SlideShare a Scribd company logo
7
Most read
8
Most read
9
Most read
Galgotias University 1
The need for security, Security
Approaches, Principles of
Security
Session No.: 2
Course Name: Fundamentals of Cryptography
Course Code: EIUA408B
Instructor Name: Aishwarya
Duration: 50 min
Galgotias University 2
A. Information Security
B. CIA Traid
Recap
Galgotias University 3
Opening Question?
What would you do if your phone suddenly stopped working
because of a virus?
Galgotias University 4
LEARNING
OUTCOMES
LO1
• Describe Security Approaches: preventive,
detective and corrective measures.
LO2
• Identify common security threats, such as phishing,
malware, DoS and insider threats.
At the end of this session students will be able to
Galgotias University 5
Session
Outline
1. Need of Security
2. Learning Concept of Activity 1
3. A1(Real-world scenario): Why
security Approaches
4. Learning Concept of Activity 2
5. A2 :Attack Simulation Discussion
6. Conclusion & Closing Activity
Galgotias University 6
Concept and
Definition for
Learning Activity 1
Galgotias University 7
They are strategies used to protect data, systems, and networks from threats. They
can be categorized into three main types: Preventive, Detective, and Corrective
Measures.
Security approaches
Preventive
Measures
Detective
Measures
Corrective
Measures
Galgotias University 8
Preventive measures are proactive security controls designed to stop attacks before
they happen. These measures help reduce vulnerabilities and protect systems, data,
and networks from threats.
Ex: Think of it like locking your house doors to prevent burglars from entering.
Preventive Measures
(Prevention Before an Attack)
Key Preventive Measures:
1. Firewalls
2. Antivirus & Anti-malware Software
3. Strong Authentication & Password Policies
4. Access Control
5. Data encryption
Why Are Preventive Measures
Important?
o Reduce the risk of cyberattacks before
they occur.
o Protect sensitive data from
unauthorized access.
o Minimize financial and reputational
damage caused by breaches.
o Ensure business continuity by
preventing disruptions.
Preventive measures reduce risk.
Galgotias University 9
Detective measures are security controls that identify and monitor potential threats
or security breaches. These measures help detect unauthorized activities, intrusions,
or anomalies in a system, allowing quick responses to security incidents.
Ex: Like having a security camera to catch intruders in action.
Detective Measures (Monitoring &
Identifying Threats)
Key Preventive Measures:
1. Intrusion Detection Systems (IDS)
2. Security Logs & Auditing
3. Anti-malware & Virus Scanning
4. Network Traffic Monitoring
5. File Integrity Monitoring (FIM)
Why Are Detective Measures
Important?
o Identify security breaches early before
they cause significant damage.
o Monitor and analyze suspicious
activities in real time.
o Provide evidence for forensic
investigations and legal actions.
o Help improve preventive measures by
detecting vulnerabilities.
Detective measures identify threats early.
Galgotias University 10
Corrective measures are actions taken to respond to and recover from security
incidents. These measures help minimize damage, restore systems, and prevent
future attacks.
Ex: Like repairing a broken lock and recovering stolen valuables after a burglary.
Corrective Measures (Response &
Recovery After an Attack)
Key Preventive Measures:
1. Incident Response Plan (IRP)
2. Data Backup & Recovery
3. Software Patching & Updates
4. Blocking or Revoking Access
5. Forensic Analysis & Investigation
Why Are Corrective Measures
Important?
o Minimize the impact of security
breaches and restore normal operations.
o Prevent the same attack from happening
again by fixing vulnerabilities.
o Ensure business continuity even after a
security incident.
o Improve future security strategies by
learning from past incidents.
Corrective measures help recover quickly.
Galgotias University 11
Security Approach Match-Up(10 min)
Scenario 1: Unauthorized Access to a University Database
A student finds an old professor’s login credentials and accesses the university’s grading
system to change their marks. The IT team discovers the changes during a routine audit.
Discussion Questions:
1.What preventive measures should have been in place? (e.g., Password expiration
policies, Multi-Factor Authentication)
2.How could detective measures have detected this sooner? (e.g., Regular security
audits, system logs, user behavior monitoring)
3.What corrective actions should the university take? (e.g., Change login policies,
restore original grades, improve system security)
Galgotias University 12
Quiz on Wooclap
Galgotias University 13
Concept and
Definition for
Learning Activity 2
Galgotias University 14
THE OSI SECURITY
ARCHITECTURE
The OSI (Open Systems Interconnection) Security Architecture provides a framework for
securing communication systems by addressing security concerns across different layers of
network communication.
It was developed by ISO (International Organization for Standardization) to identify security
threats, define security services, and establish security mechanisms
Security attack (Threats to Security):
The OSI model classifies security threats into two main types:
Passive Attacks (Eavesdropping, Traffic Analysis)
Attackers secretly monitor communication without altering data.
Example: A hacker intercepting an email without modifying it.
Active Attacks (Modification, Masquerade, Replay, Denial of Service)
Attackers alter, disrupt, or impersonate communication.
Example: A hacker modifying bank transaction details during online payment.
Galgotias University 15
THE OSI SECURITY
ARCHITECTURE
A process (or a device incorporating such a process) that is designed to detect,
prevent, or recover from a security attack.
Security Mechanisms (How Security is Implemented)
Security Services (Protection Measures)
A processing or communication service that enhances the security of the data
processing systems and the information transfers of an organization. The
services are intended to counter security attacks, and they make use of one or
more security mechanisms to provide the service.
Galgotias University 16
Definition of threat and
attack
A threat is a possible security violation that might exploit the vulnerability of a
system or asset. The origin of the threat may be accidental, environmental
(natural disaster), human negligence, or human failure.
A hacker trying to find weaknesses in a bank's website.
Threat:
Attack
Any kind of malicious activity that attempts to collect, disrupt, deny,
degrade, or destroy information system resources or the information itself.
A hacker steals money from a bank by hacking into accounts.
Galgotias University 17
Summary
A. The Need for Security: Protects sensitive data, prevents cyber threats
(hacking, malware, phishing), and ensures safe communication.
B. Security Approaches: Includes Preventive (firewalls, encryption), Detective
(monitoring, IDS), and Corrective (incident response, backups) measures.
C. Confidentiality: Ensures data is accessible only to authorized users (e.g.,
encryption, access controls).
D. Integrity: Maintains accuracy and reliability of data (e.g., hashing, digital
signatures).
E. Availability: Ensures systems and data remain accessible when needed (e.g.,
backups, disaster recovery plans).
Galgotias University 18
Ensure attainment of LOs in alignment to the
learning activities: outcomes (1-2)
LO1: Describe Security Approaches: preventive,
detective and corrective measures.
LO2:Identify common security threats, such as
phishing, malware, DoS and insider threats.
Galgotias University 19
Discussion on the post session
activities
Attempt the Post-session activity on LMS, before next session
Galgotias University 20
Information to next topic of the
course
Next session:
Types of Attacks
Galgotias University 21
Review and Reflection
from students
https://gulms.galgotiasuniversity.org/mod/
feedback/view.php?id=41919
Galgotias University 22

