Professional Documents
Culture Documents
Cyber Security: Team Computers
Cyber Security: Team Computers
TEAM COMPUTERS
ROHIT GADPALE
THERE ARE FIVE TYPES OF NETWORK SECURITY
NETWORK SECURITY
APPLICATION SECURITY
END-POINTS SECURITY
EMAIL SECURITY
CLOUD SECURITY
WHAT IS CYBER SECURITY
• CYBER SECURITY IS THE PRACTICE OF DEFENDING COMPUTER, SERVERS, MOBILE DEVICES , ELECTRONIC
SYSTEMS, NETWORKS AND DATA FOR MALICIOUS ATTACKS
• INJECTION ATTACKS
• DNS spoofing
• SESSION HIJACKING
• PHISHING
• BRUTE FORCE
SYSTEM BASED ATTACK
• VIRUS
• WORM-EMAIL
• TROJAN HORSE
• BACK DOORS
• BOTS
ARTIFICIAL INTELLIGENCE
• THE ABILITY OF A COMPUTER OR A ROBOT CONTROLLED BY A COMPUTER TO DO TASKS THAT ARE USUALLY
DONE BY HUMANS BECAUSE THEY REQUIRE HUMAN INTELLIGENCE AND DISCERNMENT.APPS FOR AI
App used :
• CORTANA
• SIRI
• REPLIKA
• DATA BOT
NETWORK SECURITY SOLUTION
• FIREWALL
• DDOS ( DISTRIBUTED DENIAL OF SERVICE )
• IPS/IDS
• WAF
• ADC ( APPLICATION DELIVERY CONTROLLERS )
COMPLIANCE
• COMPANIES HAVE TO FOLLOW A CERTAIN SET OF
RULES