0% found this document useful (0 votes)
21 views8 pages

Cyber Security

Uploaded by

oneashen5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views8 pages

Cyber Security

Uploaded by

oneashen5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Information Security and

Challenges
 https://www.youtube.com/watch?v=inWWhr5tnEA
Security Challenges and
Vulnerabilities

Tapping
Sniffing
Unauthorized Access Message
Errors Alteration
Theft and Fraud Theft of Data
Hacking Copying of Data
Malware Alteration of
Theft & Fraud Data
Denial of Service Hardware Failure
Attacks Software failure
Phishing
Malicious Software
 Viruses
 Worms
 Trojan Horses
 Spyware
Computer Crime
 Breaking the Confidentiality of Protected Computer Data
 Accessing a computer system without authority
 Knowingly accessing protected computer with the intention
of Fraud
 Causing damage to data or software or hardware
negligently or deliberately
 Transmitting a computer code that damages a protected
computer
 Threatening to cause damage to a protected computer
 Infringing on the copyright of Software or data or image
or video or audio.
 Using social media to threaten or commit crimes
 Transmitting data, images or videos declared illegal by
the government of the land.
Electronic & Cyberwarfare
 Electronic Intelligence (Elint)
 Communications Intelligence (Comint)
 Electronic Counter Measures (ECM)
 Electronic Counter Counter measures (ECCM)
 Cyber snooping
 Cyber Warfare

Securing your Systems

Outer Inner Corporate Corporate


Internet Web
Firewall Firewall Systems Data
Server
(Intrusion Detection
System)

• Physical Security Of Systems.


• Unified Threat Management System
• Encryption and Public Key Infrastructure
• Digital Certificates
• Developing Fault Tolerant System. Corporate Systems
Anti Virus Protection
Disaster Recovery & Business
Continuity Planning
 Vulnerability & Risk Assessment
 Disaster Recovery
 Data Backup
 Alternate Data Servers
 Alternate data Centers
 Parallel Operations
 Business Continuity Plan
 Identification of Critical Business Processes and their continuity during
disasters

You might also like