SlideShare ist ein Scribd-Unternehmen logo
1 von 24
SECURITY OF INFORMATION AND CYBER SECURITY
SPEAKER PROFILE:
MD. SHAIFULLAR RABBI
TOURISM EDUCATOR & CONSULTANT
Professional Experiences
Coordinator & Lecturer- Dept. of Tourism & Hospitality
Management, Daffodil Institute of IT(Affiliated National University)
Assessor -Bangladesh Technical Education Board (Ticketing
and Reservation)
Guest Trainer - Sheikh Hasina National Institute of Youth
Development
GuestTrainer - ATABTourismTraining Institute
GuestTrainer- HB AviationTraining Center
Guest Trainer - Bangladesh Hotel Management Tourism
Training Institute
Former Manager sales - Mamun Air Service (IATA Travel
Agency)
Founder –Travel Memoria
Educational Qualifications
MBA & BBA-Major in Tourism & Hospitality
Management, University of Dhaka.
Certified NTVQF Level -4/Assessor Part (Ticketing
And Reservation)
Completed Diploma Course in Travel Agency &
Tour Operation Management
Certified NTVQF Level 2 Course entitled Ticketing
& Reservation
Certified NTVQF Level 1 Course entitled Tour
Guiding
INFORMATION SECURITY DEFINITION
Information security, sometimes shortened to infosec, is the practice of
protecting information by mitigating information risks. It is part of information risk
management. It typically involves preventing or at least reducing the probability of
unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption,
deletion, corruption, modification, inspection, recording or devaluation of information.
 This is largely achieved through a structured risk management process that involves:
 Identifying information and related assets, plus potential threats, vulnerabilities and
impacts;
 Evaluating the risks;
 Deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them;
 Where risk mitigation is required, selecting or designing appropriate security controls
and implementing them;
 Monitoring the activities, making adjustments as necessary to address any issues,
changes and improvement opportunities.
TYPES OF INFORMATION SECURITY
 Application security: Application security is a broad topic that covers
software vulnerabilities in web and mobile applications and application
programming interfaces (APIs). These vulnerabilities may be found in
authentication or authorization of users, integrity of code and
configurations, and mature policies and procedures. Application
vulnerabilities can create entry points for significant Information security
breaches. Application security is an important part of perimeter defense
for Information security.
Cloud security: Cloud security focuses on building and hosting secure
applications in cloud environments and securely consuming third-party
cloud applications. “Cloud” simply means that the application is running
in a shared environment. Businesses must make sure that there is
adequate isolation between different processes in shared environments.
Cryptography: Encrypting data in transit and data at rest
helps ensure data confidentiality and integrity. Digital
signatures are commonly used in cryptography to
validate the authenticity of data. Cryptography and
encryption has become increasingly important. A good
example of cryptography use is the Advanced Encryption
Standard (AES). The AES is a symmetric key algorithm
used to protect classified government information.
Infrastructure security: Infrastructure security deals with
the protection of internal and extranet networks, labs,
data centers, servers, desktops, and mobile devices.
INFORMATION SECURITY PRINCIPLES
The basic components of information security are most often summed
up by the so-called CIA triad: confidentiality, integrity, and availability.
Confidentiality is perhaps the element of the triad that most
immediately comes to mind when you think of information security.
Integrity means maintaining data in its correct state and preventing
it from being improperly modified, either by accident or maliciously.
Many of the techniques that ensure confidentiality will also protect
data integrity.
Availability is the mirror image of confidentiality: while you need to
make sure that your data can't be accessed by unauthorized users,
you also need to ensure that it can be accessed by those who have
the proper permissions.
INFORMATION SECURITY POLICY
The means by which these principles are applied to
an organization take the form of a security
policy. This isn't a piece of security hardware or
software; rather, it's a document that an enterprise
draws up, based on its own specific needs and quirks,
to establish what data needs to be protected and in
what ways. These policies guide the organization's
decisions around procuring cyber security tools, and
also mandate employee behavior and responsibilities.
AMONG OTHERTHINGS,YOUR COMPANY'S
INFORMATION SECURITY POLICY SHOULD INCLUDE:
A statement describing the purpose of the information security program
and your overall objectives:
Definitions of key terms used in the document to ensure shared
understanding
An access control policy, determining who has access to what data and
how they can establish their rights
A password policy
A data support and operations plan to ensure that data is always
available to those who need it
Employee roles and responsibilities when it comes to safeguarding data,
including who is ultimately responsible for information security
INFORMATION SECURITY MEASURES
As should be clear by now, just about all the technical measures associated
with cyber security touch on information security to a certain degree, but
there it is worthwhile to think about Information security measures in a big-
picture way:
Technical measures include the hardware and software that protects data
— everything from encryption to firewalls
Organizational measures include the creation of an internal unit dedicated
to information security, along with making Information security part of the
