Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Introduction to

Cybersecurity
Cybersecurity pertains to the protection of valuable data such as social security
numbers (SSN), business transactions, logs, and stored infrastructure data.
History of CyberSecurity
The history of cybersecurity is indeed interesting. It is thought to have started in 1971 when Bob Thomas, a computer
programmer with BBN, created and deployed a virus that served as a security test.

The field of cybersecurity is generally considered to have started in 1987, although there are claims from multiple sources
regarding the creation of the initial antivirus program before that time.
Types of Cybersecurity

Application Security Network Security Cloud Security Critical


Infrastructure
Focuses on securing Focuses on protecting the Focuses on securing data
Security
software applications and network infrastructure and applications hosted in
the data they handle. and the data transmitted cloud computing Focuses on protecting
over it. environments. essential services and
systems like power grids,
transportation, and
communication networks.
Application Cyber Security
Cyber Security application are Solutions made to detect, alleviate and prevent Security threats Which Could Compromise
an Organization's network and Systems
Network Cyber Security
Network Cyber Security protect your network and data from breaches, intrusions and other threats.
Cloud Cyber Security
Cloud Security ensures you data and applications are readily available to
authorized users.

Cloud Security ensures your data and applications are available to


authorized users.

Provides secure access to cloud-based resources and services.


Critical Infrastructure
Security
Critical infrastructure cyber Security refers to the program, protocols and
technology is used to protect the Critical infrastructure of nation Stater

1. What are the 5 Components of Cyber Secund


Components of Cyber Security

1 Employee Training 2 Policy Development 3 Incident Response


Educating employees on Establishing clear policies Having a plan in place to
cybersecurity best practices and procedures to guide the quickly and effectively
and how to identify and organization's cybersecurity respond to and mitigate the
respond to potential threats. efforts. impact of a cybersecurity
incident.

4 Technical Measures 5 Social Engineering


Implementing a range of technical controls, such Addressing the tactics of manipulating,
as firewalls, antivirus software, and encryption, to influencing, or deceiving victims to gain control
protect against cyber threats. over a computer system or steal personal and
financial information.
Career in Cyber Security

Help Desk Technician Network Administrator Software Developer


Providing technical support and Managing and securing computer Designing and developing secure
troubleshooting for cybersecurity networks to protect against cyber software applications and systems.
systems and software. threats.

Courses in Cyber Security


• Introduction Foundations of Cyber Security
• Network Security
• Penetration Testing
• Ethical Hacking

Coding in Cyber Security


Yes, Cyber Security professionals must understand Coding Concepts in order to correctly interpret the activity of
malicious actors on their network. While programming skills are not required to become a professional, a Cyber Security
professional learning these programming languages can open the door to higher-level Cyber Security roles.
Summary of Cyber Security
Introduction to Components of Careers in Cyber Coding in Cyber
Cyber Security Cyber Security Security Security

We learned the basics of We covered the key We explored the various We discussed the
cyber security, components that make career paths available in importance of coding
including its history and up a comprehensive the field of cyber and programming
the different types of cyber security strategy, security, including the knowledge in the field
cyber security. such as application, skills, training, and of cyber security, and
network, and cloud courses needed to how it is applied to
security. succeed. protect systems and
data.

You might also like