0% found this document useful (0 votes)
13 views8 pages

MO

Uploaded by

o0kwame0o
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views8 pages

MO

Uploaded by

o0kwame0o
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

CYBER SECURITY

MEMBERS OF THE TEAM


1‐ Mohammed Ahmed AL‐Sayed Hamad

‐ID:24030222

2‐Kareem Waled Al‐Sayed

‐ID:24030211

3‐Leena Sameh Mohammed

ID:24030213

4‐Kenzi Mohammed Salah

ID:24030208

5‐Louah Ahmed Mohammed

ID:24030207

1|Page
CONTENT

1‐ INTRODUCTION

2‐ The Significance of Cyber Security

3‐ The Mechanism of Cyber Security

4‐ Conclusion

2|Page
INTRODUCTION
Cyber Security is the protec on to defend connected
devices and services from malicious a acks by hackers,
spammers, and cybercriminals .Because of its prac ces
by people from several companies, there are no
poten al threats lurking behind every device and
pla orm

3|Page
Sec on 1 (The Significance of Cyber Security)

In That digital world of ours, one cannot ignore cybersecurity


today. One single security breach can cause exposure to the
personal informa on of millions of people. These breaches
have a massive financial influence on the companies and also
loss of the trust of customers. Hence, cyber security is very
significant to protect businesses and individuals from
spammers and cyber criminals:‐
 Protects every category of data from data the .
 preserve data, personal privacy, fundamental
infrastructure, na onal security, and global security.
 let businesses remain opera onal, be outstanding
stewards of their users’ data and privacy, prevent
revenue loss, and avoid regulatory consequences.
 Defends against unauthorized access and threats
lurking in the massive digital landscape.
 It is essen al in today's digital age, as our iden es are
significantly shi ing online and the supply chains
keeping us fed and clothed are all managed through
informa on technology.

Sec on 2 (The Mechanism of Cyber Security)

4|Page
Cyber security encompasses technologies, processes, and
methods to defend computer systems, data, and networks
from a acks. To best answer the ques on “what is cyber
security” and how cyber security works, we must divide it
into a series of subdomains:
Applica on Security:‐
Applica on security covers the implementa on of different
defenses in an organiza on’s so ware and services against a
diverse range of threats. This sub‐domain requires cyber
security experts to write secure codes, design secure
applica on architectures, implement robust data input
valida on, and more, to minimize the chance of unauthorized
access or modifica on of applica on resources.

Cloud Security:‐

Cloud security relates to crea ng secure cloud architectures


and applica ons for companies that use cloud service
providers like Amazon Web Services, Google, Azure,
Rackspace, etc.

Iden ty Management and Data Security:‐

This subdomain covers ac vi es, frameworks, and processes


that enable authoriza on and authen ca on of legi mate

individuals to an organiza on’s informa on systems. These


measures involve implemen ng powerful informa on storage
mechanisms that secure the data, whether in transi on or
residing on a server or computer. In addi on, this sub‐domain
5|Page
makes greater use of authen ca on protocols, whether two‐
factor or mul ‐factor.

Mobile Security:‐

Mobile security is a big deal today as more people rely on


mobile devices. This subdomain protects organiza onal and
personal informa on stored on mobile devices like tablets,
cell phones, and laptops from different threats like
unauthorized access, device loss or the , malware, viruses,
etc. In addi on, mobile security employs authen ca on and
educa on to help amplify security.

Network Security:‐

Network security covers hardware and so ware mechanisms


that protect the network and infrastructure from disrup ons,
unauthorized access, and other abuses. Effec ve network
security protects organiza onal assets against a wide range of
threats from within or outside the organiza on.

Disaster Recovery and Business Con nuity Planning:‐

Not all threats are human based. The DR BC subdomain


covers processes, alerts, monitoring, and plans designed to
help organiza ons prepare for keeping their business‐cri cal
systems running during and a er any sort of incident
(massive power outages, fires, natural disasters), and
resuming and recovering lost opera ons and systems in the
incident’s a ermath.

6|Page
User Educa on:‐

Knowledge is power, and staff awareness of cyber threats is


valuable in the cyber security puzzle. Giving business staff
training on the fundamentals of computer security is cri cal
in raising awareness about industry’s best prac ces,
organiza onal procedures and policies, monitoring, and
repor ng suspicious, malicious ac vi es. This subdomain
covers cyber security‐related classes, programs, and
cer fica ons.

7|Page
CONCLUSION
Cyber Security is indispensable . Its overwhelming presence
keeps the data, informa on, and financial affairs safe
.Without enormous influence, immeasurable damage could
occur that cannot be fixed.

8|Page

You might also like