duties of some staff in every department
Human measures include providing awareness training for users on proper
Information security practices
Physical measures include controlling access to the office locations and,
especially, data centers
DEFINITION OF CYBER SECURITY
Cyber security refers to the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack,
damage, or unauthorized access. Cyber security may also be referred to as
information technology security.
Cyber security is the practice of protecting systems, networks, and
programs from digital attacks. These cyber-attacks are usually aimed at
accessing, changing, or destroying sensitive information; extorting money
from users; or interrupting normal business processes.
Implementing effective cyber security measures is particularly challenging
today because there are more devices than people, and attackers are
becoming more innovative.
THE IMPORTANCE OF CYBER SECURITY
 Cyber security is important because government, military, corporate, financial,
and medical organizations collect, process, and store unprecedented amounts of
data on computers and other devices. A significant portion of that data can be
sensitive information, whether that be intellectual property, financial data,
personal information, or other types of data for which unauthorized access or
exposure could have negative consequences.
 Organizations transmit sensitive data across networks and to other devices in
the course of doing businesses, and cyber security describe the discipline
dedicated to protecting that information and the systems used to process or
store it. As the volume and sophistication of cyber-attacks grow, companies and
organizations, especially those that are tasked with safeguarding information
relating to national security, health, or financial records, need to take steps to
protect their sensitive business and personnel information.
CHALLENGES/ ELEMENTS OF CYBER SECURITY
For an effective cyber security, an organization needs to coordinate its
efforts throughout its entire information system.
Elements of cyber encompass all of the following:
Network security: The process of protecting the network from unwanted
users, attacks and intrusions.
Application security: Apps require constant updates and testing to ensure
these programs are secure from attacks.
Endpoint security: Remote access is a necessary part of business, but can
also be a weak point for data. Endpoint security is the process of
protecting remote access to a company’s network.
Data security: Inside of networks and applications is data. Protecting
company and customer information is a separate layer of security.
 Identity management: Essentially, this is a process of understanding the access every
individual has in an organization.
 Database and infrastructure security: Everything in a network involves databases and
physical equipment. Protecting these devices is equally important.
 Cloud security: Many files are in digital environments or “the cloud”. Protecting data in
a 100% online environment presents a large amount of challenges.
 Mobile security: Cell phones and tablets involve virtually every type of security
challenge in and of themselves.
 Disaster recovery/business continuity planning: In the event of a breach, natural disaster
or other event data must be protected and business must go on. For this, you’ll need a
plan.
 End-user education: Users may be employees accessing the network or customers
logging on to a company app. educating good habits (password changes, 2-factor
authentication, etc.) is an important part of cyber security.
THE SCALE OFTHE CYBERTHREAT
 The global cyber threat continues to evolve at a rapid pace, with a rising
number of data breaches each year. A report by Risk Based Security revealed
that a shocking 7.9 billion records have been exposed by data breaches in the
first nine months of 2019 alone. This figure is more than double (112%) the
number of records exposed in the same period in 2018.
 Medical services, retailers and public entities experienced the most breaches,
with malicious criminals responsible for most incidents. Some of these sectors
are more appealing to cybercriminals because they collect financial and medical
data, but all businesses that use networks can be targeted for customer data,
corporate espionage, or customer attacks.
 With the scale of the cyber threat set to continue to rise, the International Data
Corporation predicts that worldwide spending on cyber-security solutions will
reach a massive $133.7 billion by 2022. Governments across the globe have
responded to the rising cyber threat with guidance to help organizations
implement effective cyber-security practices.
TYPES OF CYBER THREATS
The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting
systems for financial gain or to cause disruption.
2. Cyber-attack often involves politically motivated
information gathering.
3. Cyber terrorism is intended to undermine electronic
systems to cause panic or fear.
HOW DO MALICIOUS ACTORS GAIN CONTROL OF COMPUTER SYSTEMS?
HERE ARE SOME COMMON METHODS USED TO THREATEN CYBER-
SECURITY:
Malware: Malware means malicious software. One of the most common cyber threats, malware is software
that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread
via an unsolicited email attachment or legitimate-looking download, malware may be used by
cybercriminals to make money or in politically motivated cyber-attacks.
There are a number of different types of malware, including:
 Virus: A self-replicating program that attaches itself to clean file and spreads throughout a computer
system, infecting files with malicious code.
 Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick users into
uploadingTrojans onto their computer where they cause damage or collect data.
 Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this
