Top Banner
Security in IT (Data and Cyber Security)
15

Security in it

Feb 16, 2017

Download

Education

yoshan963
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security in it

Security in IT (Data and Cyber Security)

Page 2: Security in it

2

Type of security in IT What is a data security Why is data security is important various services that data security presents Important protecting Type of data security What is Cyber security Why is cyber security important Anonymous Important features of cyber security Computer Security is concerned with four

main areas Cyber security application

Outline

Page 3: Security in it

3

Data securityCyber security

Two type of security in IT

Page 4: Security in it

4

What is Data security

data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.

Page 5: Security in it

5

Client information, payment information, personal files, bank account details - all of this information can be hard to replace and potentially dangerous if it falls into the wrong hands. Data lost due to disasters such as a flood or fire is crushing, but losing it to hackers or a malware infection can have much greater consequences.

Why is Data security important

Page 6: Security in it

6

Risk analysisBusiness continuity planSecurity policyIncident response

various services that data security presents

Page 7: Security in it

7

Establish strong passwords Put up a strong firewallInstall antivirus protectionUpdate your programs regularlyBackup regularlyMonitor diligentlyBe careful with e-mail, IM and surfing the

WebEducate your employees

Important protecting Type of data security

Page 8: Security in it

8

Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

In a computing context, the term security implies cyber security.

What is Cyber security

Page 9: Security in it

9

The increasing volume and sophistication of cyber security threats–including targeting phishing scams, data theft, and other online vulnerabilities–demand that we remain vigilant about securing our systems and information.

Why is cyber security important

Page 10: Security in it

10

Page 11: Security in it

11

Information AssurancePrivacy SolutionsCompliance Audit in VisibilityThreat & Vulnerability AssessmentPlans of Action with

Milestones(POA&M)Security Operations Center

Important features of cyber security

Page 12: Security in it

12

Confidentiality:- Data is only accessed by those with the right to view the

data.

Integrity:- Data can be relied upon to be accurate and processed correctly.

Availability:- Data should be available to users when needed.

Authentication:- are you really communicating with whom you think you

are communicating with

Computer Security is concerned with four main areas: 

Page 13: Security in it

13

Secure EmailPrevent tampering of email content, prove message origin, prevent exposure of email content with encryption, flexible and secure communication. Seamlessly integrates with your email clients and web hosted email applications.

Smart CardsEnforces Multi-Factor Authentication usually for physical access control, i.e. opening doors and logging on to computers. In manufacturing or utilities operations a typical use is turning on a manufacturing line or a power station.

Code SigningSecuring your software development process

ensures that your process is being protected and that the software running on your servers, cloud and end users cannot be tampered with.

Cyber security application

Page 14: Security in it

14

http://www.entrepreneur.com/article/217484http://www.contrib.andrew.cmu.edu/~aishah/

Sec.htmlhttp://www.sio2corp.com/cyber-security-

applications/http:// www.spamlaws.com/data-security.html

References

Page 15: Security in it

15

Thank you!