Security in IT (Data and Cyber Security)
Security in IT (Data and Cyber Security)
2
Type of security in IT What is a data security Why is data security is important various services that data security presents Important protecting Type of data security What is Cyber security Why is cyber security important Anonymous Important features of cyber security Computer Security is concerned with four
main areas Cyber security application
Outline
3
Data securityCyber security
Two type of security in IT
4
What is Data security
data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
5
Client information, payment information, personal files, bank account details - all of this information can be hard to replace and potentially dangerous if it falls into the wrong hands. Data lost due to disasters such as a flood or fire is crushing, but losing it to hackers or a malware infection can have much greater consequences.
Why is Data security important
6
Risk analysisBusiness continuity planSecurity policyIncident response
various services that data security presents
7
Establish strong passwords Put up a strong firewallInstall antivirus protectionUpdate your programs regularlyBackup regularlyMonitor diligentlyBe careful with e-mail, IM and surfing the
WebEducate your employees
Important protecting Type of data security
8
Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
In a computing context, the term security implies cyber security.
What is Cyber security
9
The increasing volume and sophistication of cyber security threats–including targeting phishing scams, data theft, and other online vulnerabilities–demand that we remain vigilant about securing our systems and information.
Why is cyber security important
10
11
Information AssurancePrivacy SolutionsCompliance Audit in VisibilityThreat & Vulnerability AssessmentPlans of Action with
Milestones(POA&M)Security Operations Center
Important features of cyber security
12
Confidentiality:- Data is only accessed by those with the right to view the
data.
Integrity:- Data can be relied upon to be accurate and processed correctly.
Availability:- Data should be available to users when needed.
Authentication:- are you really communicating with whom you think you
are communicating with
Computer Security is concerned with four main areas:
13
Secure EmailPrevent tampering of email content, prove message origin, prevent exposure of email content with encryption, flexible and secure communication. Seamlessly integrates with your email clients and web hosted email applications.
Smart CardsEnforces Multi-Factor Authentication usually for physical access control, i.e. opening doors and logging on to computers. In manufacturing or utilities operations a typical use is turning on a manufacturing line or a power station.
Code SigningSecuring your software development process
ensures that your process is being protected and that the software running on your servers, cloud and end users cannot be tampered with.
Cyber security application
14
http://www.entrepreneur.com/article/217484http://www.contrib.andrew.cmu.edu/~aishah/
Sec.htmlhttp://www.sio2corp.com/cyber-security-
applications/http:// www.spamlaws.com/data-security.html
References
15
Thank you!