information. For example, spyware could capture credit card details.
 Ransomware: Malware which locks down a user’s files and data, with the threat of erasing it unless a
ransom is paid.
 Adware:Advertising software which can be used to spread malware.
 Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online
without the user’s permission.
 SQL injection: An SQL (structured language query) injection is a type of cyber-attack used to
take control of and steal data from a database. Cybercriminals exploit vulnerabilities in data-
driven applications to insert malicious code into a data based via a malicious SQL statement.
This gives them access to the sensitive information contained in the database.
 Phishing: Phishing is when cybercriminals target victims with emails that appear to be from a
legitimate company asking for sensitive information. Phishing attacks are often used to dupe
people into handing over credit card data and other personal information.
 Man-in-the-middle attack: A man-in-the-middle attack is a type of cyber threat where a
cybercriminal intercepts communication between two individuals in order to steal data. For
example, on an unsecure WiFi network, an attacker could intercept data being passed from the
victim’s device and the network.
 Denial-of-service attack: A denial-of-service attack is where cybercriminals prevent a computer
system from fulfilling legitimate requests by overwhelming the networks and servers with traffic.
This renders the system unusable, preventing an organization from carrying out vital functions.
 Latest cyber threats: What are the latest cyber threats that individuals and organizations need
to guard against? Here are some of the most recent cyber threats that the U.K., U.S., and
Australian governments have reported on.
 Dridex malware: In December 2019, the U.S. Department of Justice (DoJ) charged the leader of
an organized cyber-criminal group for their part in a global Dridex malware attack. This
malicious campaign affected the public, government, infrastructure and business worldwide.
Romance scams: In February 2020, the FBI warned U.S. citizens to be
aware of confidence fraud that cybercriminals commit using dating sites,
chat rooms and apps. Perpetrators take advantage of people seeking new
partners, duping victims into giving away personal data. The FBI
reports that romance cyber threats affected 114 victims in New Mexico
in 2019, with financial losses amounting to $1.6 million.
Emotet malware: In late 2019, The Australian Cyber Security
Centre warned national organizations about a widespread global cyber
threat from Emotet malware. Emotet is a sophisticated trojan that can
steal data and also load other malware. Emotet thrives on
unsophisticated password: a reminder of the importance of creating a
secure password to guard against cyber threats.
End-user protection: End-user protection or endpoint security is a crucial
aspect of cyber security. After all, it is often an individual (the end-user)
who accidentally uploads malware or another form of cyber threat to
their desktop, laptop or mobile device.
CYBER SAFETYTIPS - PROTECT YOURSELF AGAINST CYBER ATTACKS
How can businesses and individuals guard against cyber threats? Here are our top
cyber safety tips:
 Update your software and operating system: This means you benefit from the
latest security patches.
 Use anti-virus software: Security solutions like Kaspersky Total Security will
detect and removes threats. Keep your software updated for the best level of
protection.
 Use strong passwords: Ensure your passwords are not easily guessable.
 Do not open email attachments from unknown senders: These could be infected
with malware.
 Do not click on links in emails from unknown senders or unfamiliar websites: This
is a common way that malware is spread.
 Avoid using unsecure WiFi networks in public places: Unsecure networks leave
you vulnerable to man-in-the-middle attacks.
INFORMATION SECURITY VS. CYBER SECURITY
Because information technology has become the accepted corporate
buzz phrase that means, basically, "computers and related stuff," you
will sometimes see information security and cyber security used
interchangeably. Strictly speaking, cyber security is the broader
practice of defending IT assets from attack, and information security
is a specific discipline under the cyber security umbrella. Network
security and application security are sister practices to information
security, focusing on networks and app code, respectively.
Obviously, there's some overlap here. You can't secure data
transmitted across an insecure network or manipulated by a leaky
application. As well, there is plenty of information that isn't stored
electronically that also needs to be protected. Thus, the infosec pro's
remit is necessarily broad.
CYBER SECURITY INFORMATION SECURITY
It is the practice of protecting the data from outside the
resource on the internet.
It is all about protecting information from unauthorized
user, access and data modification or removal in order to
provide confidentiality, integrity, and availability.
It is about the ability to protect the use of cyberspace
from cyber attacks. It deals with protection of data from any form of threat.
Cyber security to protect anything in the cyber realm.
Information security is for information irrespective of the
realm.
Cyber security deals with danger against cyberspace.
Information security deals with the protection of data
from any form of threat.
Cyber security strikes against Cyber crimes, cyber frauds
and law enforcement.
Information security strives against unauthorized access,
disclosure modification and disruption.
On the other hand cyber security professionals with cyber
Information security professionals are the foundation of
data security and security professionals associated with it
Chapter 6 Security of Information and Cyber Security(FASS)