More Related Content

PPTX
Cyber terrorism
PPT
ch01.ppt
PDF
Computer security priciple and practice
PDF
I0516064
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Effective Cyber Security Technology Solutions for Modern Challenges
PPTX
Group 1.pptx for the topic cyber security
PPTX
Attacker scenarios and threats description.pptx
Cyber terrorism
ch01.ppt
Computer security priciple and practice
I0516064
Unit-1 introduction to cyber security discuss about how to secure a system
Effective Cyber Security Technology Solutions for Modern Challenges
Group 1.pptx for the topic cyber security
Attacker scenarios and threats description.pptx

Similar to Need of Security , Security Approaches, Principles of Security (20)

PPTX
Advanced Operating System Principles.pptx
PDF
Cyber Security Interview Analyst Questions.pdf
PDF
Cybersecurity Analyst Interview Questions.pdf
PDF
Cybersecurity Analyst Interview Questions and Answers.pdf
PDF
Cybersecurity Analyst Interview Questions By InfosecTrain
DOCX
Unit-4 cyber security new tools and methods
PDF
Module -5 Security.pdf
PPT
Bis Chapter15
PDF
InfosecTrain Cybersecurity Analyst Interview Questions
PDF
Cyber Security Analyst Interview Questions: Download our white paper
PDF
Cybersecurity Analyst Interview Questions for 2024.pdf
PDF
Top Cybersecurity Analyst Interview Questions: Download InfosecTrain’s White ...
PDF
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝗪𝗵𝗶𝘁𝗲 𝗣𝗮𝗽𝗲𝗿!
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PPTX
Cyber security
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
PDF
cryptograph and computer security lecture 1.pdf
DOCX
About the PresentationsThe presentations cover the objectives .docx
DOCX
About the PresentationsThe presentations cover the objectives .docx
Advanced Operating System Principles.pptx
Cyber Security Interview Analyst Questions.pdf
Cybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions By InfosecTrain
Unit-4 cyber security new tools and methods
Module -5 Security.pdf
Bis Chapter15
InfosecTrain Cybersecurity Analyst Interview Questions
Cyber Security Analyst Interview Questions: Download our white paper
Cybersecurity Analyst Interview Questions for 2024.pdf
Top Cybersecurity Analyst Interview Questions: Download InfosecTrain’s White ...
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝗪𝗵𝗶𝘁𝗲 𝗣𝗮𝗽𝗲𝗿!
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
Cyber security
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
cryptograph and computer security lecture 1.pdf
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
Ad

