Information Security por
Information SecurityInformation Security
Information SecuritySarah Griffin
4 visualizações44 slides
Module 1Introduction to cyber security.pptx por
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
48 visualizações67 slides
Benefits Of Using The Internet por
Benefits Of Using The InternetBenefits Of Using The Internet
Benefits Of Using The InternetKimberly Brooks
2 visualizações82 slides
The Future of Cyber Security por
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
11.9K visualizações51 slides
Analysis Of Network Concepts For A Small Accounting Firm por
Analysis Of Network Concepts For A Small Accounting FirmAnalysis Of Network Concepts For A Small Accounting Firm
Analysis Of Network Concepts For A Small Accounting FirmApril Wbnd
2 visualizações47 slides

Similar a Introduction to Cyber Security(20)

Similarities And Weaknesses Of Vulnerability Scanners por Jennifer Slattery
Similarities And Weaknesses Of Vulnerability ScannersSimilarities And Weaknesses Of Vulnerability Scanners
Similarities And Weaknesses Of Vulnerability Scanners
Jennifer Slattery2 visualizações
Information Security por Sarah Griffin
Information SecurityInformation Security
Information Security
Sarah Griffin4 visualizações
Module 1Introduction to cyber security.pptx por Skippedltd
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd48 visualizações
Benefits Of Using The Internet por Kimberly Brooks
Benefits Of Using The InternetBenefits Of Using The Internet
Benefits Of Using The Internet
Kimberly Brooks2 visualizações
The Future of Cyber Security por Stephen Lahanas
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas11.9K visualizações
Analysis Of Network Concepts For A Small Accounting Firm por April Wbnd
Analysis Of Network Concepts For A Small Accounting FirmAnalysis Of Network Concepts For A Small Accounting Firm
Analysis Of Network Concepts For A Small Accounting Firm
April Wbnd2 visualizações
Jack Whitsitt - Yours, Anecdotally por EnergySec
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
EnergySec672 visualizações
Swot Analysis Of Risksense Inc. Essay por Sandy Simonsen
Swot Analysis Of Risksense Inc. EssaySwot Analysis Of Risksense Inc. Essay
Swot Analysis Of Risksense Inc. Essay
Sandy Simonsen3 visualizações
Implementing An Automated Distributed Firewall por Gloria Young
Implementing An Automated Distributed FirewallImplementing An Automated Distributed Firewall
Implementing An Automated Distributed Firewall
Gloria Young1 visão
Dynamic Vulnerability Analysis, Intrusion Detection, And... por Jennifer Moser
Dynamic Vulnerability Analysis, Intrusion Detection, And...Dynamic Vulnerability Analysis, Intrusion Detection, And...
Dynamic Vulnerability Analysis, Intrusion Detection, And...
Jennifer Moser2 visualizações
Global Security Law And Act Of Network Security por Dotha Keller
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network Security
Dotha Keller2 visualizações
Global Security Law And Act Of Network Security por Renee Wardowski
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network Security
Renee Wardowski3 visualizações
Netwatcher Credit Union Tech Talk por NetWatcher
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher366 visualizações
Bank Solutions Inc. Security Plan Essay por Amy Moore
Bank Solutions Inc. Security Plan EssayBank Solutions Inc. Security Plan Essay
Bank Solutions Inc. Security Plan Essay
Amy Moore2 visualizações
Network Security Applications por Melissa Grant
Network Security ApplicationsNetwork Security Applications
Network Security Applications
Melissa Grant2 visualizações
The Security Of A Network por Shannon Sand
The Security Of A NetworkThe Security Of A Network
The Security Of A Network
Shannon Sand3 visualizações
Cisco Addresses the Full Attack Continuum por Cisco Security
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security4.4K visualizações
The Security Measure Can Be Deployed For Enhancing Cyber... por Katreka Howard
The Security Measure Can Be Deployed For Enhancing Cyber...The Security Measure Can Be Deployed For Enhancing Cyber...
The Security Measure Can Be Deployed For Enhancing Cyber...
Katreka Howard2 visualizações
Strong Proactive Information Security Measures por Megan Espinoza
Strong Proactive Information Security MeasuresStrong Proactive Information Security Measures
Strong Proactive Information Security Measures
Megan Espinoza2 visualizações
The Security Of A Home Network por Alexis Naranjo
The Security Of A Home NetworkThe Security Of A Home Network
The Security Of A Home Network
Alexis Naranjo3 visualizações

Mais de Stephen Lahanas

Semantech: IT Architecture in the Enterprise por
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
2.6K visualizações33 slides
Semantech Inc. - Mastering Enterprise Big Data - Intro por
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroStephen Lahanas
19.6K visualizações25 slides
Semantech 2014 Corporate Capabilties por
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesStephen Lahanas
1K visualizações22 slides
Redefining Politics 2 - A New Political Ontology por
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyStephen Lahanas
1.4K visualizações42 slides
Intelligent Content & Search por
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & SearchStephen Lahanas
666 visualizações44 slides
Semantic intelligence por
Semantic intelligenceSemantic intelligence
Semantic intelligenceStephen Lahanas
2.1K visualizações21 slides

Mais de Stephen Lahanas(20)