Weitere ähnliche Inhalte

Was ist angesagt?

HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know➲ Stella Bridges
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Information Security
Information SecurityInformation Security
Information Securityhaneefvf1
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

Was ist angesagt? (20)

HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Cyber security
Cyber securityCyber security
Cyber security
 
working within the private security industry
working within the private security industryworking within the private security industry
working within the private security industry
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Security incident
Security incidentSecurity incident
Security incident
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Cyber security
Cyber security Cyber security
Cyber security
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Ähnlich wie Chapter 6 Security of Information and Cyber Security(FASS)

Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfasiyahanif9977
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfasiyahanif9977
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfForgeahead Solutions
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...BusinessBerg
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...theindustryviewmagaz
 
Cyer security
Cyer securityCyer security
Cyer securitywindows21
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 

Ähnlich wie Chapter 6 Security of Information and Cyber Security(FASS) (20)

Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Cyer security
Cyer securityCyer security
Cyer security
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Information security
Information securityInformation security
Information security
 

Mehr von Md Shaifullar Rabbi

Chapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, Conventions
Chapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, ConventionsChapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, Conventions
Chapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, ConventionsMd Shaifullar Rabbi
 
Chapter-2 Local Currency Fares Ticketing terminology
Chapter-2 Local Currency Fares Ticketing terminologyChapter-2 Local Currency Fares Ticketing terminology
Chapter-2 Local Currency Fares Ticketing terminologyMd Shaifullar Rabbi
 
Chapter-3 Types of Journey//Computerized Reservation System
Chapter-3 Types of Journey//Computerized Reservation SystemChapter-3 Types of Journey//Computerized Reservation System
Chapter-3 Types of Journey//Computerized Reservation SystemMd Shaifullar Rabbi
 
Chapter-4 Introduction to Global Distributions System and Computerized Reserv...
Chapter-4 Introduction to Global Distributions System and Computerized Reserv...Chapter-4 Introduction to Global Distributions System and Computerized Reserv...
Chapter-4 Introduction to Global Distributions System and Computerized Reserv...Md Shaifullar Rabbi
 
Session on Responsible Tourism and Entertainment Park.pdf
Session on Responsible Tourism and Entertainment Park.pdfSession on Responsible Tourism and Entertainment Park.pdf
Session on Responsible Tourism and Entertainment Park.pdfMd Shaifullar Rabbi
 
Online Travel Agency, Functions and Formation(OTA)
Online Travel Agency, Functions and Formation(OTA)Online Travel Agency, Functions and Formation(OTA)
Online Travel Agency, Functions and Formation(OTA)Md Shaifullar Rabbi
 
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...Md Shaifullar Rabbi
 
Basic of Air Ticketing & IATA Geography
Basic of Air Ticketing & IATA GeographyBasic of Air Ticketing & IATA Geography
Basic of Air Ticketing & IATA GeographyMd Shaifullar Rabbi
 
Global Distribution System (GDS).pdf
Global Distribution System (GDS).pdfGlobal Distribution System (GDS).pdf
Global Distribution System (GDS).pdfMd Shaifullar Rabbi
 
GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing & Reserv...
GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing &  Reserv...GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing &  Reserv...
GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing & Reserv...Md Shaifullar Rabbi
 
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)Md Shaifullar Rabbi
 
GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...
GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...
GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...Md Shaifullar Rabbi
 
Chapter 1 : Introduction to Travel and Tourism
Chapter 1 : Introduction to Travel and TourismChapter 1 : Introduction to Travel and Tourism
Chapter 1 : Introduction to Travel and TourismMd Shaifullar Rabbi
 
Travel Documents //VISA Processing .pdf
Travel Documents //VISA Processing .pdfTravel Documents //VISA Processing .pdf
Travel Documents //VISA Processing .pdfMd Shaifullar Rabbi
 
Tour Itinerary// Types// How to prepare
Tour Itinerary// Types// How to prepare Tour Itinerary// Types// How to prepare
Tour Itinerary// Types// How to prepare Md Shaifullar Rabbi
 
Define Tour Brochure // Types// How to Prepare
Define Tour  Brochure // Types// How to PrepareDefine Tour  Brochure // Types// How to Prepare
Define Tour Brochure // Types// How to PrepareMd Shaifullar Rabbi
 
SABRE Reservation System (Reservation and Ticketing)
SABRE Reservation System (Reservation and Ticketing)SABRE Reservation System (Reservation and Ticketing)
SABRE Reservation System (Reservation and Ticketing)Md Shaifullar Rabbi
 
Tour Operators Association of Bangladesh (TOAB)
Tour Operators Association of Bangladesh (TOAB)Tour Operators Association of Bangladesh (TOAB)
Tour Operators Association of Bangladesh (TOAB)Md Shaifullar Rabbi
 
Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)
Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)
Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)Md Shaifullar Rabbi
 

Mehr von Md Shaifullar Rabbi (20)

Chapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, Conventions
Chapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, ConventionsChapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, Conventions
Chapter-1 IATA, UFTAA, ICAO, FAA, CAA, ATAB, Conventions
 
Chapter-2 Local Currency Fares Ticketing terminology
Chapter-2 Local Currency Fares Ticketing terminologyChapter-2 Local Currency Fares Ticketing terminology
Chapter-2 Local Currency Fares Ticketing terminology
 
Chapter-3 Types of Journey//Computerized Reservation System
Chapter-3 Types of Journey//Computerized Reservation SystemChapter-3 Types of Journey//Computerized Reservation System
Chapter-3 Types of Journey//Computerized Reservation System
 
Chapter-4 Introduction to Global Distributions System and Computerized Reserv...
Chapter-4 Introduction to Global Distributions System and Computerized Reserv...Chapter-4 Introduction to Global Distributions System and Computerized Reserv...
Chapter-4 Introduction to Global Distributions System and Computerized Reserv...
 
Session on Responsible Tourism and Entertainment Park.pdf
Session on Responsible Tourism and Entertainment Park.pdfSession on Responsible Tourism and Entertainment Park.pdf
Session on Responsible Tourism and Entertainment Park.pdf
 
Online Travel Agency, Functions and Formation(OTA)
Online Travel Agency, Functions and Formation(OTA)Online Travel Agency, Functions and Formation(OTA)
Online Travel Agency, Functions and Formation(OTA)
 
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...
 
Basic of Air Ticketing & IATA Geography
Basic of Air Ticketing & IATA GeographyBasic of Air Ticketing & IATA Geography
Basic of Air Ticketing & IATA Geography
 
Global Distribution System (GDS).pdf
Global Distribution System (GDS).pdfGlobal Distribution System (GDS).pdf
Global Distribution System (GDS).pdf
 
GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing & Reserv...
GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing &  Reserv...GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing &  Reserv...
GDS Sabre Red 360 Quick Reference for Basic Learner (Air Ticketing & Reserv...
 
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)
 
GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...
GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...
GDS-Sabre Reservation System: Reservation & Ticketing Basic and Advance Trai...
 
