Cyber security

35
CYBER SECURITY BY :ANKUSH VERMA MCA

Transcript of Cyber security

Page 1: Cyber security

CYBERSECURITY

BY :ANKUSH VERMA MCA

Page 2: Cyber security

INTRODUCTION

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

Page 3: Cyber security

“Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.”

Page 4: Cyber security

What is a Cyber Security?

‘Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized’

Page 5: Cyber security

Categories of cyber crime

We can categorize cyber crime in two ways.The computer as a target :- using a

computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.

The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud etc.

Page 6: Cyber security

Why Cyber Security is needed ?

For Securing:Information Information SystemMaintain individual privacyEtc…

Page 7: Cyber security

Syllabus

UNIT-1Introduction to information systems, Types

of information Systems, Development of Information Systems, Introduction to information security, Need for Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis.

 

Page 8: Cyber security

UNIT-2Application security (Database, E-mail and Internet),

Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control.

Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious Software, Network and Denial of Services Attack, Security Threats to E-Commerce-

Electronic Payment System, e-Cash, Credit/Debit Cards. Digital Signature, public Key Cryptography

 

Page 9: Cyber security

UNIT-3Developing Secure Information Systems,

Application Development Security, Information Security Governance & Risk Management, Security Architecture & Design

Security Issues in Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets, Access Control, CCTV and intrusion Detection Systems, Backup Security Measures.

 

Page 10: Cyber security

UNIT-4Security Policies, Why Policies should be developed,

WWW policies, Email Security policies, Policy Review Process-Corporate policies-Sample Security Policies, Publishing and Notification Requirement of the Policies.

Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT

Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law.

Page 11: Cyber security

Information System

IS – a set of interrelated components working together to collect, retrieve, process, store, and distribute information for the purpose of control, coordination, analysis, and decision making in business organizations

Page 12: Cyber security

What is an Information System

Organized combination of1. Hardware2. Software3. Communications Networks4. Data5. People

Page 13: Cyber security

Types of Information Systems

Page 14: Cyber security

History Before Usage of IS

In the 70s, businessmen used a manual system to run their business

Page 15: Cyber security

History Before Usage of IS

They used traditional filling systems to keep track of their daily transactions.

Page 16: Cyber security

History Before Usage of IS

This cause them delays in making decisions and in planning strategies.

Page 17: Cyber security

The Usage of Information Systems

1. Management Information System (MIS)

2. Transaction Processing System (TPS)3. Decision Support System (DSS)

4. Executive Information System (EIS)5. Expert System (ES)

Page 18: Cyber security

Objective 1

The usage of Management Information System (MIS).

Page 19: Cyber security

Management Information System (MIS)

Used to provide regular information about the daily activities of a business to the manager

Page 20: Cyber security

Management Information System (MIS)

Help managers make the business processes and activities more efficient compared to doing them manually.

Page 21: Cyber security

Management Information System (MIS)

MIS Manual Systems

Page 22: Cyber security

Objective 2

The usage of Transaction Processing System (TPS)

Page 23: Cyber security

Transaction Processing System (TPS)

Used to record business transactions.

Information and Communication Technology [Form 5]

Page 24: Cyber security

Transaction Processing System (TPS)

Keep track of daily transactions in a database.

Page 25: Cyber security

Objective 3

The usage of Decision Support System (DSS).

Page 26: Cyber security

Decision Support System (DSS)

Provide managers with information to make the best decisions.

Information and Communication Technology [Form 5]

Page 27: Cyber security

Decision Support System (DSS)

Most Decision Support System report are in the form of charts and diagrams.

Page 28: Cyber security

Objective 4

The usage of Executive Information System (EIS).

Page 29: Cyber security

Executive Information System (EIS)

Helps top-level management to plan strategies.

Page 30: Cyber security

Executive Information System (EIS)

Used to forecast future trends.

Page 31: Cyber security

Objective 5

The usage of Expert System (ES).

Page 32: Cyber security

Expert System(ES)

Used to store knowledge and make logical suggestions for the user.

Page 33: Cyber security

Expert System(ES)

Expert system users can be professionals like doctors and scantiest.

Page 34: Cyber security

Expert System(ES)

An expert System can suggest conditions and estimate the probability of having illness.

Page 35: Cyber security