SlideShare ist ein Scribd-Unternehmen logo
1 von 12
SECURITIES
Computer security, cyber
security or information technology
security (IT security) is the protection
of computersystems and networks fr
om information disclosure, theft of or
damage to their hardware, software,
or electronic data, as well as from
the disruption or misdirection of the
services they provide.
Cyber system:
It is the combination of all
the resources that provides
cyber services. Resources
can be any facility,
equipment, procedures and
communications.
System security:
A computer system has many numbers of
security threads. The main objective of the
system security is to provide protection of
information. It also includes the
development of security measures.
There are some most common security
threads
Malware: it can be treated as malware software. It
contains disturbing or annoying software or program
code. It can be any virus, spyware or malicious root kit.
Virus: the virus can spread from one computer to
another with the help of email, file or software. It can
delete, corrupt or modify your complete data.
Trojan: it is a type of malware. It is designed to
damage or steals your information from your system. A
Trojan can do anything inside your system.
Spam: it refers to the spamming. In
the case of security spam used to define email
spam. Spam messages can contain infected
links that can harm your system.
Network security
Is a broad term. It is the set of
rules and procedures to protect
the network. In simple terms it is
the process of adopting security
measures related to physical and
software, to protect the network
infrastructure from unauthorized
activity.
Types of Network
security
It is important for all organization and small
businesses to protect their network from
attackers and hackers. Following are the types of
network securities.
Network access control: to ensure the network
security, access control should be limited or to be
given only authorized members. For example, you
could grant administrators complete access but
refuse to access some important file and folders.
Antivirus/malware: Use some best antivirus and anti-
malware software that will protect the network from
worms, Trojans and Ran some wares
Firewall: it is a network security system to protect the network from all
unauthorized activity. It permits or blocks the traffic according to the defined set of
rules. It can be a software utility or hardware device that acts as a filter for all
incoming traffic and connections.
Email security: attackers use personal information then create a phishing
campaign to deceive recipients. Email security is required for controlling these
types of phishing emails in order to prevent the loss of sensitive data
.
Application security: application security is very important because
attackers can enter into your network by using the weaknesses or holes of the
application. It is possible for any application to incorporates the software and
hardware you select for removing those holes and weaknesses.
VPN: It stands for the virtual private network. It provides network security by
encrypting the connection from an endpoint to network. It is another type of
network security which uses IP sec or secure sockets in remote-access VPN. It is
used for authenticating the communication between user and device
.
Wireless security: wireless networks are less secure than wired networks. It
is easy to break wireless network so the wireless security must be strong enough.
Use only that devices that provide the best security to the wireless network.
Why is Cyber Security Important
for Companies Today?
Often some organizations take their data security lightly and
as a result, they fall victim to cyber attacks. In fact, our
companies are still not immune to these evolving cyber
attacks. But thanks to these fast-developing technology
standards today, cyber security has become a priority for
every organization across the world.
Think you are secure online? Think again!
It is a serious matter of how cyber attacks are
shaping in every form possible in order to stay one
step ahead of the development in technology.
Phishing, ransom ware, cyber scams are some of
the common yet highly dangerous cyber attacks that
are designed with the motive to access and exploit
the user’s sensitive data and extort money out of it.
•Rise of Cyber Crimes
Be it a large scale or a small scale firm, hackers and cyber criminals spare
no one. Rather, they lookout for opportunities to exploit data and get money
out of these firms. Over the past year, the average cost of cyber crime for
an organization has increased 23% more than last year. With the
introduction of new technologies, the chances of cyber threats and risks are
also rapidly increasing
•Growth of Iot Devices
The introduction of Iot technology i.e. Internet of Things, has not only
simplified and speed up our tasks but has also created a pit of new
vulnerabilities for hackers to exploit. No matter how advanced security
measures we take, Cyber criminals will always stay one step ahead to
attempt cyber crimes. If these internet-connected devices are not managed
properly then they can provide a gateway to business to hackers or cyber
criminals!
•Bridge to Security Gap
Human resources and IT resources have always been one of the
most important aspects of any organization. Regardless of their
dependency on each other, there has always been a security gap
between both aspects. In order to bridge this gap, it is important to
provide individuals working in an organization with the right cyber
security awareness training. Training for employees is necessary to
bridge the gap of cyber security skills and to create a cyber-resilient
working culture in the organization.
Well, now you know why bridging the security gap is important!
ForensicsffFORENSICS
Forensic science is a combination of forensics and science. It means
applying scientific methods, tools and procedures for solving the
crime. The “forensic” word comes from the Latin word that means
public. Forensic science is a science used in public, in court or in the
justice system.
Applications of forensic science
•Inspection of physical evidence
•Clear and short reporting
•Understanding of data
•Management of tests
Forensic science is further classified:
•Forensic toxicology
•Forensic geology
•Forensic Botany
•Forensic DNA analysis
•Digital Forensic
•Forensic pathology
•Forensic archaeology
•Forensic podiatry
Forensics science can be a challenging task for new students because it has a very vast area. It covers many
subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as
mathematics.

