210 likes | 448 Views
** Edureka Cybersecurity Course: https://www.edureka.co/cybersecurity-certification-training **<br>This Edureka tutorial gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this tutorial include:<br><br>1. What is Computer security?<br>2. Goals of Computer security<br>3. What to secure?- Types of computer security<br>4. Potential losses due to cyber attacks<br>5. How to secure?
E N D
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Agenda What is Computer Security? Goals of Computer Security What to Secure?- Types of Computer Security Potential Losses due to Security Attacks How to Secure? CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What are Bump Charts? Bump charts have a relatively simple purpose—they are used to visualize changes in rank over time. Relevant Dimension Time Dimension CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Why Computer Security? Good Morning, this is Jon calling from your telecommunication company- I’m working on behalf of your ICT department. Due to troubleshooting work I’d like to ask for your user-ID and your password Oh alright. Sure!! CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Goals of Computer Security Confidentiality Audit Data Integrity Control Availability CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Confidentiality: Keep your Secrets Confidentiality Data Integrity Typically achieved by: ➢ Physical isolation ➢ Cryptography ➢ Background checks on People Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Data Integrity: Prevent people from Modifying Data Confidentiality Data Integrity Typically achieved by: ➢ Redundancy ➢ Backups ➢ Checksums & digital signatures Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Availability: Make Sure you can Use Your System Confidentiality Data Integrity Typically achieved by: ➢ Hardening ➢ Redundancy ➢ Reference Checks on People Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Control: Regulate your System Usage Confidentiality Data Integrity Typically achieved by: ➢ Access Control lists ➢ Physical Security Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Audit: Something Wrong Happened. How to Undo It? Confidentiality Data Integrity Typically achieved by: ➢ Log Files ➢ Human auditors & expert systems Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What to Secure?- Types of Computer Security Physical Security Controlling who gets access to a computer OS Security Permission controlling schemes, making sure users are authorized to perform certain actions Access Control Managing who can Access what resources, from physical machines to programs to networks CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Potential Losses due to Security Attacks Reputation Loss Unethical usage of Computer Resources Identity Theft Losing your data CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Basic Computer Security Checklist Check if the user is password protected Terminate unusual services running that consumes resources Check if the firewall is on or not Check if the OS is updated Download software from reputable sources Check for your backups regularly Check if the antivirus or antimalware is installed Clear your private data from web browsers CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing your OS Backup your system Keep your windows OS up to date Use a standard user account Update your software Keep your user account control enabled Create a Restore point Install antivirus product Secure your web browser before going online Install a proactive security solution for multi-layered protection Use an encryption software tool for your hardware CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Antivirus Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware Scanning Integrity Interception CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: Firewalls A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules Cisco ASA Series Juniper Checkpoint SonicWALL Fortinet pfSense CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: IDS An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations Firewall Router Internet LAN IDS Snort BlackICE Defender Vanguard Enforcer CyberCop Monitor CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Securing Your Network: VPN A virtual private network extends a secure and encrypted connection to share data remotely through public networks CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training