SlideShare a Scribd company logo
2
Most read
3
Most read
10
Most read
Concept Of Cyber Security
Nazrul Islam Bhuiyan, PMP, CISA, OCE,CDCS, PRINCE2(P)
BSc & MSc Engg(CSE), M.Engg(ISS), MSc. Procurement & Supply Chain Mgt., PGDPMP
Project Management Specialist (PMS)
BISDP,IDRA, FID, Ministry of Finance
&
Joint Secretary (Academic)
Bangladesh Computer Society
Welcome to Bangladesh Computer Society
What is Cyber Security?
u Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
u It's also known as information technology security or
electronic information security.
u The term applies in a variety of contexts, from business to
mobile computing, and can be divided into a few common
categories.
Key Concept Of Cyber Security?
The Cyber Security on a whole is a very broad term but is
based on three fundamental concepts known as “The CIA
Triad“.
Confidentiality:
It defines the rules that limits the access of information.
Confidentiality takes on the measures to restrict the
sensitive information from being accessed by cyber
attackers and hackers.
Integrity
This assures that the data is consistent, accurate and
trustworthy over its time period. It means that the
data within the transit should not be changed, altered,
deleted or illegally being accessed.
Availability
Availability in terms of all necessary components like
hardware, software, networks, devices and security
equipment should all be maintained and upgraded.
This will ensure the smooth functioning and access of Data
without any disruption. Also providing constant
communication between the components through providing
enough bandwidth.
Cyber security vs information security
u Cyber security focuses on protecting computer systems from
unauthorized access or being otherwise damaged or made
inaccessible.
u Information security is a broader category that looks to protect
all information assets, whether in hard copy or digital form.
Few Common Categories Of Cyber Security
u Network Security : prevents and protects against
unauthorized intrusion into corporate networks
u Application Security: makes apps more secure by finding
and fixing vulnerabilities in application code
u Information Security: protects the integrity and privacy
of data, both in storage and in transit.
Few Common Categories Of Cyber Security
u Operational Security: includes the processes and decisions for handling
and protecting data assets.
u Disaster Recovery And Business Continuity define how an organization
responds to a cyber-security incident or any other event that causes the
loss of operations or data. Disaster recovery policies dictate how the
organization restores its operations and information to return to the
same operating capacity as before the event.
u End-user Education : addresses the most unpredictable cyber-security
factor: people. Anyone can accidentally introduce a virus to an
otherwise secure system by failing to follow good security practices.
Types of cyber threats
u1. Cybercrime includes single actors or groups
targeting systems for financial gain or to cause
disruption.
u2. Cyber-attack often involves politically motivated
information gathering.
u3. Cyberterrorism is intended to undermine electronic
systems to cause panic or fear.
Most Common Types of Cyber Attacks
Cyber security checklist
u 1. Staff awareness training: Human error is the leading cause of data
breaches. Staff awareness training will show employees how security
threats affect them and help them apply best-practice advice to real-
world situations.
u 2. Application security: Web application vulnerabilities are a common
point of intrusion for cyber criminals. it is vital to focus on web
application security.
u 3. Network security: Network security is the process of protecting the
usability and integrity of your network and data.
u 4. Leadership commitment: Leadership commitment is key to cyber
resilience. Without it, it is tough to establish or enforce effective
processes. Top management must be prepared to invest in appropriate
cyber security resources, such as awareness training.
u 5. Password management: Almost half of the UK population uses
‘password’, ‘123456’ or ‘qwerty’ as their password. You should
implement a password management policy that provides guidance to
ensure staff create strong passwords and keep them secure.
Thank you

More Related Content

PDF
Basics of Cyber Security
PPT
Cyber Security & Hygine
PPT
Cyber security for an organization
PPTX
Cyber security threats and trends
PPTX
CYBER Crime Cyber Security Cyber Law INDIA
PPTX
cyber crime
PPT
presentation on cyber crime and security
PPTX
Cyber security for small businesses
Basics of Cyber Security
Cyber Security & Hygine
Cyber security for an organization
Cyber security threats and trends
CYBER Crime Cyber Security Cyber Law INDIA
cyber crime
presentation on cyber crime and security
Cyber security for small businesses

What's hot (20)

PPTX
Domain 1 - Security and Risk Management
PPTX
Cyber security
PPTX
PowerPoint Seguridad Informática
PPTX
Cyber Security Awareness
PPTX
Topic11
PPT
PPT
Introduction to Cyber Law
PPTX
ethical hacking
PPT
Information System Security(lecture 1)
PPTX
Cyber Security Best Practices
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Computer security concepts
PPTX
Cyber Hygiene in Dailylife
PPTX
IoT - Attacks and Solutions
PDF
1. introduction to cyber security
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Hyphenet Security Awareness Training
PPT
Presentacion sobre seguridad informatica
PPTX
Cyber Security
PPT
Basics of Information System Security
Domain 1 - Security and Risk Management
Cyber security
PowerPoint Seguridad Informática
Cyber Security Awareness
Topic11
Introduction to Cyber Law
ethical hacking
Information System Security(lecture 1)
Cyber Security Best Practices
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Computer security concepts
Cyber Hygiene in Dailylife
IoT - Attacks and Solutions
1. introduction to cyber security
Cybersecurity 1. intro to cybersecurity
Hyphenet Security Awareness Training
Presentacion sobre seguridad informatica
Cyber Security
Basics of Information System Security
Ad