Weitere ähnliche Inhalte

Ähnlich wie ppt on securities.pptx

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfRavirajChavan10
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdfYashwanth Rm
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfNeilStark1
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 

Ähnlich wie ppt on securities.pptx (20)

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 

Mehr von muskaangoel15

091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdf091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdfmuskaangoel15
 
Chapter 7 Human memory.ppt
Chapter 7 Human memory.pptChapter 7 Human memory.ppt
Chapter 7 Human memory.pptmuskaangoel15
 
chap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.pptchap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.pptmuskaangoel15
 
ban on plastic bags.pdf
ban on plastic bags.pdfban on plastic bags.pdf
ban on plastic bags.pdfmuskaangoel15
 
tf02922647_win32.potx
tf02922647_win32.potxtf02922647_win32.potx
tf02922647_win32.potxmuskaangoel15
 

Mehr von muskaangoel15 (8)

091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdf091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
091f7fac-0815-4288-bb14-a25a9e8c030f.pdf
 
WRITING SKILL.pptx
WRITING SKILL.pptxWRITING SKILL.pptx
WRITING SKILL.pptx
 
icai weightage.pdf
icai weightage.pdficai weightage.pdf
icai weightage.pdf
 
Chapter 7 Human memory.ppt
Chapter 7 Human memory.pptChapter 7 Human memory.ppt
Chapter 7 Human memory.ppt
 
XII CH 1 PPT.pptx
XII CH 1 PPT.pptxXII CH 1 PPT.pptx
XII CH 1 PPT.pptx
 
chap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.pptchap 5 Sensory, attentional and perceptual processes.ppt
chap 5 Sensory, attentional and perceptual processes.ppt
 
ban on plastic bags.pdf
ban on plastic bags.pdfban on plastic bags.pdf
ban on plastic bags.pdf
 
tf02922647_win32.potx
tf02922647_win32.potxtf02922647_win32.potx
tf02922647_win32.potx
 

Kürzlich hochgeladen

20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 

Kürzlich hochgeladen (20)

