Professional Documents
Culture Documents
Cyber Security Office
Cyber Security Office
• Network security
• Application security
• Information
security
• Operational security
• Cloud Security
Network Security
It is the practice of securing a computer network from
intruders, whether targeted attackers or opportunistic
malware.
Access control.
Antivirus and anti-
malware software. ...
Application security. ...
Behavioral analytics. ...
Data loss prevention. ...
Distributed denial of
service prevention. ...
Email security. ...
Firewalls.
Application Security
It Focuses on keeping software and devices free
of threats.
Authentication
Authorization
Encryption
Logging
Application security
testing
Information Security
It protects the integrity and privacy of data, both in
storage and in transit.
Various Risks……
Identifying information and
related assets,potential threats, vulnareb
ilits and impacts
Evaluating the risks
Deciding how to address or treat the
risks
Where risk mitigation is required,
selecting or designing appropriate
security controls.
Making adjustments as necessary to
address any issues.
Operational Security
It includes the processes and decisions
for handling and protecting data.
Various Securities:-
Firewalls.
Network Access Control (NAC)
Devices.
Routers.
Switches.
Web Application Firewalls
(WAFs)
Proxy Servers.
Cloud Security
Cloud security is a software-based security tool that protects
and monitors the data in your cloud resources.
Various Risks
Distributed-Denial-of-Service Attacks.
Shared Cloud Computing Services.
Employee Negligence.
Data Loss and Data Backups.
Social Engineering Attacks.
System Vulnerabilities.
Types Of Hackers And Attackers
White Hat
Grey Hat
Black Hat
White Hat Hacker (Good One)