SlideShare a Scribd company logo
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Why we need Cyber Security?
What is Cyber Security?
The CIA Triad
Vulnerability, Threat and Risk
Cognitive Cyber Security
Agenda
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
A Digital Era
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Golden Age for Data Exploits
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cyber Threats
Phishing
Malware
Password Attacks
Maladvertising
Man In the Middle
Drive-By Downloads
Rogue SoftwareDDoS
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
History of Cyber Attacks
Cyber-threats are not only increasing by the year, but they are becoming harder to recognise and also evolving
with time so they can easily by pass normal anti-viruses
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cyber Security
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from
cyberattacks.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Protect Against What?
Unauthorised Deletion
Unauthorised Access
Unauthorised Modification
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
The CIA Triad
Confidentiality Integrity Availability
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Attacks on CIA
o Cracking Encrypted Data
o Man In The Middle
attacks on plain text
o Data leakage/
Unauthorised copying of
sensitive data
o Installing
Spyware/Malware on a
server
o Web Penetration for
malware insertion
o Maliciously accessing
servers and forging
records
o Unauthorised Database
scans
o Remotely controlling
zombie systems
o DOS/DDoS attacks
o Ransomware attacks –
Forced encryption of Key
data
oDeliberately disrupting a
server rooms power
supply
o Flooding a server with
too many requests
Confidentiality Integrity Availability
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Steps to Fix a Crime
Analyse and Evaluate
Treat
Identify
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Vulnerability, Threat & Risk
o Vulnerability refers to the
weakness of an asset that
can be exploited by one or
more attacker
o In context of cyber world,
vulnerability refers to a
bug/ defect in hardware
or software which
remains to be fixed and is
prone to be exploited to
cause a damage to one of
the elements within CIA
triad
o Risk refers to the
potential for loss or
damage when a threat
exploits a vulnerability
o Risk = Threat x
Vulnerability
o Risk management is key
to cybersecurity
o A threat is any event that
has the potential to bring
harm to an organisation
or individual
o Natural Threats,
Intentional Threats,
Unintentional threats
o Threat assessment
techniques are used for
understanding threats.
THREAT
Vulnerability Threat Risk
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Meet Bob
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Activity Response System
People Processes
Activity Response System
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cyber Attack
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Security Information and Event Management
SIEM
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Threat Intelligence Software
Threat
Intelligence
Software
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Patching
Step 1 for Debugging
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Without Cyber Security
Ad

More Related Content

What's hot (20)

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 

Similar to What is Cyber Security? | Introduction to Cyber Security | Cyber Security Training | Edureka (20)

Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Edureka!
 
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
Mansi Kandari
 
Cybersecurity Awareness Enterprise Training
Cybersecurity Awareness Enterprise TrainingCybersecurity Awareness Enterprise Training
Cybersecurity Awareness Enterprise Training
priyanshamadhwal2
 
Cybersecurity Awareness 2.0 Enterprise Training.pdf
Cybersecurity Awareness 2.0 Enterprise Training.pdfCybersecurity Awareness 2.0 Enterprise Training.pdf
Cybersecurity Awareness 2.0 Enterprise Training.pdf
infosec train
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdfwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
sarthak841219
 
The Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdf
The Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdfThe Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdf
The Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdf
Toronto Innovation College
 
The Importance of Cybersecurity Courses in Today’s Digital World.pptx
The Importance of Cybersecurity Courses in Today’s Digital World.pptxThe Importance of Cybersecurity Courses in Today’s Digital World.pptx
The Importance of Cybersecurity Courses in Today’s Digital World.pptx
Jaro Education
 
How to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docHow to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.doc
EmmanuelDaniel41
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
advancedtrainingaus
 
CyberSecurity Study Jam
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study Jam
SahilSingh368445
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochure
Nick Serafimov
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
cybersecurity TEMCA powerpoint presentation on starting a cyber career
cybersecurity TEMCA powerpoint presentation on starting a cyber careercybersecurity TEMCA powerpoint presentation on starting a cyber career
cybersecurity TEMCA powerpoint presentation on starting a cyber career
2kentest1
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptxwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
sarthak841219
 
Introduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptxIntroduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptx
056kevinChauhan
 
cybersecurity and its importance in digital era
cybersecurity  and  its importance in digital eracybersecurity  and  its importance in digital era
cybersecurity and its importance in digital era
rohanbirsinhg4
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
SOCVault
 
SEC-100 CyberCore Security Essentials_ A Complete Guide.docx
SEC-100 CyberCore Security Essentials_ A Complete Guide.docxSEC-100 CyberCore Security Essentials_ A Complete Guide.docx
SEC-100 CyberCore Security Essentials_ A Complete Guide.docx
Oscp Training
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Edureka!
 