More from NAtional Institute of TEchnology Rourkela , Galgotias University (20)

PDF
Greenhouse Gases, Acid Rain, Ozone Layer depletion
PDF
Environment Air Pollution: Causes & Solutions
PPTX
String Matching Algorithms: Naive, KMP, Rabin-Karp
PDF
Bitcoin Basics: Wallets, Transactions, and Double Spending Explained
PPTX
The Foundation of Smart Contract Development on Ethereum
PPTX
Understanding Consensus Mechanisms in Blockchain: Proof of Work, Proof of Sta...
PPTX
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
PPTX
Types of Cryptography: Secret Key and Asymmetric Key
PPTX
Types of Attacks: Attacks can be classified based on their method, target, or...
PPTX
introduction of cryptography and its applications
PPTX
Classical Cryptogtaphy Techniques: Ceaser Cipher
PPTX
PPTX
Introduction to DBMS(Database Management System)
PPTX
Database Management System_Overall Structure
PDF
Introduction to Algorithm, Analysis of Algorithm
PPTX
2. Unit 1_Types of Opertaing Systems.pptx
Greenhouse Gases, Acid Rain, Ozone Layer depletion
Environment Air Pollution: Causes & Solutions
String Matching Algorithms: Naive, KMP, Rabin-Karp
Bitcoin Basics: Wallets, Transactions, and Double Spending Explained
The Foundation of Smart Contract Development on Ethereum
Understanding Consensus Mechanisms in Blockchain: Proof of Work, Proof of Sta...
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
Types of Cryptography: Secret Key and Asymmetric Key
Types of Attacks: Attacks can be classified based on their method, target, or...
introduction of cryptography and its applications
Classical Cryptogtaphy Techniques: Ceaser Cipher
Introduction to DBMS(Database Management System)
Database Management System_Overall Structure
Introduction to Algorithm, Analysis of Algorithm
2. Unit 1_Types of Opertaing Systems.pptx
Ad

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT
Project quality management in manufacturing
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Welding lecture in detail for understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Digital Logic Computer Design lecture notes
DOCX
573137875-Attendance-Management-System-original
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
composite construction of structures.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Project quality management in manufacturing
Mechanical Engineering MATERIALS Selection
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Model Code of Practice - Construction Work - 21102022 .pdf
Welding lecture in detail for understanding
Operating System & Kernel Study Guide-1 - converted.pdf
Digital Logic Computer Design lecture notes
573137875-Attendance-Management-System-original
Lesson 3_Tessellation.pptx finite Mathematics
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Structs to JSON How Go Powers REST APIs.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CYBER-CRIMES AND SECURITY A guide to understanding
Internet of Things (IOT) - A guide to understanding
Strings in CPP - Strings in C++ are sequences of characters used to store and...
composite construction of structures.pdf