Chapter 1 : Introduction to Travel and Tourism
Chapter 1 : Introduction to Travel and TourismChapter 1 : Introduction to Travel and Tourism
Chapter 1 : Introduction to Travel and Tourism
 
Travel Documents //VISA Processing .pdf
Travel Documents //VISA Processing .pdfTravel Documents //VISA Processing .pdf
Travel Documents //VISA Processing .pdf
 
Tour Itinerary// Types// How to prepare
Tour Itinerary// Types// How to prepare Tour Itinerary// Types// How to prepare
Tour Itinerary// Types// How to prepare
 
Define Tour Brochure // Types// How to Prepare
Define Tour  Brochure // Types// How to PrepareDefine Tour  Brochure // Types// How to Prepare
Define Tour Brochure // Types// How to Prepare
 
SABRE Reservation System (Reservation and Ticketing)
SABRE Reservation System (Reservation and Ticketing)SABRE Reservation System (Reservation and Ticketing)
SABRE Reservation System (Reservation and Ticketing)
 
Bangladesh Parjatan Corporation
Bangladesh Parjatan CorporationBangladesh Parjatan Corporation
Bangladesh Parjatan Corporation
 
Tour Operators Association of Bangladesh (TOAB)
Tour Operators Association of Bangladesh (TOAB)Tour Operators Association of Bangladesh (TOAB)
Tour Operators Association of Bangladesh (TOAB)
 
Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)
Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)
Bangladesh Tourism Board(বাংলাদেশ ট্যুরিজম বোর্ড)
 

Kürzlich hochgeladen

Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja Nehwal
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理cowagem
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Pooja Nehwal
 
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)Soham Mondal
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boodykojalkojal131
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfKen Fuller
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Top Rated Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Call Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 

Kürzlich hochgeladen (20)

Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
 
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Top Rated Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Warje ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

Chapter 6 Security of Information and Cyber Security(FASS)

