100% found this document useful (1 vote)
772 views

Layers of Cyber Security Final

This document outlines the 7 layers of cyber security: 1) Mission Critical Assets, 2) Data Security, 3) Application Security, 4) Endpoint Security, 5) Network Security, 6) Perimeter Security, and 7) The Human Layer. Each layer focuses on protecting different assets and from different threats. For example, the Mission Critical Assets layer focuses on securing important servers, data centers, and customer information, while the Human Layer focuses on educating and controlling access of employees and other users to reduce human-based threats. Proper security at each layer is important for comprehensive protection.

Uploaded by

Syed Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
772 views

Layers of Cyber Security Final

This document outlines the 7 layers of cyber security: 1) Mission Critical Assets, 2) Data Security, 3) Application Security, 4) Endpoint Security, 5) Network Security, 6) Perimeter Security, and 7) The Human Layer. Each layer focuses on protecting different assets and from different threats. For example, the Mission Critical Assets layer focuses on securing important servers, data centers, and customer information, while the Human Layer focuses on educating and controlling access of employees and other users to reduce human-based threats. Proper security at each layer is important for comprehensive protection.

Uploaded by

Syed Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

THE 7 LAYERS OF CYBER SECURITY

1 MISSION CRITICAL
2 DATA SECURITY
ASSETS

3 APPLICATION SECURITY 4 ENDPOINT SECURITY

5 NETWORK SECURITY 6 PERIMETER SECURITY

7 THE HUMAN LAYER


MISSION CRITICAL ASSETS

DATA SECURITY 1. Mission critical assets are essential resources that are important for an
organization's core operations and success.
APPLICATION
2. This layer contains the actual data that should be secured
SECURITY

3. These assets include servers, data centers, machinery, tools, customer


ENDPOINT
information, etc.
SECURITY

4. It varies from business to business, so what is considered critical for


NETWORK one business may not be the same for another.
SECURITY
5. Risk assessments, backup plans, regular monitoring, and investment in
PERIMETER these assets are required to reduce threats to mission-critical assets
SECURITY

THE HUMAN LAYER


DATA SECURITY

1. Data is the main target when it comes to cybercrime. This layer includes
APPLICATION various techniques, technologies and protocols to protect the storage and
SECURITY transfer of data

ENDPOINT 2. It focuses on safeguarding sensitive information and preventing


SECURITY unauthorized access, disclosure, alteration, or destruction of data.

3. Few of the security strategies used in this layer include:


NETWORK
SECURITY • Encryption: converting data into a coded format that can only be
accessed with an appropriate decryption key
PERIMETER
SECURITY • Backup: creation of backups or the duplication of data to protect
against accidental data loss or erasure.

THE HUMAN LAYER • Two-factor authentication: It adds an extra layer of security by requiring
users to provide two separate forms of authentication before granting
access to the data
APPLICATION SECURITY

ENDPOINT 1. Application layer security refers to ways of protecting web


SECURITY applications at the application layer from malicious attacks.

NETWORK 2. Since the application layer is the closest layer to the end user, it
SECURITY provides hackers with the largest threat surface.

3. Poor application layer security can lead to performance and stability


PERIMETER issues, data theft, and in some cases the network being taken down.
SECURITY
4. Examples of application layer attacks include distributed denial-of-
service attacks (DDoS) attacks, HTTP floods, SQL injections, cross-site
THE HUMAN LAYER
scripting, parameter tampering, and Slowloris attacks.

5. To combat these and more, most organizations have an arsenal of


application layer security protections, such as web application
firewalls (WAFs), secure web gateway services, and others.
ENDPOINT SECURITY

1. This layer makes sure that the endpoints of user devices are not
NETWORK exploited by breaches. This includes the protection of mobile devices,
SECURITY
desktops, and laptops. 

PERIMETER 2. Endpoint security measures safeguard the network connection


SECURITY between devices which are connected to end users.

3. The number of devices that are connected to your network is


THE HUMAN LAYER constantly increasing, and each one of these devices is a potential
entry point for hackers to hack the sytems.

4. If a device is connected to your network, it is considered an endpoint.


This is because all devices have the potential to be hacked and cause
a threat to your network.

5. Examples of endpoint layers Malware infection, Man-in-the-Middle


attack, Credential Theft.
NETWORK SECURITY

PERIMETER SECURITY 1. The network layer comprises the people as well as the devices
that have access to your systems, like your servers, computers.

THE HUMAN LAYER 2. Network security controls protect an organization’s network and
prevent unauthorized access of the network.

3. It is crucial to regularly update all systems on the business


network with the necessary security patches, including
encryption.

4. It’s always best to disable unused interfaces to further guard


against any threats. Example for Network layers are IP
Spoofing, ICMP flood, TCP/IP Hijacking, Jamming networks.
PERIMETER SECURITY

THE HUMAN LAYER 1. Perimeter security is controlling access to your network through routers and
gateways. The primary aim is to prevent unauthorized access by securing the
boundaries of your network.

2. You can control access to your network with strong firewall settings, enforcing
VPN for remote access, data encryption, network monitoring, secured devices and
vulnerability management.

3. The physical and digital security techniques that safeguard the entire company
are included in perimeter security controls.

4. Here, we must first define our perimeter before determining the sort of data being
transmitted across this layer, and then we must secure both the data and the
device.

5. Security Strategy: This includes firewalls, data encryption, antivirus software,


device management (which is crucial if your company has a bring-your-own-
device and setting up a secure demilitarized zone for further security.
THE HUMAN LAYER

1. This is the layer that includes all the people who have access to your network, whether they are
employees, contractors, or customers.

2. Humans are the weakest link in any cyber security strategy, and they are alone responsible for 90%
of data breaches.

3. Mission-critical assets are protected from a variety of human threats, such as cybercriminals,
malicious insider, and careless users.

4. Few of the security strategies used in this layer include:

• Training and Awareness: Educating employees about cybersecurity best practices, common threats
(like phishing), and how to recognize and respond to them is essential. Regular training helps create
a security-conscious culture.

• Access controls: Implementing strict access controls also helps to secure this layer by ensuring that
only authorized users have access to sensitive data and systems.
THANK YOU
PRESENTATION BY :

CHARANIYA S
DEEKSHITHA
MOHAMMED ADNAN
PRASAD KUMAR
JOEL VICKY

You might also like