Need of Security , Security Approaches, Principles of Security

  • 1. Galgotias University 1 The need for security, Security Approaches, Principles of Security Session No.: 2 Course Name: Fundamentals of Cryptography Course Code: EIUA408B Instructor Name: Aishwarya Duration: 50 min
  • 2. Galgotias University 2 A. Information Security B. CIA Traid Recap
  • 3. Galgotias University 3 Opening Question? What would you do if your phone suddenly stopped working because of a virus?
  • 4. Galgotias University 4 LEARNING OUTCOMES LO1 • Describe Security Approaches: preventive, detective and corrective measures. LO2 • Identify common security threats, such as phishing, malware, DoS and insider threats. At the end of this session students will be able to
  • 5. Galgotias University 5 Session Outline 1. Need of Security 2. Learning Concept of Activity 1 3. A1(Real-world scenario): Why security Approaches 4. Learning Concept of Activity 2 5. A2 :Attack Simulation Discussion 6. Conclusion & Closing Activity
  • 6. Galgotias University 6 Concept and Definition for Learning Activity 1
  • 7. Galgotias University 7 They are strategies used to protect data, systems, and networks from threats. They can be categorized into three main types: Preventive, Detective, and Corrective Measures. Security approaches Preventive Measures Detective Measures Corrective Measures
  • 8. Galgotias University 8 Preventive measures are proactive security controls designed to stop attacks before they happen. These measures help reduce vulnerabilities and protect systems, data, and networks from threats. Ex: Think of it like locking your house doors to prevent burglars from entering. Preventive Measures (Prevention Before an Attack) Key Preventive Measures: 1. Firewalls 2. Antivirus & Anti-malware Software 3. Strong Authentication & Password Policies 4. Access Control 5. Data encryption Why Are Preventive Measures Important? o Reduce the risk of cyberattacks before they occur. o Protect sensitive data from unauthorized access. o Minimize financial and reputational damage caused by breaches. o Ensure business continuity by preventing disruptions. Preventive measures reduce risk.
  • 9. Galgotias University 9 Detective measures are security controls that identify and monitor potential threats or security breaches. These measures help detect unauthorized activities, intrusions, or anomalies in a system, allowing quick responses to security incidents. Ex: Like having a security camera to catch intruders in action. Detective Measures (Monitoring & Identifying Threats) Key Preventive Measures: 1. Intrusion Detection Systems (IDS) 2. Security Logs & Auditing 3. Anti-malware & Virus Scanning 4. Network Traffic Monitoring 5. File Integrity Monitoring (FIM) Why Are Detective Measures Important? o Identify security breaches early before they cause significant damage. o Monitor and analyze suspicious activities in real time. o Provide evidence for forensic investigations and legal actions. o Help improve preventive measures by detecting vulnerabilities. Detective measures identify threats early.
  • 10. Galgotias University 10 Corrective measures are actions taken to respond to and recover from security incidents. These measures help minimize damage, restore systems, and prevent future attacks. Ex: Like repairing a broken lock and recovering stolen valuables after a burglary. Corrective Measures (Response & Recovery After an Attack) Key Preventive Measures: 1. Incident Response Plan (IRP) 2. Data Backup & Recovery 3. Software Patching & Updates 4. Blocking or Revoking Access 5. Forensic Analysis & Investigation Why Are Corrective Measures Important? o Minimize the impact of security breaches and restore normal operations. o Prevent the same attack from happening again by fixing vulnerabilities. o Ensure business continuity even after a security incident. o Improve future security strategies by learning from past incidents. Corrective measures help recover quickly.
  • 11. Galgotias University 11 Security Approach Match-Up(10 min) Scenario 1: Unauthorized Access to a University Database A student finds an old professor’s login credentials and accesses the university’s grading system to change their marks. The IT team discovers the changes during a routine audit. Discussion Questions: 1.What preventive measures should have been in place? (e.g., Password expiration policies, Multi-Factor Authentication) 2.How could detective measures have detected this sooner? (e.g., Regular security audits, system logs, user behavior monitoring) 3.What corrective actions should the university take? (e.g., Change login policies, restore original grades, improve system security)
  • 13. Galgotias University 13 Concept and Definition for Learning Activity 2
  • 14. Galgotias University 14 THE OSI SECURITY ARCHITECTURE The OSI (Open Systems Interconnection) Security Architecture provides a framework for securing communication systems by addressing security concerns across different layers of network communication. It was developed by ISO (International Organization for Standardization) to identify security threats, define security services, and establish security mechanisms Security attack (Threats to Security): The OSI model classifies security threats into two main types: Passive Attacks (Eavesdropping, Traffic Analysis) Attackers secretly monitor communication without altering data. Example: A hacker intercepting an email without modifying it. Active Attacks (Modification, Masquerade, Replay, Denial of Service) Attackers alter, disrupt, or impersonate communication. Example: A hacker modifying bank transaction details during online payment.
  • 15. Galgotias University 15 THE OSI SECURITY ARCHITECTURE A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. Security Mechanisms (How Security is Implemented) Security Services (Protection Measures) A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
  • 16. Galgotias University 16 Definition of threat and attack A threat is a possible security violation that might exploit the vulnerability of a system or asset. The origin of the threat may be accidental, environmental (natural disaster), human negligence, or human failure. A hacker trying to find weaknesses in a bank's website. Threat: Attack Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself. A hacker steals money from a bank by hacking into accounts.
  • 17. Galgotias University 17 Summary A. The Need for Security: Protects sensitive data, prevents cyber threats (hacking, malware, phishing), and ensures safe communication. B. Security Approaches: Includes Preventive (firewalls, encryption), Detective (monitoring, IDS), and Corrective (incident response, backups) measures. C. Confidentiality: Ensures data is accessible only to authorized users (e.g., encryption, access controls). D. Integrity: Maintains accuracy and reliability of data (e.g., hashing, digital signatures). E. Availability: Ensures systems and data remain accessible when needed (e.g., backups, disaster recovery plans).
  • 18. Galgotias University 18 Ensure attainment of LOs in alignment to the learning activities: outcomes (1-2) LO1: Describe Security Approaches: preventive, detective and corrective measures. LO2:Identify common security threats, such as phishing, malware, DoS and insider threats.
  • 19. Galgotias University 19 Discussion on the post session activities Attempt the Post-session activity on LMS, before next session
  • 20. Galgotias University 20 Information to next topic of the course Next session: Types of Attacks
  • 21. Galgotias University 21 Review and Reflection from students https://gulms.galgotiasuniversity.org/mod/ feedback/view.php?id=41919

