What is Cyber Security

Page 1

CYBER SECURITY www.cetpainfotech.com PHONE NO : 9212172602 Email id : query@cetpainfotech.com

CONTENTS

• What is Cyber Security?

• Why is Cyber Security important ?

• Combating CyberSecurity using Artificial Intelligence

• Role of Cyber Security

• History

What is Cyber Crime?

• Contact Us

WHAT IS CYBER SECURITY?

Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks.Also known as information technology(IT)security,

cybersecurity me

asures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.

WHY IS CYBER SECURITY IMPORTANT ?

As humans have become more reliant on technology, the prevalence and severity of cybercrimes have grown. For example, ransomware is a type of cyberattack that locks an individual’s or organization’s information until certain demands are met, including extorted payments. These attacks have affected financial, healthcare and education organizations, causing significant delays and leaks of information.

Cybersecurity remains important for anticipating, reacting and assessing cyberattacks. Professionals in this field study breaches and malicious actors to safeguard our most sensitive information and communications.

COMBATING CYBER SECURITY USING

ARTIFICIAL INTELLIGENCE

CyberSecurity&DataProtection

IndiaSummit

2018aimstoconvenethebestmindsin Cybersecurityunderonerooftocreatean interactivemilieuforexchangeofknowledge andideas.Theeventwillendeavourtoaddress theemergingandcontinuingthreatsto Cybersecurityanditschanginglandscape,as wellasrespondtoincreasingriskofsecurity breachesandsecuritygovernance,application security,cloudbasedsecurity,Network, Mobileandendpointsecurityandothercyber risksintheIndiaandabroad.

ROLE OF CYBER SECURITY

In the context of cybersecurity, “entrylevel” can be a bit of a misnomer. For some roles, the National Security Agency(NSA) defines entry-level as requiring a bachelor’s degree plus up to three years of relevant experience—less with higher-level degrees. With a high school diploma or GED, you’ll likely need between four and seven years of relevant...

HISTORY

Cyber Security is the practice of Protecting computers, mobile devices, Servers, electronic Systems, networks, and data from malicious attacks. It is also known as Information Security (INFOSEC) or Information Assurance (IA), System Security. The first cyber malware virus developed was pure of innocent mistakes. But cybersecurity has evolved rapidly because of the impeccable increase in the cybercrime law field on the Web. In this article, we will see the history of cyber security.

As these time-sharing systems emerged in the mid to late 1960s and many more jobs are using web, users were able to run at a similar time, controlling the access to data on the systems became a major point of concern. So one solution that was using logically classified data one level at the time of and scan the system after the jobs are from the one level run before the jobs for the next levels were running and ready for it, thus these approaches are directed to computer security is called periods processing because these jobs for each level will be run in a particular time of period the days.

Another effort that occurred in the mid to late 1970s was term Thus Each of these is discussed in the following Sub connections as some cybersecurity requirements can either be achieved by requiring procedures to be followed or by using system software mechanisms or functions to enforce the requirements then the alleviating the need and wants for the computer software mechanisms that would dealing to its states.

ARPANET and the Creeper in the 1970s:

WHAT IS CYBER CRIME?

• Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal.

• Cybercrime can be carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers.

PHONE NO : 9212172602 Email id : query@cetpainfotech.com Website : https://www.cetpainfotech.com/ THANK YOU!!!! CONTACT US CONTACT US

Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.