3 - CyberrSecurity

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

MODULE CYBER

SECURITY
04
Prepared By:
Name
Instructor
Cyber Security

• the art of protecting networks, devices, and data


from unauthorized access or criminal use and the
practice of ensuring confidentiality, integrity, and
availability of information.
Risk of Having Poor Cyber Security

• Malware erasing your entire system.


• An attacker breaking into your system and altering files.
• An attacker using your computer to attack others.
• An attacker stealing your credit card information and making
unauthorized purchases.
✔ Application security
✔ Information or data
security
Elements of
✔ Network security
Cyber Security ✔ Disaster
recovery/business
continuity planning
✔ Operational security
✔ Cloud security
Elements of ✔ Critical infrastructure
Cyber Security security
✔ Physical security
✔ End-user education
Benefits of Cyber Security

✔ Business protection against cyber-attacks and data breaches.


✔ Protection for data and networks.
✔ Prevention of unauthorized user access.
✔ Improved recovery time after a breach.
Benefits of Cyber Security

✔ Protection for end users and endpoint devices.


✔ Regulatory compliance.
✔ Business continuity.
✔ Improved confidence in the company's reputation and trust
for developers, partners, customers, stakeholders and
employees
✔ Malware
Cyber Security ✔ Ransomware
✔ Social Engineering
Threats ✔ Phishing
✔ Spear Phishing
✔ Insider Threats
✔ Distributed denial-of-
service (DDoS) attacks
Cyber Security
✔ Advanced persistent
Threats threats (APTs)
✔ Man-in-the-middle
(MitM) attacks
TOP Cyber Security Challenges

• Hacker, attacker, or intruder


• Malicious code
• Vulnerabilities
• Shortage of Cyber Security Personnel
• Address End-User Education
• Evolving Nature of Security Risk
Automation in Cyber Security

• an integral component to keep companies protected


from the growing number and sophistication of
cyber-threats.
• Using artificial intelligence (AI) and machine
learning
Basic Cyber Security Practices

• Keep software up to date


• Run up-to-date antivirus software
• Use strong passwords
• Change default usernames and passwords
• Implement multi-factor authentication (MFA)
Basic Cyber Security Practices

• Install a firewall
• Be suspicious of unexpected emails
✔ Identity and access
management (IAM)
✔ Firewalls
Cyber Security ✔ Endpoint protection
✔ Antimalware
Vendors and ✔ Intrusion prevention/detection
Tools systems (IPS/IDS)
✔ Data loss prevention (DLP)
✔ Endpoint detection and
response
✔ Security information and event
management (SIEM)
✔ Encryption tools
Cyber Security ✔ Vulnerability scanners
✔ Virtual private networks
Vendors and (VPNs)
Tools ✔ Cloud workload protection
platform (CWPP)
✔ Cloud access security broker
(CASB)
✔ Chief information
security officer (CISO)
✔ Chief security office
(CSO)
Who handles
✔ Security engineers
Cyber Security? ✔ Security architects
✔ Security analysts
✔ Penetration testers
✔ Threat hunters
Risk Management
Process

✔ Collect
✔ Document
✔ Monitor
✔ Resolve

You might also like