Cyber Security PDF
Cyber Security PDF
KARNATAKA, SURATHKAL
Prepared by:
-Sangamesh Kalbemullge.
-191CS153
-B tech I sem.
❖ A DEFINITION OF CYBER SECURITY
• Network security
• Application security
• Endpoint security
• Data security
• Identity management
• Database and infrastructure security
• Cloud security
• Mobile security
• Disaster recovery/business continuity planning
• End-user education
The most difficult challenge in cyber security is the ever-evolving nature of
security risks themselves. Traditionally, organizations and the government have
focused most of their cyber security resources on perimeter security to protect
only their most crucial system components and defend against known treats.
Today, this approach is insufficient, as the threats advance and change more
quickly than organizations can keep up with. As a result, advisory organizations
promote more proactive and adaptive approaches to cyber security. Similarly, the
National Institute of Standards and Technology (NIST) issued guidelines in its
risk assessment framework that recommend a shift toward continuous
monitoring and real-time assessments, a data-focused approach to security as
opposed to the traditional perimeter-based model.
But since the publication of this list, there has been widespread adoption of
several different types of game-changing technology: cloud computing, big data,
and adoption of mobile device usage, to name a few.
REFERENCES
https://digitalguardian.com/blog/what-cyber-security
https://niti.gov.in/sites/default/files/2019-
07/CyberSecurityConclaveAtVigyanBhavanDelhi_1.pdf
https://www.secureworks.com/blog/cyber-threat-basics