SlideShare ist ein Scribd-Unternehmen logo
1 von 10
GOBI ARTS & SCIENCE COLLEGE
(Govt. Aided Autonomous Co-educational Institution, Affiliated to
Bharathiar University, Coimbatore,Accredited with 'A' Grade by NAAC (4th cycle)
and Recognised as a STAR College by DBT, Government of India.)
DEPARTMENT OF MANAGEMENT STUDIES
M.B.A. (MASTER OF BUSINESS ADMINISTRATION)
Presentation on
Critical IT and National Critical Infrastructure
Subject Title
Cyber Security
Subject Incharge
Mr.N.Balusamy
MBA (IM), MBA (IB), M.Sc (Psy), M.A (Eco),
M.A (JMC), M.A (Phi), M.A (Ps), M.A (His)
PDAD, PDIT, MDSA, DAE, MDDP, CGP
Assistant Professor
Presented By
M.R.Sivaram
23-13-156
CRITICAL IT AND NATIONAL
CRITICAL INFRASTRUCTURE
OBJECTIVES
• THE OBJECTIVES OF CRITICAL IT INCLUDE ENSURING THE RELIABILITY,
SECURITY, AND EFFICIENCY OF IT SYSTEMS, ANALYZING POTENTIAL RISKS, AND
IMPLEMENTING STRATEGIES TO MITIGATE THEM. CRITICAL IT ALSO AIMS TO
ALIGN TECHNOLOGY WITH BUSINESS GOALS, OPTIMIZE IT INFRASTRUCTURE,
AND FOSTER INNOVATION WHILE MAINTAINING COMPLIANCE WITH
REGULATIONS AND STANDARDS.
INTRODUCTION
IN AN INTERCONNECTED DIGITAL LANDSCAPE, SAFEGUARDING CRITICAL IT AND
NATIONAL CRITICAL INFRASTRUCTURE IS PARAMOUNT TO NATIONAL SECURITY.
CYBERSECURITY PLAYS A PIVOTAL ROLE IN FORTIFYING THESE VITAL SYSTEMS
AGAINST EVOLVING THREATS. FROM POWER GRIDS AND COMMUNICATION
NETWORKS TO SENSITIVE GOVERNMENT DATABASES, THE PROTECTION OF
CRITICAL ASSETS IS ESSENTIAL. THIS INTRODUCTION OUTLINES THE KEY
CHALLENGES AND OBJECTIVES IN SECURING THESE INFRASTRUCTURES,
EMPHASIZING THE NEED FOR A ROBUST CYBERSECURITY FRAMEWORK. AS
TECHNOLOGY ADVANCES, THE POTENTIAL RISKS GROW, MAKING IT IMPERATIVE
TO ESTABLISH PROACTIVE MEASURES TO MITIGATE CYBER THREATS AND ENSURE
THE RESILIENCE OF OUR CRITICAL SYSTEMS.
SCOPE OF CRITICAL IT
• RISK MANAGEMENT
• ANALYSIS
• SECURITY ARCHITECTURE
• COMPLIANCE AND STANDARDS
• VULNERABILITY MANAGEMENT
• TECHNOLOGICAL INNOVATION.
CRITICAL IT AND NATIONAL CRITICAL
INFRASTRUCTURE IN CYBER SECURITY :
• IN THE REALM OF CYBERSECURITY, CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE FORM THE BACKBONE OF A NATION’S
FUNCTIONALITY AND SECURITY. CRITICAL IT INCLUDES SYSTEMS CRUCIAL FOR DAY-TO-DAY OPERATIONS, WHILE NATIONAL CRITICAL
INFRASTRUCTURE ENCOMPASSES SECTORS LIKE ENERGY, TRANSPORTATION, AND HEALTHCARE, VITAL TO THE NATION’S WELL-BEING.
SECURING THESE ENTITIES INVOLVES:
1. **RESILIENCE BUILDING:** STRENGTHENING DEFENSES TO WITHSTAND CYBER THREATS AND SWIFTLY RECOVER FROM INCIDENTS, MINIMIZING
DISRUPTIONS.
2. **THREAT INTELLIGENCE:** CONTINUOUS MONITORING AND ANALYSIS OF CYBER THREATS TO ANTICIPATE AND COUNTERACT POTENTIAL
ATTACKS.
3. **PUBLIC-PRIVATE
COLLABORATION:** COLLABORATION BETWEEN GOVERNMENT BODIES AND PRIVATE SECTORS TO SHARE INFORMATION AND JOINTLY ADDRESS
CYBERSECURITY CHALLENGES.
CRITICAL IT AND NATIONAL CRITICAL
INFRASTRUCTURE*.
4. **REGULATORY COMPLIANCE:**
ADHERENCE TO CYBERSECURITY REGULATIONS AND STANDARDS TO ENSURE A BASELINE OF PROTECTION.
5. **ADVANCED TECHNOLOGIES:**
UTILIZING CUTTING-EDGE TECHNOLOGIES LIKE AI AND MACHINE LEARNING FOR PROACTIVE THREAT DETECTION AND RESPONSE.
6. **EMPLOYEE TRAINING:**
EDUCATING PERSONNEL ON CYBERSECURITY BEST PRACTICES TO REDUCE THE HUMAN FACTOR AS A VULNERABILITY.
7. **SUPPLY CHAIN SECURITY:**
ENSURING THE SECURITY OF THE SUPPLY CHAIN TO PREVENT VULNERABILITIES INTRODUCED BY THIRD-PARTY ENTITIES.
8. **INCIDENT RESPONSE PLANNING:**
DEVELOPING COMPREHENSIVE PLANS TO RESPOND EFFECTIVELY TO CYBER INCIDENTS, MINIMIZING IMPACT.
CONCLUSION
• CRITICAL IT SERVES AS THE LINCHPIN IN SAFEGUARDING ESSENTIAL
INFORMATION SYSTEMS, NETWORKS, AND DATA, WHILE NATIONAL CRITICAL
INFRASTRUCTURE ENSURES THE RELIABLE OPERATION OF KEY SECTORS VITAL
TO A NATION’S WELL-BEING. THE FUTURE OF THESE DOMAINS WILL LIKELY BE
SHAPED BY ADVANCEMENTS IN CYBERSECURITY TECHNOLOGIES, THE
INTEGRATION OF EMERGING TECHNOLOGIES, AND A HEIGHTENED FOCUS ON
COLLABORATION, RESILIENCE, AND PROACTIVE RISK MANAGEMENT.
REFERENCES
• HTTPS://WWW.CISA.GOV/TOPICS/CRITICAL-INFRASTRUCTURE-SECURITY-AND-
RESILIENCE/CRITICAL-INFRASTRUCTURE-SECTORS
• HTTPS://HUNTSMANSECURITY.COM/INDUSTRIES/CRITICAL-INFRASTRUCTURE/
FUTURE STUDIES
• FUTURE STUDIES IN CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE
ARE LIKELY TO FOCUS ON SEVERAL KEY AREAS:
• 1. RESILIENCE ENHANCEMENT
• 2. EMERGING TECHNOLOGIES
•
• 3.POLICY AND ETHICS

