Introduction To Cyber Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Introduction to

Cyber Security
Bagus Satrio Waluyo Poetro

http://www.free-powerpoint-templates-design.com
Introduction
Cyber Security Basics:
Cyber security is the most concerned matter as
cyber threats and attacks are overgrowing.

POINTS

- - -

Attackers are Individuals, All these firms


now using more small-scale whether IT or
sophisticated businesses or non-IT firms have
techniques to large understood the
target the organization, are importance of
systems all being Cyber Security.
impacted.
What is Cyber Security ?
Cyber security is the
body of technologies,
processes, and practices
designed to protect
networks, computers,
programs and data from
attack, damage or
unauthorized access .
Why is Cyber
Security
important ?
The
Reasons… Cyber Attacks can be extremely
expensive for businesses to endure.

In addition to financial damage suffered


by the business, a data breach can also
inflict untold reputational damage.

Cyber attacks these days are becoming


progressively destructive.
Cyber Security

Fundamentals : Confidentiality
- Data Encryption
Confidentiality is about preventing
- Two Factor Authentication
the disclosure of data to
- Biometric Verification
unauthorized parties.
- Security Tokens

Integrity
Integrity refers to protecting - Cryptographic Checksums
information from being modified by - Using File Permissions
unauthorized parties. - Uninterrupted Power Supplies
- Data Backups
Availability
Availability is making sure that - Implementing Firewalls
authorized parties are able to - Backing up data to external drives
access the information when - Data Redudancy
needed.
Ty p e s o f
Cyber Attacks

1. Web Based Attacks


2. System Based Attacks
Cyber Attacks
Injection Attacks Virus

DNS Spoofing Worm

Phishing Trojan Horse

Denial of Service, etc… Bots, Bakdoors, etc…


7 Layers of Cyber Security

1: Mission Critical Assets – This is the data you need to protect


2: Data Security – Data security controls protect the storage and
transfer of data.
3: Application Security – Applications security controls protect access to
an application, an
application’s access to your mission critical assets, and the internal
security of the
application.
4: Endpoint Security – Endpoint security controls protect the connection
between devices and
the network.
7 Layers of Cyber Security

5: Network Security – Network security controls protect an organization’s


network and
prevent unauthorized access of the network.
6: Perimeter Security – Perimeter security controls include both the physical
and digital
security methodologies that protect the business overall.
7: The Human Layer – Humans are the weakest link in any cyber security
posture. Human
security controls include phishing simulations and access management
controls that protect
mission critical assets from a wide variety of human threats, including cyber
criminals,
malicious insiders, and negligent users.
Computer Criminals
Computer criminals have access to enormous amounts of
hardware, software, and data; they have the potential to cripple
much of effective business and government throughtout the
world. In a sense, the purpose of computer security is to prevent
these criminals from doing damage.
THANK YOU
Questions & Discussions -> [email protected] / +62822 2039 6897

You might also like