1 / 22

Computer Security | Types of Computer Security | Cybersecurity Course | Edureka

** Edureka Cybersecurity Course: https://www.edureka.co/cybersecurity-certification-training **<br>This Edureka tutorial gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this tutorial include:<br><br>1. What is Computer security?<br>2. Goals of Computer security<br>3. What to secure?- Types of computer security<br>4. Potential losses due to cyber attacks<br>5. How to secure?

EdurekaIN
Download Presentation

Computer Security | Types of Computer Security | Cybersecurity Course | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  2. Agenda What is Computer Security? Goals of Computer Security What to Secure?- Types of Computer Security Potential Losses due to Security Attacks How to Secure? CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  3. What are Bump Charts? Bump charts have a relatively simple purpose—they are used to visualize changes in rank over time. Relevant Dimension Time Dimension CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  4. Why Computer Security? Good Morning, this is Jon calling from your telecommunication company- I’m working on behalf of your ICT department. Due to troubleshooting work I’d like to ask for your user-ID and your password Oh alright. Sure!! CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  5. Goals of Computer Security Confidentiality Audit Data Integrity Control Availability CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  6. Confidentiality: Keep your Secrets Confidentiality Data Integrity Typically achieved by: ➢ Physical isolation ➢ Cryptography ➢ Background checks on People Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  7. Data Integrity: Prevent people from Modifying Data Confidentiality Data Integrity Typically achieved by: ➢ Redundancy ➢ Backups ➢ Checksums & digital signatures Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  8. Availability: Make Sure you can Use Your System Confidentiality Data Integrity Typically achieved by: ➢ Hardening ➢ Redundancy ➢ Reference Checks on People Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  9. Control: Regulate your System Usage Confidentiality Data Integrity Typically achieved by: ➢ Access Control lists ➢ Physical Security Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  10. Audit: Something Wrong Happened. How to Undo It? Confidentiality Data Integrity Typically achieved by: ➢ Log Files ➢ Human auditors & expert systems Availability Control Audit CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  11. What to Secure?- Types of Computer Security Physical Security Controlling who gets access to a computer OS Security Permission controlling schemes, making sure users are authorized to perform certain actions Access Control Managing who can Access what resources, from physical machines to programs to networks CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  12. Potential Losses due to Security Attacks Reputation Loss Unethical usage of Computer Resources Identity Theft Losing your data CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  13. How to Secure?

  14. Basic Computer Security Checklist Check if the user is password protected Terminate unusual services running that consumes resources Check if the firewall is on or not Check if the OS is updated Download software from reputable sources Check for your backups regularly Check if the antivirus or antimalware is installed Clear your private data from web browsers CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  15. Securing your OS Backup your system Keep your windows OS up to date Use a standard user account Update your software Keep your user account control enabled Create a Restore point Install antivirus product Secure your web browser before going online Install a proactive security solution for multi-layered protection Use an encryption software tool for your hardware CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  16. Antivirus Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware Scanning Integrity Interception CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  17. Securing Your Network: Firewalls A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules Cisco ASA Series Juniper Checkpoint SonicWALL Fortinet pfSense CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  18. Securing Your Network: IDS An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations Firewall Router Internet LAN IDS Snort BlackICE Defender Vanguard Enforcer CyberCop Monitor CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  19. Securing Your Network: VPN A virtual private network extends a secure and encrypted connection to share data remotely through public networks CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

  20. Don’t just learn it, MASTER it with

More Related