Similar to Concept Of Cyber Security.pdf (20)

PDF
introduction to cyber security
PPTX
Introduction to cyber security
PPTX
Introduction to intelligence cybersecurity_2
PPTX
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Cyber Security and data Security for all.pptx
PPTX
What is Cyber & information security.pptx
PDF
Do You Know About Cyber Security? | Secninjaz Technologies LLP
PPTX
Cyber Sequrity.pptx is life of cyber security
PPTX
SEMINAR ON CYBER SECURITY.pptx
PDF
Cyber Ethics Notes.pdf
PPTX
cyber security and threats.pptx
PPTX
Cyber Security in detail PPT BY HIMANXU.pptx
PPTX
PPTX
Cyber Security awareness of cyber security
PDF
Cyber Security
DOCX
Cyber Security.docx
PPTX
Cyber Security – Challenges [Autosaved].pptx
PPTX
Cyber security
PPTX
Cyber Security
introduction to cyber security
Introduction to cyber security
Introduction to intelligence cybersecurity_2
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Cyber-Security-Unit-1.pptx
Cyber Security and data Security for all.pptx
What is Cyber & information security.pptx
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Cyber Sequrity.pptx is life of cyber security
SEMINAR ON CYBER SECURITY.pptx
Cyber Ethics Notes.pdf
cyber security and threats.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security awareness of cyber security
Cyber Security
Cyber Security.docx
Cyber Security – Challenges [Autosaved].pptx
Cyber security
Cyber Security
Ad

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
KodekX | Application Modernization Development
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KodekX | Application Modernization Development
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf

Concept Of Cyber Security.pdf

  • 1. Concept Of Cyber Security Nazrul Islam Bhuiyan, PMP, CISA, OCE,CDCS, PRINCE2(P) BSc & MSc Engg(CSE), M.Engg(ISS), MSc. Procurement & Supply Chain Mgt., PGDPMP Project Management Specialist (PMS) BISDP,IDRA, FID, Ministry of Finance & Joint Secretary (Academic) Bangladesh Computer Society Welcome to Bangladesh Computer Society
  • 2. What is Cyber Security? u Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. u It's also known as information technology security or electronic information security. u The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
  • 3. Key Concept Of Cyber Security? The Cyber Security on a whole is a very broad term but is based on three fundamental concepts known as “The CIA Triad“.
  • 4. Confidentiality: It defines the rules that limits the access of information. Confidentiality takes on the measures to restrict the sensitive information from being accessed by cyber attackers and hackers. Integrity This assures that the data is consistent, accurate and trustworthy over its time period. It means that the data within the transit should not be changed, altered, deleted or illegally being accessed.
  • 5. Availability Availability in terms of all necessary components like hardware, software, networks, devices and security equipment should all be maintained and upgraded. This will ensure the smooth functioning and access of Data without any disruption. Also providing constant communication between the components through providing enough bandwidth.
  • 6. Cyber security vs information security u Cyber security focuses on protecting computer systems from unauthorized access or being otherwise damaged or made inaccessible. u Information security is a broader category that looks to protect all information assets, whether in hard copy or digital form.
  • 7. Few Common Categories Of Cyber Security u Network Security : prevents and protects against unauthorized intrusion into corporate networks u Application Security: makes apps more secure by finding and fixing vulnerabilities in application code u Information Security: protects the integrity and privacy of data, both in storage and in transit.
  • 8. Few Common Categories Of Cyber Security u Operational Security: includes the processes and decisions for handling and protecting data assets. u Disaster Recovery And Business Continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. u End-user Education : addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices.
  • 9. Types of cyber threats u1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. u2. Cyber-attack often involves politically motivated information gathering. u3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
  • 10. Most Common Types of Cyber Attacks
  • 11. Cyber security checklist u 1. Staff awareness training: Human error is the leading cause of data breaches. Staff awareness training will show employees how security threats affect them and help them apply best-practice advice to real- world situations. u 2. Application security: Web application vulnerabilities are a common point of intrusion for cyber criminals. it is vital to focus on web application security.
  • 12. u 3. Network security: Network security is the process of protecting the usability and integrity of your network and data. u 4. Leadership commitment: Leadership commitment is key to cyber resilience. Without it, it is tough to establish or enforce effective processes. Top management must be prepared to invest in appropriate cyber security resources, such as awareness training. u 5. Password management: Almost half of the UK population uses ‘password’, ‘123456’ or ‘qwerty’ as their password. You should implement a password management policy that provides guidance to ensure staff create strong passwords and keep them secure.