Professional Documents
Culture Documents
Cyber Security 3
Cyber Security 3
Cyber Security
Introduction Page 3
Conclusion Page 9
3
: Introduction
On the Internet, information is widespread—and business operators, alike,
risk data theft. Every year, technology becomes more complicated—and
so do cyber attacks. The world of digital crime is expansive—and it isn’t
exclusive to any particular Internet-accessible platform. Desktops,
smartphones, and tablets may each carry a degree of digital defense—but
each has inherent ‘weak points’ to which hackers have become attuned
Fortunately, some digital security tools and services run parallel to their
ill-intended tech counterparts. Even though our digital landscape’s
complexity obscures advanced threats, most can leverage network-based
assaults with digital disaster prevention tools
WHAT IS CYBER
?SECURITY
: Advanteges
.
Diverse areas and a range of job positions to choose from upon completing the cyber
security course
Professionals in cyber security are the harbinger and providers of digital security
which is highly valued
Disadvanteges
Tybes of cybercrimes
1. Malware
AI-based malware is more efficient in hiding from the reach of the anti-
malware software. Thus, when the software finds and eliminates malware,
the hackers would have already gained potential information from the user’s
device.
2. Botnet
3. Phishing
4 . Identity Theft
According to the FBI, identity theft occurs when someone “unlawfully obtains
another individual's personal information and uses it to commit theft or
8
fraud”. Not all identity thefts are a result of cyber attacks, but malware such
as trojans and spyware are often used to steal personal information
• 59% of employees steal company data when they resign or are fired.
• According to Baker & Hostetler, the causes of cyber security threats can be
various, which mainly include malware, employees’ action, external and
internal theft, vendor and so on.
Even the believe-to-be most secured software supply chain suffers from more
implanted malware attacks.
9
10
Conclusion
: Sources
https://www.edureka.co/blog/what-is-cybersecurity
https://www.simplilearn.com/introduction-to-cyber-security-
article#what_is_cyber_security
https://customerthink.com/top-positive-and-negative-impacts-of-ai-ml-on-
cybersecurity
https://ar.wikipedia.org/wiki/%D8%A7%D9%84%D8%B5%D9%81%D8%AD
%D8%A9_%D8%A7%D9%84%D8%B1%D8%A6%D9%8A
%D8%B3%D9%8A%D8%A9
THANK YOU