  • 1. SECURITY OF INFORMATION AND CYBER SECURITY
  • 2. SPEAKER PROFILE: MD. SHAIFULLAR RABBI TOURISM EDUCATOR & CONSULTANT Professional Experiences Coordinator & Lecturer- Dept. of Tourism & Hospitality Management, Daffodil Institute of IT(Affiliated National University) Assessor -Bangladesh Technical Education Board (Ticketing and Reservation) Guest Trainer - Sheikh Hasina National Institute of Youth Development GuestTrainer - ATABTourismTraining Institute GuestTrainer- HB AviationTraining Center Guest Trainer - Bangladesh Hotel Management Tourism Training Institute Former Manager sales - Mamun Air Service (IATA Travel Agency) Founder –Travel Memoria Educational Qualifications MBA & BBA-Major in Tourism & Hospitality Management, University of Dhaka. Certified NTVQF Level -4/Assessor Part (Ticketing And Reservation) Completed Diploma Course in Travel Agency & Tour Operation Management Certified NTVQF Level 2 Course entitled Ticketing & Reservation Certified NTVQF Level 1 Course entitled Tour Guiding
  • 3. INFORMATION SECURITY DEFINITION Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording or devaluation of information.  This is largely achieved through a structured risk management process that involves:  Identifying information and related assets, plus potential threats, vulnerabilities and impacts;  Evaluating the risks;  Deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them;  Where risk mitigation is required, selecting or designing appropriate security controls and implementing them;  Monitoring the activities, making adjustments as necessary to address any issues, changes and improvement opportunities.
  • 4.
  • 5. TYPES OF INFORMATION SECURITY  Application security: Application security is a broad topic that covers software vulnerabilities in web and mobile applications and application programming interfaces (APIs). These vulnerabilities may be found in authentication or authorization of users, integrity of code and configurations, and mature policies and procedures. Application vulnerabilities can create entry points for significant Information security breaches. Application security is an important part of perimeter defense for Information security. Cloud security: Cloud security focuses on building and hosting secure applications in cloud environments and securely consuming third-party cloud applications. “Cloud” simply means that the application is running in a shared environment. Businesses must make sure that there is adequate isolation between different processes in shared environments.
  • 6. Cryptography: Encrypting data in transit and data at rest helps ensure data confidentiality and integrity. Digital signatures are commonly used in cryptography to validate the authenticity of data. Cryptography and encryption has become increasingly important. A good example of cryptography use is the Advanced Encryption Standard (AES). The AES is a symmetric key algorithm used to protect classified government information. Infrastructure security: Infrastructure security deals with the protection of internal and extranet networks, labs, data centers, servers, desktops, and mobile devices.
  • 7. INFORMATION SECURITY PRINCIPLES The basic components of information security are most often summed up by the so-called CIA triad: confidentiality, integrity, and availability. Confidentiality is perhaps the element of the triad that most immediately comes to mind when you think of information security. Integrity means maintaining data in its correct state and preventing it from being improperly modified, either by accident or maliciously. Many of the techniques that ensure confidentiality will also protect data integrity. Availability is the mirror image of confidentiality: while you need to make sure that your data can't be accessed by unauthorized users, you also need to ensure that it can be accessed by those who have the proper permissions.
  • 8. INFORMATION SECURITY POLICY The means by which these principles are applied to an organization take the form of a security policy. This isn't a piece of security hardware or software; rather, it's a document that an enterprise draws up, based on its own specific needs and quirks, to establish what data needs to be protected and in what ways. These policies guide the organization's decisions around procuring cyber security tools, and also mandate employee behavior and responsibilities.
  • 9. AMONG OTHERTHINGS,YOUR COMPANY'S INFORMATION SECURITY POLICY SHOULD INCLUDE: A statement describing the purpose of the information security program and your overall objectives: Definitions of key terms used in the document to ensure shared understanding An access control policy, determining who has access to what data and how they can establish their rights A password policy A data support and operations plan to ensure that data is always available to those who need it Employee roles and responsibilities when it comes to safeguarding data, including who is ultimately responsible for information security
  • 10. INFORMATION SECURITY MEASURES As should be clear by now, just about all the technical measures associated with cyber security touch on information security to a certain degree, but there it is worthwhile to think about Information security measures in a big- picture way: Technical measures include the hardware and software that protects data — everything from encryption to firewalls Organizational measures include the creation of an internal unit dedicated to information security, along with making Information security part of the duties of some staff in every department Human measures include providing awareness training for users on proper Information security practices Physical measures include controlling access to the office locations and, especially, data centers
  • 11. DEFINITION OF CYBER SECURITY Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security. Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
  • 12.
  • 13. THE IMPORTANCE OF CYBER SECURITY  Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.  Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describe the discipline dedicated to protecting that information and the systems used to process or store it. As the volume and sophistication of cyber-attacks grow, companies and organizations, especially those that are tasked with safeguarding information relating to national security, health, or financial records, need to take steps to protect their sensitive business and personnel information.
  • 14. CHALLENGES/ ELEMENTS OF CYBER SECURITY For an effective cyber security, an organization needs to coordinate its efforts throughout its entire information system. Elements of cyber encompass all of the following: Network security: The process of protecting the network from unwanted users, attacks and intrusions. Application security: Apps require constant updates and testing to ensure these programs are secure from attacks. Endpoint security: Remote access is a necessary part of business, but can also be a weak point for data. Endpoint security is the process of protecting remote access to a company’s network. Data security: Inside of networks and applications is data. Protecting company and customer information is a separate layer of security.