Editor's Notes

  • #3: Restart the Phone – Try a simple reboot to see if the issue is temporary. Boot in Safe Mode – If possible, restart in Safe Mode to prevent malicious apps from running. Disconnect from the Internet – Turn off Wi-Fi and Mobile Data to stop the virus from spreading or communicating with remote servers.
  • #4: Identify common security threats, such as phishing, malware, denial-of-service (DoS), and insider threats.
  • #8: 🔹 Firewalls – Block unauthorized access to networks by filtering incoming and outgoing traffic. 🔹 Antivirus & Anti-malware Software – Detect and remove malicious software before it infects a system. 🔹 Strong Authentication & Password Policies – Use strong passwords and Multi-Factor Authentication (MFA) to prevent unauthorized access. 🔹 Access Control – Restrict access to sensitive data based on user roles and permissions. 🔹 Data Encryption – Secure data by converting it into an unreadable format that only authorized users can decode. 🔹 Security Awareness Training – Educate users about phishing, scams, and social engineering attacks to prevent human errors. 🔹 Software Updates & Patch Management – Regularly update software and operating systems to fix security vulnerabilities. 🔹 Physical Security Measures – Use security cameras, biometric access, and ID verification to prevent unauthorized physical access. 🔹 Network Segmentation – Divide a network into sections to limit the spread of cyber threats. 🔹 Backup & Disaster Recovery Plans – Regularly back up data to ensure it can be restored in case of an attack or failure.
  • #9: 🔹 Intrusion Detection Systems (IDS) – Monitors network traffic and alerts administrators about suspicious activity. 🔹 Security Logs & Auditing – Tracks user activities, login attempts, and system changes to identify security threats. 🔹 Anti-malware & Virus Scanning – Scans files and applications for malware or malicious behavior. 🔹 User Behavior Analytics (UBA) – Uses AI and analytics to detect unusual user activity, such as unauthorized access attempts. 🔹 SIEM (Security Information and Event Management) Systems – Collects and analyzes security data from different sources to identify threats in real time. 🔹 Honeypots – Decoy systems designed to attract and analyze attackers' behavior before they can cause real damage. 🔹 Surveillance Cameras & Physical Monitoring – Detects unauthorized physical access to restricted areas. 🔹 Network Traffic Monitoring – Analyzes data flow to detect potential threats, such as unusual spikes in traffic that might indicate a cyberattack. 🔹 File Integrity Monitoring (FIM) – Detects unauthorized changes to critical system files. 🔹 Penetration Testing & Vulnerability Scanning – Simulates attacks to uncover weaknesses in a system.
  • #10: Incident Response Plan (IRP) – A structured approach for handling security breaches, including containment, investigation, and recovery. 🔹 Data Backup & Recovery – Regular backups ensure that lost or corrupted data can be restored after an attack or system failure. 🔹 Software Patching & Updates – Fixes vulnerabilities that were exploited during an attack to prevent recurrence. 🔹 Blocking or Revoking Access – Disables compromised accounts, resets passwords, or restricts system access to contain a breach. 🔹 System Restoration & Reinstallation – Reverts systems to a secure state after malware infection or unauthorized changes. 🔹 Security Policy Adjustments – Updates security policies and procedures based on lessons learned from an incident. 🔹 Forensic Analysis & Investigation – Identifies the root cause of the attack and gathers evidence for legal action. 🔹 User Awareness & Training – Educates employees on what went wrong and how to prevent similar incidents in the future. 🔹 Enhanced Monitoring & Logging – Improves detection systems to catch similar threats earlier in the future. 🔹 Legal & Compliance Actions – Ensures that regulatory reporting and legal actions are taken after a security breach.
  • #16: Threat: A thief watching your house, looking for ways to break in. 🔨 Attack: The thief breaking into your house and stealing valuables.
  • #18: Conclusion: 1 min [46]
  • #19: * Share / Discuss details – 1 min [47]
  • #20: Conclusion: 1 min [48]
  • #21: Conclusion: 2 min [50]