cyber security
TRANSCRIPT
1
AMITY UNIVERSITYAMITY UNIVERSITY
NAME:-Ankit RanjanB.TECH-IT(1ST YEAR)
A2305313048TOPIC:-”CYBER SECURITY”
ABSTRACT
. Cyber Security restricted to describing the criminal activity in which the Computer or network is a part of Crime like fraud, theft & black mail
. Cyber Security includes Protection from theft, corruption or natural disaster while allowing the information & property remain accessible
. Cyber Security helps to understand the cyber Security Strategy, science of Cyber Security, Cyber Ecosystem
.Cyber Security deals with Securing the future-”SECURING FOR TOMORROW’S WORLD”
• The explosive growth, complexity, adoption and dynamism of cyber space that have enhanced social interaction & expanded our ability
• Cyber Security is an issue to be broad, there are too many devices being connected to the internet that have variable security
• The world wide security technology & service market is forecast to reach 67.2 billion in 2013, up 8.7 percent from 61.8 billion in 2012 according to Gartner
INTRODUCTION
• Protect the information & services from unintended & unauthorized access
• Allowing the information & property to remain accessible & productive to it’s intended user
• Protect from unplanned events & natural disaster
• Anticipate the techniques targets of known, new & emerging sophisticated threats
OBJECTIVE
• Growth of Cyber Security is very strongly demanded from industry & government for trained professionals, facing a skill gap
• In an interconnected world reliant upon smartphones, social media, e-commerce & cloud services, information security impacts more & more on public
• Cyber Security is more significantly expanded with more domains to secure & more ways to attack
UNDERSTANDING THE NEED & TRENDS
• Cyber Security education covers new area like Cyber physical attack, the protection of heterogeneous system & real time security data analysis
• The existing programs covers the traditional security ( cryptography ) & emerging technical area( cloud & mobile security )
• Designing & managing security for networks, software,hardware,data & applications is crucial
SCIENCE OF CYBER SECURITY
• Critical cyber system must trust, inspire & confidence, predictably protect integrity of data owners, & perform securely,& reliably
• Security science should have broad applicability, transcending specific system
• Cyber Security issues is relegated on increasing openness & collaboration, along with immediate priorities
7
INTER-RELATED CYBER ECOSYSTEM
• Automation helps to incorporate decisions & action taken in response to cyber events
• Interoperability defined as policies & allows for seamless & dynamic collaboration
• Authentication provides assurance that participants are authentic or genuine
8
CYBER SECURITY POLICIES• Cyber Security act of 2010 seek to
increase collaboration between public & private sector of cyber security issues
• International cyber crime reporting & cooperation act directs the president to give priority for assistance to improve legal, judicial, & enforcement capabilities with respect to cyber crime to countries with low information technology
9
• Protecting Cyberspace as a national assets act of 2010 would grant the president emergency powers over the internet
• National Cyber Defenses initiatives of Berlin is to detect & prevent attack against the national infrastructure
10
COMPUTER PROTECTION• Hardware security solutions can prevent
the read & write access to data
• Secure operating system protect the application code from malicious subversion
• Secure coding protect to execute putative data & the attacker couldn’t control of the processors
11
• Security Analyst
• Security Engineer
• Security Architect
• Security Administrator
• Chief Information Security Officer
12
CYBER SECURITY JOB MARKET