20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 

ppt on securities.pptx

  • 2. Computer security, cyber security or information technology security (IT security) is the protection of computersystems and networks fr om information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  • 3. Cyber system: It is the combination of all the resources that provides cyber services. Resources can be any facility, equipment, procedures and communications. System security: A computer system has many numbers of security threads. The main objective of the system security is to provide protection of information. It also includes the development of security measures.
  • 4. There are some most common security threads Malware: it can be treated as malware software. It contains disturbing or annoying software or program code. It can be any virus, spyware or malicious root kit. Virus: the virus can spread from one computer to another with the help of email, file or software. It can delete, corrupt or modify your complete data. Trojan: it is a type of malware. It is designed to damage or steals your information from your system. A Trojan can do anything inside your system. Spam: it refers to the spamming. In the case of security spam used to define email spam. Spam messages can contain infected links that can harm your system.
  • 5. Network security Is a broad term. It is the set of rules and procedures to protect the network. In simple terms it is the process of adopting security measures related to physical and software, to protect the network infrastructure from unauthorized activity.
  • 6. Types of Network security It is important for all organization and small businesses to protect their network from attackers and hackers. Following are the types of network securities. Network access control: to ensure the network security, access control should be limited or to be given only authorized members. For example, you could grant administrators complete access but refuse to access some important file and folders. Antivirus/malware: Use some best antivirus and anti- malware software that will protect the network from worms, Trojans and Ran some wares
  • 7. Firewall: it is a network security system to protect the network from all unauthorized activity. It permits or blocks the traffic according to the defined set of rules. It can be a software utility or hardware device that acts as a filter for all incoming traffic and connections. Email security: attackers use personal information then create a phishing campaign to deceive recipients. Email security is required for controlling these types of phishing emails in order to prevent the loss of sensitive data . Application security: application security is very important because attackers can enter into your network by using the weaknesses or holes of the application. It is possible for any application to incorporates the software and hardware you select for removing those holes and weaknesses. VPN: It stands for the virtual private network. It provides network security by encrypting the connection from an endpoint to network. It is another type of network security which uses IP sec or secure sockets in remote-access VPN. It is used for authenticating the communication between user and device . Wireless security: wireless networks are less secure than wired networks. It is easy to break wireless network so the wireless security must be strong enough. Use only that devices that provide the best security to the wireless network.
  • 8. Why is Cyber Security Important for Companies Today? Often some organizations take their data security lightly and as a result, they fall victim to cyber attacks. In fact, our companies are still not immune to these evolving cyber attacks. But thanks to these fast-developing technology standards today, cyber security has become a priority for every organization across the world.
  • 9. Think you are secure online? Think again! It is a serious matter of how cyber attacks are shaping in every form possible in order to stay one step ahead of the development in technology. Phishing, ransom ware, cyber scams are some of the common yet highly dangerous cyber attacks that are designed with the motive to access and exploit the user’s sensitive data and extort money out of it.
  • 10. •Rise of Cyber Crimes Be it a large scale or a small scale firm, hackers and cyber criminals spare no one. Rather, they lookout for opportunities to exploit data and get money out of these firms. Over the past year, the average cost of cyber crime for an organization has increased 23% more than last year. With the introduction of new technologies, the chances of cyber threats and risks are also rapidly increasing •Growth of Iot Devices The introduction of Iot technology i.e. Internet of Things, has not only simplified and speed up our tasks but has also created a pit of new vulnerabilities for hackers to exploit. No matter how advanced security measures we take, Cyber criminals will always stay one step ahead to attempt cyber crimes. If these internet-connected devices are not managed properly then they can provide a gateway to business to hackers or cyber criminals!
  • 11. •Bridge to Security Gap Human resources and IT resources have always been one of the most important aspects of any organization. Regardless of their dependency on each other, there has always been a security gap between both aspects. In order to bridge this gap, it is important to provide individuals working in an organization with the right cyber security awareness training. Training for employees is necessary to bridge the gap of cyber security skills and to create a cyber-resilient working culture in the organization. Well, now you know why bridging the security gap is important!
  • 12. ForensicsffFORENSICS Forensic science is a combination of forensics and science. It means applying scientific methods, tools and procedures for solving the crime. The “forensic” word comes from the Latin word that means public. Forensic science is a science used in public, in court or in the justice system. Applications of forensic science •Inspection of physical evidence •Clear and short reporting •Understanding of data •Management of tests Forensic science is further classified: •Forensic toxicology •Forensic geology •Forensic Botany •Forensic DNA analysis •Digital Forensic •Forensic pathology •Forensic archaeology •Forensic podiatry Forensics science can be a challenging task for new students because it has a very vast area. It covers many subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as mathematics.