Weitere ähnliche Inhalte

Ähnlich wie DOCument of cyber security-20231220-WA0001..pptx

47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docxShiraPrater50
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkIGF Indonesia
 
Security in The Chemical Industry
Security in The Chemical Industry	Security in The Chemical Industry
Security in The Chemical Industry journal ijrtem
 
Security in The Chemical Industry
Security in The Chemical IndustrySecurity in The Chemical Industry
Security in The Chemical Industryjournal ijrtem
 
Security in The Chemical Industry
Security in The Chemical IndustrySecurity in The Chemical Industry
Security in The Chemical IndustryIJRTEMJOURNAL
 
Hlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docxHlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docx4934bk
 
Hlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docxHlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docxbkbk37
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmapAjay Ohri
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Evaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfEvaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfBhekumuzi Xaba
 

Ähnlich wie DOCument of cyber security-20231220-WA0001..pptx (20)

47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docx
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...
Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...
Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...
 
Security in The Chemical Industry
Security in The Chemical Industry	Security in The Chemical Industry
Security in The Chemical Industry
 
Security in The Chemical Industry
Security in The Chemical IndustrySecurity in The Chemical Industry
Security in The Chemical Industry
 
Security in The Chemical Industry
Security in The Chemical IndustrySecurity in The Chemical Industry
Security in The Chemical Industry
 
Hlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docxHlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docx
 
Hlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docxHlsc 2 HLSC 720 Critical.docx
Hlsc 2 HLSC 720 Critical.docx
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Evaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfEvaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdf
 

