Cybersecurity 180303131014
Cybersecurity 180303131014
Cybersecurity 180303131014
Cyber security
What is Cybersecurity?
The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
Cyber Security and Information Security differs only in its
response and Reduction/Prevention.
Cyber security encompasses all aspects of security viz.,
Physical, Technical, Environmental, Regulations and
Compliance including Third Parties involved in delivering
an objective
With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm
are increasing also
Why Cybersecurity Is Important ?
• Our world today is ruled by technology and we can’t
do without it at all. From booking our flight tickets, to
catching up with an old friend, technology plays an
important role in it.
• However, the same technology may expose you when
it’s vulnerable and could lead to loss of essential
data. Cyber security, alongside physical commercial
security has thus, slowly and steadily, become one of
the most important topics in the business industry to
be talked about.
• Cyber security is necessary since it helps in securing
data from threats such as data theft or misuse, also
safeguards your system from viruses.
Why Cybersecurity is Important?
Cyber security becomes important as Business
are being carried now on Network of Networks.
Computer networks have always been the
target of criminals, and it is likely that the
danger of cyber security breaches will only
increase in the future as these networks
expand, but there are sensible precautions
that organizations can take to minimize losses
from those who seek to do harm.
Cyber Security Objectives
Confidentiality
the property that information is not
made available or disclosed to
unauthorized individuals, entities, or
processes
Confidentiality
(id/password) information
Phishing How-to
• Step 1 - Preparation
– Setup fake website
• Step 2 - Luring the
users Phishing email
– Send Email with fake
link
Phisher
Phishe
• Step 3 - Steal the r
details
– User gives away
id/password
• Step 4 - Use the details
– Commit fraud
Most common security mistakes
• Poor password management
• Not locking the computer while unattended
• Opening email attachments from unknown addressees
• Not running anti-virus programs
• Sharing information (and machines)
• Not reporting security violations
• Unattended Paper Documents
• Unprotected Electronic Data (while at rest and in
motion).E.g: Emails, USB’s, CD’s, etc..
• Improper Information Handling
• Passing of information over Phone.
Information Security Responsibilities
• Engage Information Security teams to support the line of business,
enabling secure solutions for new processes and technology
• Work with Information Security teams RISO, RISI to drive line
of business-specific information security metrics reporting
• Support Regional Information Security teams in mitigating
security risks from Internal Audit report findings
• Follow business continuity plans given by bank, in case of
any disaster/ emergency.
• Report Security Violations and security incidents
• Adhere to Bank’s Information Security Policy and guidelines
• Maintain and update Asset register of your office/dept
• Extend support to RISO during Risk Assessment and Business Impact
Analysis of your office/dept
• Implement and act in accordance with the organization’s information
security policies and procedures
• Protect assets from unauthorized access, disclosure, modification,
destruction, or interference
• Execute defined security processes or activities
• Report security events, potential events, or other security risks
by following approved processes
• Do not use systems or access information without authorization
• Adheres to controls put in place to protect assets
Standards & Regulations
ISO 27001 (Information Security Management
System)