  • 15.  Identity management: Essentially, this is a process of understanding the access every individual has in an organization.  Database and infrastructure security: Everything in a network involves databases and physical equipment. Protecting these devices is equally important.  Cloud security: Many files are in digital environments or “the cloud”. Protecting data in a 100% online environment presents a large amount of challenges.  Mobile security: Cell phones and tablets involve virtually every type of security challenge in and of themselves.  Disaster recovery/business continuity planning: In the event of a breach, natural disaster or other event data must be protected and business must go on. For this, you’ll need a plan.  End-user education: Users may be employees accessing the network or customers logging on to a company app. educating good habits (password changes, 2-factor authentication, etc.) is an important part of cyber security.
  • 16. THE SCALE OFTHE CYBERTHREAT  The global cyber threat continues to evolve at a rapid pace, with a rising number of data breaches each year. A report by Risk Based Security revealed that a shocking 7.9 billion records have been exposed by data breaches in the first nine months of 2019 alone. This figure is more than double (112%) the number of records exposed in the same period in 2018.  Medical services, retailers and public entities experienced the most breaches, with malicious criminals responsible for most incidents. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.  With the scale of the cyber threat set to continue to rise, the International Data Corporation predicts that worldwide spending on cyber-security solutions will reach a massive $133.7 billion by 2022. Governments across the globe have responded to the rising cyber threat with guidance to help organizations implement effective cyber-security practices.
  • 17. TYPES OF CYBER THREATS The threats countered by cyber-security are three-fold: 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. 2. Cyber-attack often involves politically motivated information gathering. 3. Cyber terrorism is intended to undermine electronic systems to cause panic or fear.
  • 18. HOW DO MALICIOUS ACTORS GAIN CONTROL OF COMPUTER SYSTEMS? HERE ARE SOME COMMON METHODS USED TO THREATEN CYBER- SECURITY: Malware: Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks. There are a number of different types of malware, including:  Virus: A self-replicating program that attaches itself to clean file and spreads throughout a computer system, infecting files with malicious code.  Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploadingTrojans onto their computer where they cause damage or collect data.  Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details.  Ransomware: Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.  Adware:Advertising software which can be used to spread malware.  Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission.
  • 19.  SQL injection: An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database. Cybercriminals exploit vulnerabilities in data- driven applications to insert malicious code into a data based via a malicious SQL statement. This gives them access to the sensitive information contained in the database.  Phishing: Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information.  Man-in-the-middle attack: A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two individuals in order to steal data. For example, on an unsecure WiFi network, an attacker could intercept data being passed from the victim’s device and the network.  Denial-of-service attack: A denial-of-service attack is where cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions.  Latest cyber threats: What are the latest cyber threats that individuals and organizations need to guard against? Here are some of the most recent cyber threats that the U.K., U.S., and Australian governments have reported on.  Dridex malware: In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an organized cyber-criminal group for their part in a global Dridex malware attack. This malicious campaign affected the public, government, infrastructure and business worldwide.
  • 20. Romance scams: In February 2020, the FBI warned U.S. citizens to be aware of confidence fraud that cybercriminals commit using dating sites, chat rooms and apps. Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. The FBI reports that romance cyber threats affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million. Emotet malware: In late 2019, The Australian Cyber Security Centre warned national organizations about a widespread global cyber threat from Emotet malware. Emotet is a sophisticated trojan that can steal data and also load other malware. Emotet thrives on unsophisticated password: a reminder of the importance of creating a secure password to guard against cyber threats. End-user protection: End-user protection or endpoint security is a crucial aspect of cyber security. After all, it is often an individual (the end-user) who accidentally uploads malware or another form of cyber threat to their desktop, laptop or mobile device.
  • 21. CYBER SAFETYTIPS - PROTECT YOURSELF AGAINST CYBER ATTACKS How can businesses and individuals guard against cyber threats? Here are our top cyber safety tips:  Update your software and operating system: This means you benefit from the latest security patches.  Use anti-virus software: Security solutions like Kaspersky Total Security will detect and removes threats. Keep your software updated for the best level of protection.  Use strong passwords: Ensure your passwords are not easily guessable.  Do not open email attachments from unknown senders: These could be infected with malware.  Do not click on links in emails from unknown senders or unfamiliar websites: This is a common way that malware is spread.  Avoid using unsecure WiFi networks in public places: Unsecure networks leave you vulnerable to man-in-the-middle attacks.
  • 22. INFORMATION SECURITY VS. CYBER SECURITY Because information technology has become the accepted corporate buzz phrase that means, basically, "computers and related stuff," you will sometimes see information security and cyber security used interchangeably. Strictly speaking, cyber security is the broader practice of defending IT assets from attack, and information security is a specific discipline under the cyber security umbrella. Network security and application security are sister practices to information security, focusing on networks and app code, respectively. Obviously, there's some overlap here. You can't secure data transmitted across an insecure network or manipulated by a leaky application. As well, there is plenty of information that isn't stored electronically that also needs to be protected. Thus, the infosec pro's remit is necessarily broad.
  • 23. CYBER SECURITY INFORMATION SECURITY It is the practice of protecting the data from outside the resource on the internet. It is all about protecting information from unauthorized user, access and data modification or removal in order to provide confidentiality, integrity, and availability. It is about the ability to protect the use of cyberspace from cyber attacks. It deals with protection of data from any form of threat. Cyber security to protect anything in the cyber realm. Information security is for information irrespective of the realm. Cyber security deals with danger against cyberspace. Information security deals with the protection of data from any form of threat. Cyber security strikes against Cyber crimes, cyber frauds and law enforcement. Information security strives against unauthorized access, disclosure modification and disruption. On the other hand cyber security professionals with cyber Information security professionals are the foundation of data security and security professionals associated with it