SlideShare a Scribd company logo
CYBER SECURITY
INTRODUCTION (UNIT-1)
INFORMATION SYSTEM
Information System refers to the knowledge or fact about any particular
subject/person or thing. The various aspects including like gathering,
handling, processing, storing, encrypting, releasing & disposing of data
for completing the transmission.
Information System is an integrated structure that compiles the services
of software, human resources and physical components of technology
to gather, store, process & retrieve the information whenever required,
in a useful form. This information is used by an individual or an
organization for planning, decision-making & various purposes for the
smooth running of the organization.
NEED FOR INFORMATION SYSTEM
Collection & storage of various types of data in accounts
Keeping record of employees
Customer Relationship Management
Planning
Preparing Alternative Course of Action
Decision-Making
Faster communication of a message among the employees
Competitive Advantage over other organization
TYPES OF INFORMATION SYSTEM
Executive Support System
Expert System
Decision Support System
Management Information
System
Office Information System
Transaction Processing
System
ELEMENTS OF INFORMATION SYSTEM
Connection
Media &
Network
Methods
Information
Human
Resource
Hardware
Software
DEVELOPMENT OF INFORMATION SYSTEM
Development of Information System has been interpreted as an
organized collection of concept, methods or techniques or set of goal
oriented procedure which are intending to guide the work in the
corporation of various parties involved in the guiding of an information
system.
“The desirable result or objective of the whole process of development
is to implement a functioning system, which will satisfy the end user in
its functionality and uses interfaces.”
SYSTEM DEVELOPMENT LIFE CYCLE
Identify
Problems
Information
Collecting Data
Analyzing
System Needs
& Budget
Designing The
System
Software
Development
Testing,
Monitoring Or
Evaluating
Hardware
Selection
Implementation
Follow-Up
INTRODUCTION TO INFORMATION SECURITY
According to Merriam-Webster’s online dictionary, information is
defined as:
“ Knowledge obtained from investigation, study, or instruction,
intelligence, news, facts, data, a signal or character (as in a
communication system or computer) representing data, something (as a
message experimental data, or a picture) which justifies change in a
construct (as a plan or theory) that represents physical or mental
experience or another construct.”
And Security is defined as:
“freedom from danger, safety; freedom from fear or anxiety.”
Thus, Information Security can be defined as:
“Measures adopted to prevent the unauthorized use, misuse,
modification or denial of use of knowledge, facts, data or capabilities.”
NEED FOR INFORMATION SECURITY
 To secure information about the type of hardware/software the
organization is working on.
To control access to personal details of employees like control files,
password, address, phone number, etc.
To secure the information about the future plans & strategies of the
organization.
To secure the detailed information of the security plans of the
organization.
To secure information about the network connection, system
configuration and the encryption algorithms used by the organization.
INFORMATION SECURITY = CONFIDENTIALITY +
INTEGRITY + AVAILABILITY + AUTHENTICATION
BASIC PILLARS OF INFORMATION SECURITY
Confidentiality
Integrity
Availability
THREATS TO INFORMATION SYSTEM
NATURAL DISASTERS: Information can be lost, down time or loss
of productivity can occur, and damage to hardware can disrupt other
essential services.
HUMAN THREATS: Malicious Threats consist of inside attacks by
malicious employees & outside attacks by non-employees just looking
to harm and disrupt an organization. It can gain access in many ways
such as:
Viruses
Worm
Trapdoors
Logic Bombs
Mail Bombing
Zombie
Trojan Horse
INFORMATION ASSURANCE
Information Assurance is the process which ensures
confidentiality, integrity, availability, authentication and non-
repudiation of information system by using physical, technical and
administrative controls. This is not only valid for digital form of
data but it is also valid for analog form of data.
CYBER SECURITY
Cyber Security is more about monitoring behaviors and our cyber
monitoring efforts. Cyber Security refers to techniques and
technologies designed to protect computers, networks and data from
attacks, vulnerabilities and unauthorized access launched via internet
by cyber criminals. It applies security measures to ensure
confidentiality, integrity & availability of data. It specializes in the
area of network behavior analysis.
SECURITY RISK ANALYSIS
A risk analysis is the process of identifying the assets you wish to
protect and the potential threats against them. Risk Analysis is most
important process of risk management. It identifies & evaluate the risk
which have to be eliminated, controlled or accept it.
It is the concept that forms the basis for what we call security. If we
talk in terms of security then we can say that, risk is the potential for
less that requires protection. If there is no risk, there is no need of
security.
Risk= Threat * Vulnerability * Asset
SUBMITTED BY: SAMANVAY JAIN
Roll No: 1605470077
Batch: MBA 4th Sem.
(2017-18)
THANK YOU
Submitted To: Ms. Sandhya Singh
(Lecturer)

