Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Cyber security and cyber

defense

–By
–BELLI ANUSHASREE
–197Z1A0520
ABSTRACT

Cyber Security composes a broad range of practices tools and concepts related closely to those
information and operational technology (OT) security.

“Cyber Security “ is a key challenge and a synonym for information security.

With the understanding of a specific environment, Cyber defense analyzes the possible threats
to the given environment.

It then helps in devising and driving the strategies necessary to counter the malicious attacks or
threats .
Main topic :
– Cybersecurity has been practiced in military circles for over a
decade.
– Misuse of the term obscures the significance of the practices
that make cybersecurity a superset of information security,
operational technology (OT) security, and IT security practices
related to digital assets
-(1) Systematic approach in
(3) Setting up a more efficient
the application and (2) Implementing activities
mechanism for information

National
development of the national and measures to improve the
sharing in order to ensure a
legal framework to take into security, resiliency and
higher level of general safety
account the new, cyber reliability of cyberspace;
in cyberspace.

cybersecurit
dimension of the society.

y strategy (4) Raising the awareness of (5) Encouraging the (6) Encouraging research and
security of all cyberspace development of harmonized development, particularly in
and action users. education programmes. the area of e-services.

plan:
(7) Systematic approach to
international cooperation in
the area of cyber security.
AREA OF SPECIALIZATION :

Cyber security and cyber defense. The Science of Protection and Prevention. Security in cyberspace is crucial, especially in the
modern world where most of our communications
and interactions happen over the Internet.
Existing system:

– The traditional cyber defense technologies


(e.g., authentication, access control, information encryption,
intrusion detection system, vulnerability scanning and virus
protection) have provided a certain degree of security, whereas
with the development of diversification attacks, the traditional
cyber defense is inadequate.
Disadvantages :

– The main disadvantage of existing system is there is no


prevention of of attacks before occuring .
– There are various methods that are used once the attack is
done .
– This is done after loosing some amount of data .
Proposed system:
– (1) Systematic approach in the application and development of the national
legal framework to take into account the new, cyber dimension of the society.
–  (2) Implementing activities and measures to improve the security, resiliency
and reliability of cyberspace;
–  (3) Setting up a more efficient mechanism for information sharing in order to
ensure a higher level of general safety in cyberspace.
–  (4) Raising the awareness of security of all cyberspace users.
–  (5) Encouraging the development of harmonized education programmes. 
– (6) Encouraging research and development, particularly in the area of e-
services.
–  (7) Systematic approach to international cooperation in the area of cyber
security.
Advantages:

– Critical communication and information infrastructure and


cyber crisis management will be on top nouch .
– People get to know how to utilise the It sector while dealing
with sensitive data .
– This will applicable to "PREVENTION IS BETTER THEN
CURE"
Architecture :
– Critical communication and information infrastructure and
cyber crisis management; Cybercrime.
– Cyber operations
– Cyber resiliency
– Cyberattack model (intrusion Kill Chain).
– National cybersecurity strategy and action plan.
–  Cyber resiliency situational awareness.
Modules:
Applications :

– DDoS security
– Web Firewall
– Bots
– Antivirus and Antimalware
– Threat management systems
– Critical systems
– Rules and regulations
Advantages and disadvantages:

– Cybersecurity protects systems and computers against viruses, worms, spyware,


malware, and other unwanted programs.
– It prevents users from unauthorized access to the network.
– Cyber Security offers improved security in cyberspace, It increases cyber defense, It
increases cyber speed, protects company data and information It protects individual
private information, It protects networks and resources, and It fights computer hackers
and identity theft.
– Cyber security makes the system slower than before.
–  Firewalls can be difficult to configure correctly, Incorrectly configured firewalls may
block users from performing certain actions on the Internet.
– Cyber Security will be costly for average users
Conclusion:
– The government has a major role to play in stimulating progress
toward higher levels of cybersecurity
– Limitations of national cybersecurity strategy are related to
interrelations and interconnections between many actors at
many hierarchical levels.
– Users usually have minimal knowledge of the technology they
are using, and the technology is applied in such a way that
makes it very hard to estimate the security characteristics of the
majority of commercial products regarding the protection of
user data confidentiality and privacy
References:
1. Cyber Defense. https://www.techopedia.com/defini tion/6705/cyber-defense. Accessed 2017-02-10.

2.A. Walls, Perkins E, Weiss J. Definition: “CybCybersecurityG00252816. Gartner Inc.; 2013.

3. NATO Cyber Cooperative Cyber Defence Center of Excellence Tallin Estonia. https://ccdcoe.org/cyber-de
fi nitions.html. Accessed 2017-02-10.

4. United States Department of Defense. Strategy for operating in cyberspace. Department of Defense; 2011
.

5. Scholtz T. Definition: “People-Centric Security“, G00250121. Gartner Inc.; 2013.

You might also like