Layers of Cyber Security Final
Layers of Cyber Security Final
1 MISSION CRITICAL
2 DATA SECURITY
ASSETS
DATA SECURITY 1. Mission critical assets are essential resources that are important for an
organization's core operations and success.
APPLICATION
2. This layer contains the actual data that should be secured
SECURITY
1. Data is the main target when it comes to cybercrime. This layer includes
APPLICATION various techniques, technologies and protocols to protect the storage and
SECURITY transfer of data
THE HUMAN LAYER • Two-factor authentication: It adds an extra layer of security by requiring
users to provide two separate forms of authentication before granting
access to the data
APPLICATION SECURITY
NETWORK 2. Since the application layer is the closest layer to the end user, it
SECURITY provides hackers with the largest threat surface.
1. This layer makes sure that the endpoints of user devices are not
NETWORK exploited by breaches. This includes the protection of mobile devices,
SECURITY
desktops, and laptops.
PERIMETER SECURITY 1. The network layer comprises the people as well as the devices
that have access to your systems, like your servers, computers.
THE HUMAN LAYER 2. Network security controls protect an organization’s network and
prevent unauthorized access of the network.
THE HUMAN LAYER 1. Perimeter security is controlling access to your network through routers and
gateways. The primary aim is to prevent unauthorized access by securing the
boundaries of your network.
2. You can control access to your network with strong firewall settings, enforcing
VPN for remote access, data encryption, network monitoring, secured devices and
vulnerability management.
3. The physical and digital security techniques that safeguard the entire company
are included in perimeter security controls.
4. Here, we must first define our perimeter before determining the sort of data being
transmitted across this layer, and then we must secure both the data and the
device.
1. This is the layer that includes all the people who have access to your network, whether they are
employees, contractors, or customers.
2. Humans are the weakest link in any cyber security strategy, and they are alone responsible for 90%
of data breaches.
3. Mission-critical assets are protected from a variety of human threats, such as cybercriminals,
malicious insider, and careless users.
• Training and Awareness: Educating employees about cybersecurity best practices, common threats
(like phishing), and how to recognize and respond to them is essential. Regular training helps create
a security-conscious culture.
• Access controls: Implementing strict access controls also helps to secure this layer by ensuring that
only authorized users have access to sensitive data and systems.
THANK YOU
PRESENTATION BY :
CHARANIYA S
DEEKSHITHA
MOHAMMED ADNAN
PRASAD KUMAR
JOEL VICKY