More Related Content

PPTX
cyber security presentation.pptx
PPTX
Introduction to cyber security amos
PDF
Cyber security
PDF
1. introduction to cyber security
PPTX
What is Cyber Security - Avantika University
PPTX
cyber security PPT
PPTX
Cyber security
PPT
Basic knowledge of cyber security
cyber security presentation.pptx
Introduction to cyber security amos
Cyber security
1. introduction to cyber security
What is Cyber Security - Avantika University
cyber security PPT
Cyber security
Basic knowledge of cyber security

What's hot (20)

PPTX
Introduction to Cyber Security
PPTX
Cyber security & awareness
PDF
Cyber security and demonstration of security tools
PDF
Cyber Security Vulnerabilities
PDF
Cyber security
PPTX
What is cyber security
PPTX
Cyber security
PPTX
Ppt growing need of cyber security
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
DOCX
Cyer security
PPTX
Cyber security ppt
PPTX
An introduction to cyber security by cyber security infotech pvt ltd(csi)
PPTX
Cyber Security Presentation
PPTX
Cyber awareness program
PPTX
Cyber Security: Threats and Needed Actions
DOCX
Hot Cyber Security Technologies
PPTX
Cyber security system presentation
PPTX
The Year Ahead in Cyber Security: 2014 edition
PPTX
Cybersecurity
PPTX
Information security / Cyber Security ppt
Introduction to Cyber Security
Cyber security & awareness
Cyber security and demonstration of security tools
Cyber Security Vulnerabilities
Cyber security
What is cyber security
Cyber security
Ppt growing need of cyber security
Cybersecurity 140713064844-phpapp01 (1)-converted
Cyer security
Cyber security ppt
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Presentation
Cyber awareness program
Cyber Security: Threats and Needed Actions
Hot Cyber Security Technologies
Cyber security system presentation
The Year Ahead in Cyber Security: 2014 edition
Cybersecurity
Information security / Cyber Security ppt
Ad

Similar to An Introduction to Cyber security (20)

PPT
chapter 1. Introduction to Information Security
PPTX
SECURITY AND CONTROL
PPT
Information security
PPTX
Information Security
PDF
Management Information Systems
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPTX
Information Security introduction and management.pptx
PPTX
Introduction-to-Information-Security.pptx
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPTX
Management Information Systems ( Security and Control.pptx
PPTX
It and-cyber-module-2
PDF
Unit 1&2.pdf
PDF
Chapter 6 Security of Information and Cyber Security(FASS)
PPT
information security management
PPTX
Presentation1 110616195133-phpapp01(information security)
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
PPTX
ISO27k Awareness presentation.pptx
PPTX
Infromation securiity
PPTX
ISM-CS5750-01.pptx
chapter 1. Introduction to Information Security
SECURITY AND CONTROL
Information security
Information Security
Management Information Systems
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Information Security introduction and management.pptx
Introduction-to-Information-Security.pptx
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Management Information Systems ( Security and Control.pptx
It and-cyber-module-2
Unit 1&2.pdf
Chapter 6 Security of Information and Cyber Security(FASS)
information security management
Presentation1 110616195133-phpapp01(information security)
Accounting Information Systems 11th Edition Bodnar Solutions Manual
ISO27k Awareness presentation.pptx
Infromation securiity
ISM-CS5750-01.pptx
Ad

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Complications of Minimal Access Surgery at WLH
102 student loan defaulters named and shamed – Is someone you know on the list?
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
VCE English Exam - Section C Student Revision Booklet
Final Presentation General Medicine 03-08-2024.pptx
A systematic review of self-coping strategies used by university students to ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Microbial disease of the cardiovascular and lymphatic systems
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharmacology of Heart Failure /Pharmacotherapy of CHF

