190 likes | 407 Views
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **<br>This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:<br>Need for cybersecurity<br>What is cybersecurity<br>Fundamentals of cybersecurity<br>Cyberattack Incident<br><br>Follow us to never miss an update in the future.<br><br>Instagram: https://www.instagram.com/edureka_learning/<br>Facebook: https://www.facebook.com/edurekaIN/<br>Twitter: https://twitter.com/edurekain<br>LinkedIn: https://www.linkedin.com/company/edureka
E N D
Agenda 02 04 01 03 Ensuring Cybersecurity: Scenario Cybersecurity Fundamentals What is Cybersecurity Security? Need for cybersecurity Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Need For Cybersecurity Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Digital Era Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cyberattacks Malware Ransomware Phishing Malvertising DDoS MITM Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What Is Cybersecurity? Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Cybersecurity Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Information Security Application Security Operational Security Network Security Disaster Security End-user Education Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Fundamentals Of Cybersecurity Copyright © 2018, edureka and/or its affiliates. All rights reserved.
CIA Triad Availability Integrity Confidentiality Availability is making sure that authorized parties are able to access the information when needed Integrity refers to protecting information from being modified by unauthorized parties. Confidentiality is about preventing the disclosure of data to unauthorized parties. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
CIA Triad Broken Down Availability Integrity Confidentiality •DDoS attacks •Ransomware Attacks •Disrupting Server •Web Penetration •Unauthorised Scans •Remote Controlling •Cracking Encrypted Data •Man In The Middle •Installing Spyware •Doxxing Attacks •Regular Backup •Data Replication •Adequate communication bandwidth •Intrusion Detection •Cryptography •Hashing •Access Control •Encryption •Biometric Verification Countermeasures Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
The Three Pillars of Cybersecurity People Processes Technology Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cyberattack Incident Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Meet Wendy Book Appointments Make Payments Manage Accounts Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Incident Book Appointments Make Payments Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Solution – Incident Response Team Identify the source and performs business impact analysis Detects logs and access control issues Contains the threat paths to stop further damage Active Response System Prioritizes recovery and install prevention software Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training