Kürzlich hochgeladen

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

DOCument of cyber security-20231220-WA0001..pptx

  • 1. GOBI ARTS & SCIENCE COLLEGE (Govt. Aided Autonomous Co-educational Institution, Affiliated to Bharathiar University, Coimbatore,Accredited with 'A' Grade by NAAC (4th cycle) and Recognised as a STAR College by DBT, Government of India.) DEPARTMENT OF MANAGEMENT STUDIES M.B.A. (MASTER OF BUSINESS ADMINISTRATION) Presentation on Critical IT and National Critical Infrastructure Subject Title Cyber Security Subject Incharge Mr.N.Balusamy MBA (IM), MBA (IB), M.Sc (Psy), M.A (Eco), M.A (JMC), M.A (Phi), M.A (Ps), M.A (His) PDAD, PDIT, MDSA, DAE, MDDP, CGP Assistant Professor Presented By M.R.Sivaram 23-13-156
  • 2. CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE
  • 3. OBJECTIVES • THE OBJECTIVES OF CRITICAL IT INCLUDE ENSURING THE RELIABILITY, SECURITY, AND EFFICIENCY OF IT SYSTEMS, ANALYZING POTENTIAL RISKS, AND IMPLEMENTING STRATEGIES TO MITIGATE THEM. CRITICAL IT ALSO AIMS TO ALIGN TECHNOLOGY WITH BUSINESS GOALS, OPTIMIZE IT INFRASTRUCTURE, AND FOSTER INNOVATION WHILE MAINTAINING COMPLIANCE WITH REGULATIONS AND STANDARDS.
  • 4. INTRODUCTION IN AN INTERCONNECTED DIGITAL LANDSCAPE, SAFEGUARDING CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE IS PARAMOUNT TO NATIONAL SECURITY. CYBERSECURITY PLAYS A PIVOTAL ROLE IN FORTIFYING THESE VITAL SYSTEMS AGAINST EVOLVING THREATS. FROM POWER GRIDS AND COMMUNICATION NETWORKS TO SENSITIVE GOVERNMENT DATABASES, THE PROTECTION OF CRITICAL ASSETS IS ESSENTIAL. THIS INTRODUCTION OUTLINES THE KEY CHALLENGES AND OBJECTIVES IN SECURING THESE INFRASTRUCTURES, EMPHASIZING THE NEED FOR A ROBUST CYBERSECURITY FRAMEWORK. AS TECHNOLOGY ADVANCES, THE POTENTIAL RISKS GROW, MAKING IT IMPERATIVE TO ESTABLISH PROACTIVE MEASURES TO MITIGATE CYBER THREATS AND ENSURE THE RESILIENCE OF OUR CRITICAL SYSTEMS.
  • 5. SCOPE OF CRITICAL IT • RISK MANAGEMENT • ANALYSIS • SECURITY ARCHITECTURE • COMPLIANCE AND STANDARDS • VULNERABILITY MANAGEMENT • TECHNOLOGICAL INNOVATION.
  • 6. CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE IN CYBER SECURITY : • IN THE REALM OF CYBERSECURITY, CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE FORM THE BACKBONE OF A NATION’S FUNCTIONALITY AND SECURITY. CRITICAL IT INCLUDES SYSTEMS CRUCIAL FOR DAY-TO-DAY OPERATIONS, WHILE NATIONAL CRITICAL INFRASTRUCTURE ENCOMPASSES SECTORS LIKE ENERGY, TRANSPORTATION, AND HEALTHCARE, VITAL TO THE NATION’S WELL-BEING. SECURING THESE ENTITIES INVOLVES: 1. **RESILIENCE BUILDING:** STRENGTHENING DEFENSES TO WITHSTAND CYBER THREATS AND SWIFTLY RECOVER FROM INCIDENTS, MINIMIZING DISRUPTIONS. 2. **THREAT INTELLIGENCE:** CONTINUOUS MONITORING AND ANALYSIS OF CYBER THREATS TO ANTICIPATE AND COUNTERACT POTENTIAL ATTACKS. 3. **PUBLIC-PRIVATE COLLABORATION:** COLLABORATION BETWEEN GOVERNMENT BODIES AND PRIVATE SECTORS TO SHARE INFORMATION AND JOINTLY ADDRESS CYBERSECURITY CHALLENGES.
  • 7. CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE*. 4. **REGULATORY COMPLIANCE:** ADHERENCE TO CYBERSECURITY REGULATIONS AND STANDARDS TO ENSURE A BASELINE OF PROTECTION. 5. **ADVANCED TECHNOLOGIES:** UTILIZING CUTTING-EDGE TECHNOLOGIES LIKE AI AND MACHINE LEARNING FOR PROACTIVE THREAT DETECTION AND RESPONSE. 6. **EMPLOYEE TRAINING:** EDUCATING PERSONNEL ON CYBERSECURITY BEST PRACTICES TO REDUCE THE HUMAN FACTOR AS A VULNERABILITY. 7. **SUPPLY CHAIN SECURITY:** ENSURING THE SECURITY OF THE SUPPLY CHAIN TO PREVENT VULNERABILITIES INTRODUCED BY THIRD-PARTY ENTITIES. 8. **INCIDENT RESPONSE PLANNING:** DEVELOPING COMPREHENSIVE PLANS TO RESPOND EFFECTIVELY TO CYBER INCIDENTS, MINIMIZING IMPACT.
  • 8. CONCLUSION • CRITICAL IT SERVES AS THE LINCHPIN IN SAFEGUARDING ESSENTIAL INFORMATION SYSTEMS, NETWORKS, AND DATA, WHILE NATIONAL CRITICAL INFRASTRUCTURE ENSURES THE RELIABLE OPERATION OF KEY SECTORS VITAL TO A NATION’S WELL-BEING. THE FUTURE OF THESE DOMAINS WILL LIKELY BE SHAPED BY ADVANCEMENTS IN CYBERSECURITY TECHNOLOGIES, THE INTEGRATION OF EMERGING TECHNOLOGIES, AND A HEIGHTENED FOCUS ON COLLABORATION, RESILIENCE, AND PROACTIVE RISK MANAGEMENT.
  • 10. FUTURE STUDIES • FUTURE STUDIES IN CRITICAL IT AND NATIONAL CRITICAL INFRASTRUCTURE ARE LIKELY TO FOCUS ON SEVERAL KEY AREAS: • 1. RESILIENCE ENHANCEMENT • 2. EMERGING TECHNOLOGIES • • 3.POLICY AND ETHICS