An Introduction to Cyber security

  • 2. INFORMATION SYSTEM Information System refers to the knowledge or fact about any particular subject/person or thing. The various aspects including like gathering, handling, processing, storing, encrypting, releasing & disposing of data for completing the transmission. Information System is an integrated structure that compiles the services of software, human resources and physical components of technology to gather, store, process & retrieve the information whenever required, in a useful form. This information is used by an individual or an organization for planning, decision-making & various purposes for the smooth running of the organization.
  • 3. NEED FOR INFORMATION SYSTEM Collection & storage of various types of data in accounts Keeping record of employees Customer Relationship Management Planning Preparing Alternative Course of Action Decision-Making Faster communication of a message among the employees Competitive Advantage over other organization
  • 4. TYPES OF INFORMATION SYSTEM Executive Support System Expert System Decision Support System Management Information System Office Information System Transaction Processing System
  • 5. ELEMENTS OF INFORMATION SYSTEM Connection Media & Network Methods Information Human Resource Hardware Software
  • 6. DEVELOPMENT OF INFORMATION SYSTEM Development of Information System has been interpreted as an organized collection of concept, methods or techniques or set of goal oriented procedure which are intending to guide the work in the corporation of various parties involved in the guiding of an information system. “The desirable result or objective of the whole process of development is to implement a functioning system, which will satisfy the end user in its functionality and uses interfaces.”
  • 7. SYSTEM DEVELOPMENT LIFE CYCLE Identify Problems Information Collecting Data Analyzing System Needs & Budget Designing The System Software Development Testing, Monitoring Or Evaluating Hardware Selection Implementation Follow-Up
  • 8. INTRODUCTION TO INFORMATION SECURITY According to Merriam-Webster’s online dictionary, information is defined as: “ Knowledge obtained from investigation, study, or instruction, intelligence, news, facts, data, a signal or character (as in a communication system or computer) representing data, something (as a message experimental data, or a picture) which justifies change in a construct (as a plan or theory) that represents physical or mental experience or another construct.” And Security is defined as: “freedom from danger, safety; freedom from fear or anxiety.” Thus, Information Security can be defined as: “Measures adopted to prevent the unauthorized use, misuse, modification or denial of use of knowledge, facts, data or capabilities.”
  • 9. NEED FOR INFORMATION SECURITY  To secure information about the type of hardware/software the organization is working on. To control access to personal details of employees like control files, password, address, phone number, etc. To secure the information about the future plans & strategies of the organization. To secure the detailed information of the security plans of the organization. To secure information about the network connection, system configuration and the encryption algorithms used by the organization.
  • 10. INFORMATION SECURITY = CONFIDENTIALITY + INTEGRITY + AVAILABILITY + AUTHENTICATION
  • 11. BASIC PILLARS OF INFORMATION SECURITY Confidentiality Integrity Availability
  • 12. THREATS TO INFORMATION SYSTEM NATURAL DISASTERS: Information can be lost, down time or loss of productivity can occur, and damage to hardware can disrupt other essential services. HUMAN THREATS: Malicious Threats consist of inside attacks by malicious employees & outside attacks by non-employees just looking to harm and disrupt an organization. It can gain access in many ways such as: Viruses Worm Trapdoors Logic Bombs Mail Bombing Zombie Trojan Horse
  • 13. INFORMATION ASSURANCE Information Assurance is the process which ensures confidentiality, integrity, availability, authentication and non- repudiation of information system by using physical, technical and administrative controls. This is not only valid for digital form of data but it is also valid for analog form of data.
  • 14. CYBER SECURITY Cyber Security is more about monitoring behaviors and our cyber monitoring efforts. Cyber Security refers to techniques and technologies designed to protect computers, networks and data from attacks, vulnerabilities and unauthorized access launched via internet by cyber criminals. It applies security measures to ensure confidentiality, integrity & availability of data. It specializes in the area of network behavior analysis.
  • 15. SECURITY RISK ANALYSIS A risk analysis is the process of identifying the assets you wish to protect and the potential threats against them. Risk Analysis is most important process of risk management. It identifies & evaluate the risk which have to be eliminated, controlled or accept it. It is the concept that forms the basis for what we call security. If we talk in terms of security then we can say that, risk is the potential for less that requires protection. If there is no risk, there is no need of security. Risk= Threat * Vulnerability * Asset
  • 16. SUBMITTED BY: SAMANVAY JAIN Roll No: 1605470077 Batch: MBA 4th Sem. (2017-18) THANK YOU Submitted To: Ms. Sandhya Singh (Lecturer)