Semantech: IT Architecture in the Enterprise por Stephen Lahanas
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
Stephen Lahanas2.6K visualizações
Semantech Inc. - Mastering Enterprise Big Data - Intro por Stephen Lahanas
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - Intro
Stephen Lahanas19.6K visualizações
Semantech 2014 Corporate Capabilties por Stephen Lahanas
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate Capabilties
Stephen Lahanas1K visualizações
Redefining Politics 2 - A New Political Ontology por Stephen Lahanas
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political Ontology
Stephen Lahanas1.4K visualizações
Intelligent Content & Search por Stephen Lahanas
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & Search
Stephen Lahanas666 visualizações
Semantic intelligence por Stephen Lahanas
Semantic intelligenceSemantic intelligence
Semantic intelligence
Stephen Lahanas2.1K visualizações
The Future of IT por Stephen Lahanas
The Future of ITThe Future of IT
The Future of IT
Stephen Lahanas1.1K visualizações
Enterprise Architecture Frameworks por Stephen Lahanas
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
Stephen Lahanas59.8K visualizações
Innovation as Problem Solving: Managing Problem Spaces por Stephen Lahanas
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem Spaces
Stephen Lahanas1.3K visualizações
Redefining Politics Part 1 por Stephen Lahanas
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1
Stephen Lahanas554 visualizações
Semantech Inc. InnovationWorx por Stephen Lahanas
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorx
Stephen Lahanas534 visualizações
Virtual Trade Mission por Stephen Lahanas
Virtual Trade MissionVirtual Trade Mission
Virtual Trade Mission
Stephen Lahanas940 visualizações
Semantech Inc. - Executive Overview por Stephen Lahanas
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive Overview
Stephen Lahanas652 visualizações
Semantech Inc.'s Corporate Capabilities 2011 por Stephen Lahanas
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011
Stephen Lahanas654 visualizações
Dynamic Learning por Stephen Lahanas
Dynamic LearningDynamic Learning
Dynamic Learning
Stephen Lahanas11.7K visualizações
Semantic Systems Integration por Stephen Lahanas
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems Integration
Stephen Lahanas1.3K visualizações
Semantech Inc. ERP Solutions por Stephen Lahanas
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP Solutions
Stephen Lahanas829 visualizações
Semantech Inc. Architecture Fusion por Stephen Lahanas
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture Fusion
Stephen Lahanas570 visualizações
Policy Integration por Stephen Lahanas
Policy IntegrationPolicy Integration
Policy Integration
Stephen Lahanas1.1K visualizações
The Global AIM Reference Architecture por Stephen Lahanas
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference Architecture
Stephen Lahanas893 visualizações

Introduction to Cyber Security

  • 1.  
  • 2.
  • 3.
  • 4. The Impact of Cyber Security Copyright 2010, All Rights Reserved
  • 5.
  • 6. The Official Impact Nations are redefining how they do business and spending an ever-growing amount of money on security-related mitigation. But is it working? To date, it only seems as though the problem is getting worse and Cyber adversaries have a cost advantage that puts defenders at a permanent disadvantage. Copyright 2010 Semantech Inc., All Rights Reserved
  • 7.
  • 8. Defining Cyber Security Copyright 2010 Semantech Inc., All Rights Reserved
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Security is Symbiotic Cyber Security as a concept represents a radical departure from the previous view of IT-related security. In the past, security was often viewed as a separate discipline or as an afterthought. Cyber Security acknowledges that IT security must be symbiotic from now on… Copyright 2010 Semantech Inc., All Rights Reserved
  • 14.
  • 15.
  • 16.
  • 17. Threat Management Copyright 2010, All Rights Reserved
  • 18.
  • 19. Understanding Cyber Threats Copyright 2010 Semantech Inc., All Rights Reserved
  • 20.
  • 21. Information Assurance Copyright 2010, All Rights Reserved
  • 22. Confidentiality - Confidential information must only be accessed, used, copied, or disclosed by users who have been authorized, Integrity - Integrity means data can not be created, changed, or deleted without proper authorization. Authenticity - Authenticity is necessary to ensure that the users or objects (like documents) are genuine (they have not been forged or fabricated). Availability - Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. Non-Repudiation - When one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. Network and System Security capabilities when viewed together map to the core tenants of Information Assurance: Information Assurance Defined Copyright 2010 Semantech Inc., All Rights Reserved
  • 23.
  • 24.
  • 25. Infrastructure Management Copyright 2010 Semantech Inc., All Rights Reserved
  • 26.
  • 27.
  • 28. Today & Tomorrow Infrastructure will become intelligent … Copyright 2010 Semantech Inc., All Rights Reserved
  • 29. Cyber Operations Copyright 2010 Semantech Inc., All Rights Reserved
  • 30.
  • 31.
  • 32.
  • 33. Cyber Integration Copyright 2010 Semantech Inc., All Rights Reserved
  • 34. Cyber Integration in Context Copyright 2010 Semantech Inc., All Rights Reserved
  • 35.
  • 36. We must redefine how we manage complexity … Cyber Semantics Copyright 2010 Semantech Inc., All Rights Reserved
  • 37.
  • 38. CCS Practice Contact Information CCS Integration Partners… For more information, visit http://www.cyber-ccs.com or contact: Stephen Lahanas [email_address] Copyright 2010 Semantech Inc., All Rights Reserved

Notas do Editor

  1. This presentation is the first in a series of Slidecasts on Cyber Security. The goal of these briefings is to help raise awareness to the need for more comprehensive and proactive solutions.
  2. * Note – Federation in the context of “Coordination thru Federation” refers to the ability of organizations in separate chains of command to work with one another in a federated manner to coordinate on cyber security mitigation.