Cyber Security

13
1 AMITY UNIVERSITY AMITY UNIVERSITY NAME:-Ankit Ranjan B.TECH-IT(1 ST YEAR) A2305313048 TOPIC:-”CYBER SECURITY”

Transcript of Cyber Security

1

AMITY UNIVERSITYAMITY UNIVERSITY

NAME:-Ankit RanjanB.TECH-IT(1ST YEAR)

A2305313048TOPIC:-”CYBER SECURITY”

ABSTRACT

. Cyber Security restricted to describing the criminal activity in which the Computer or network is a part of Crime like fraud, theft & black mail

. Cyber Security includes Protection from theft, corruption or natural disaster while allowing the information & property remain accessible

. Cyber Security helps to understand the cyber Security Strategy, science of Cyber Security, Cyber Ecosystem

.Cyber Security deals with Securing the future-”SECURING FOR TOMORROW’S WORLD”

• The explosive growth, complexity, adoption and dynamism of cyber space that have enhanced social interaction & expanded our ability

• Cyber Security is an issue to be broad, there are too many devices being connected to the internet that have variable security

• The world wide security technology & service market is forecast to reach 67.2 billion in 2013, up 8.7 percent from 61.8 billion in 2012 according to Gartner

INTRODUCTION

• Protect the information & services from unintended & unauthorized access

• Allowing the information & property to remain accessible & productive to it’s intended user

• Protect from unplanned events & natural disaster

• Anticipate the techniques targets of known, new & emerging sophisticated threats

OBJECTIVE

• Growth of Cyber Security is very strongly demanded from industry & government for trained professionals, facing a skill gap

• In an interconnected world reliant upon smartphones, social media, e-commerce & cloud services, information security impacts more & more on public

• Cyber Security is more significantly expanded with more domains to secure & more ways to attack

UNDERSTANDING THE NEED & TRENDS

• Cyber Security education covers new area like Cyber physical attack, the protection of heterogeneous system & real time security data analysis

• The existing programs covers the traditional security ( cryptography ) & emerging technical area( cloud & mobile security )

• Designing & managing security for networks, software,hardware,data & applications is crucial

SCIENCE OF CYBER SECURITY

• Critical cyber system must trust, inspire & confidence, predictably protect integrity of data owners, & perform securely,& reliably

• Security science should have broad applicability, transcending specific system

• Cyber Security issues is relegated on increasing openness & collaboration, along with immediate priorities

7

INTER-RELATED CYBER ECOSYSTEM

• Automation helps to incorporate decisions & action taken in response to cyber events

• Interoperability defined as policies & allows for seamless & dynamic collaboration

• Authentication provides assurance that participants are authentic or genuine

8

CYBER SECURITY POLICIES• Cyber Security act of 2010 seek to

increase collaboration between public & private sector of cyber security issues

• International cyber crime reporting & cooperation act directs the president to give priority for assistance to improve legal, judicial, & enforcement capabilities with respect to cyber crime to countries with low information technology

9

• Protecting Cyberspace as a national assets act of 2010 would grant the president emergency powers over the internet

• National Cyber Defenses initiatives of Berlin is to detect & prevent attack against the national infrastructure

10

COMPUTER PROTECTION• Hardware security solutions can prevent

the read & write access to data

• Secure operating system protect the application code from malicious subversion

• Secure coding protect to execute putative data & the attacker couldn’t control of the processors

11

• Security Analyst

• Security Engineer

• Security Architect

• Security Administrator

• Chief Information Security Officer

12

CYBER SECURITY JOB MARKET

Thanks