Professional Documents
Culture Documents
Security 2[1]
Security 2[1]
• Cyber Security is a process that's designed to protect networks and devices from external
threats. Businesses typically employ Cyber Security professionals to protect their confidential
information, maintain employee productivity, and enhance customer confidence in products
and services.
DEFINITION OF CYBERSECURITY:
• Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually
aimed at accessing, changing, or destroying sensitive information;
extorting money from users via ransomware; or interrupting
normal business processes.
HISTORY OF CYBER SECURITY:
The Creeper in the 1970s:
The Cybersecurity checking began in the 1970s when researcher Bob
Thomas created a computer program called Creeper that could move
across ARPANET's network. Ray Tomlinson, the innovator of email,
wrote the program Reaper, which chased and deleted Creepers.
Threats to Users
Identity Theft
Loss Of Privacy
Online Theft
Online Fraud
Loss of Privacy:
Others access your private stuff without permission, making
you feel exposed.
Online Fraud:
Con artists deceive you into giving them your info, leading to
theft and anxiety.
Hardware Failure
Power Outages
Natural Disasters
Malware Infections
Threats to Hardware and Data
1 2 3 4
Hardware Power Natural Malware
Failure Outages Disasters Infections
Online Tracking
Data Breaches
Social Media
Loss of Privacy
Cybercrime
Cyber-terrorism
Cybercrime:
Criminal activities online.
Cyber-terrorism:
Using cyber attacks for terrorism.
Confidentiality:
Integrity
Availability
GOALS OF CYBERSECURITY
Confidentiality:
•Protection of Data: Confidentiality involves keeping sensitive information private
and protected from unauthorized access. It ensures that only authorized individuals or
entities can access and view certain data.
Integrity:
Data Integrity: Integrity ensures that data remains
accurate and unaltered during storage, processing, and
transmission. Any unauthorized or accidental changes to
data should be detected and prevented.
GOALS OF CYBERSECURITY
Availability:
Availability focuses on ensuring that
systems and services are available and
operational when needed. Downtime due to
cyberattacks or system failures can lead to
significant disruptions.
IMPORTANCE OF CYBERSECURITY