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝟐.𝟎 𝐄𝐧𝐭𝐞𝐫𝐩𝐫𝐢𝐬𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
Mansi Kandari
 
Cybersecurity Awareness Enterprise Training
Cybersecurity Awareness Enterprise TrainingCybersecurity Awareness Enterprise Training
Cybersecurity Awareness Enterprise Training
priyanshamadhwal2
 
Cybersecurity Awareness 2.0 Enterprise Training.pdf
Cybersecurity Awareness 2.0 Enterprise Training.pdfCybersecurity Awareness 2.0 Enterprise Training.pdf
Cybersecurity Awareness 2.0 Enterprise Training.pdf
infosec train
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdfwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1).pdf
sarthak841219
 
The Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdf
The Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdfThe Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdf
The Role of Cyber Security Training in Tackling Tomorrow’s Challenges.pdf
Toronto Innovation College
 
The Importance of Cybersecurity Courses in Today’s Digital World.pptx
The Importance of Cybersecurity Courses in Today’s Digital World.pptxThe Importance of Cybersecurity Courses in Today’s Digital World.pptx
The Importance of Cybersecurity Courses in Today’s Digital World.pptx
Jaro Education
 
How to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docHow to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.doc
EmmanuelDaniel41
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
advancedtrainingaus
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochure
Nick Serafimov
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
cybersecurity TEMCA powerpoint presentation on starting a cyber career
cybersecurity TEMCA powerpoint presentation on starting a cyber careercybersecurity TEMCA powerpoint presentation on starting a cyber career
cybersecurity TEMCA powerpoint presentation on starting a cyber career
2kentest1
 
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptxwepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
wepik-enhancing-cyber-security-awareness-20240305094544c7Bz (1) (1).pptx
sarthak841219
 
Introduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptxIntroduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptx
056kevinChauhan
 
cybersecurity and its importance in digital era
cybersecurity  and  its importance in digital eracybersecurity  and  its importance in digital era
cybersecurity and its importance in digital era
rohanbirsinhg4
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
SOCVault
 
SEC-100 CyberCore Security Essentials_ A Complete Guide.docx
SEC-100 CyberCore Security Essentials_ A Complete Guide.docxSEC-100 CyberCore Security Essentials_ A Complete Guide.docx
SEC-100 CyberCore Security Essentials_ A Complete Guide.docx
Oscp Training
 
Ad

More from Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!
 
What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!
 
Ad

Recently uploaded (20)

Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 

What is Cyber Security? | Introduction to Cyber Security | Cyber Security Training | Edureka

  • 1. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
  • 2. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Why we need Cyber Security? What is Cyber Security? The CIA Triad Vulnerability, Threat and Risk Cognitive Cyber Security Agenda
  • 3. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training A Digital Era
  • 4. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Golden Age for Data Exploits
  • 5. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Cyber Threats Phishing Malware Password Attacks Maladvertising Man In the Middle Drive-By Downloads Rogue SoftwareDDoS
  • 6. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training History of Cyber Attacks Cyber-threats are not only increasing by the year, but they are becoming harder to recognise and also evolving with time so they can easily by pass normal anti-viruses
  • 7. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Cyber Security Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.
  • 8. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Protect Against What? Unauthorised Deletion Unauthorised Access Unauthorised Modification
  • 9. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training The CIA Triad Confidentiality Integrity Availability
  • 10. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Attacks on CIA o Cracking Encrypted Data o Man In The Middle attacks on plain text o Data leakage/ Unauthorised copying of sensitive data o Installing Spyware/Malware on a server o Web Penetration for malware insertion o Maliciously accessing servers and forging records o Unauthorised Database scans o Remotely controlling zombie systems o DOS/DDoS attacks o Ransomware attacks – Forced encryption of Key data oDeliberately disrupting a server rooms power supply o Flooding a server with too many requests Confidentiality Integrity Availability
  • 11. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Steps to Fix a Crime Analyse and Evaluate Treat Identify
  • 12. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Vulnerability, Threat & Risk o Vulnerability refers to the weakness of an asset that can be exploited by one or more attacker o In context of cyber world, vulnerability refers to a bug/ defect in hardware or software which remains to be fixed and is prone to be exploited to cause a damage to one of the elements within CIA triad o Risk refers to the potential for loss or damage when a threat exploits a vulnerability o Risk = Threat x Vulnerability o Risk management is key to cybersecurity o A threat is any event that has the potential to bring harm to an organisation or individual o Natural Threats, Intentional Threats, Unintentional threats o Threat assessment techniques are used for understanding threats. THREAT Vulnerability Threat Risk
  • 13. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Meet Bob
  • 14. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Activity Response System People Processes Activity Response System
  • 15. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Cyber Attack
  • 16. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Security Information and Event Management SIEM
  • 17. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Threat Intelligence Software Threat Intelligence Software
  • 18. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Patching Step 1 for Debugging
  • 19. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Without Cyber Security