Kendriya Vidyalaya Rajkot: Name-Class - Roll-No - Subject - Topic
Kendriya Vidyalaya Rajkot: Name-Class - Roll-No - Subject - Topic
--{2020-2021}--
INTRODUCTION
* Cyber security refers to a set of techniques So when talking about cyber security, one might
used to protect the integrity of networks, wonder “What are we trying to protect ourselves
programs and data from attack, damage or against?” Well, there are three main aspects we are
unauthorized access. trying to control, name:
From a computing point of view, security
comprises cyber security and physical security • Unauthorized Access
— both are used by enterprises to protect • Unauthorized Deletion
against unauthorized access to data centers and • Unauthorized Modification
other computerized systems. Information
security, which is designed to maintain the These three terms are synonymous with the very
confidentiality, integrity, and availability of commonly known CIA triad which stands for
data, is a subset of cyber security. The use of Confidentiality, Integrity, and Availability. The CIA
cyber security can help prevent cyber attacks, triad is also commonly referred to as the three pillars
data breaches, and identity theft and can aid in of security and most of the security policies of an
risk management. organization are built on these three principles.
NEED OF CYBER SECURITY
5 SOUTH 6
KOREA
IN-
DIA
HOW TO AVOID CYBER ATTACK ?
Train employees about cyber security principles.
Install, use and regularly update antivirus and antispyware
software on every computer used in your business.
Use a firewall for your internet connection .
Download and install software updates for your operating
system and applications as they become available.
Make backup copies of important business data and
information's
Benefits of managing cyber security ?
• Protect networks and data from unauthorized access.
• Improved information security and business continuity management.
• Improved stakeholder confidence in your information security
arrangements.
• Improved company credentials with the correct security controls in
place.
• Faster recovery times in the event of a breach.
CYBER SECURITY STRATEGY -INDIA
IT ACT – 2000
SECTION - 43 (DATA WITHOUT PERMISSON)
SECTION - 65 (TAMPERING)
SECTION - 66 (HACKING)
SECTION - 72 ( PRIVACY)
CONCLUTION
• Computer security attempts to ensure the
confidentiality, integrity, and availability of
computing systems and their components.
• Three principal parts of a computing system are
subject to attacks: hardware, software, and data.
• These three, and the communications among them,
are susceptible to computer security
vulnerabilities. In turn, those people and systems
interested in compromising a system can device
attacks that exploit the vulnerabilities.