Intro To Cybersecurity
Intro To Cybersecurity
Intro To Cybersecurity
Cybersecurity
Introduction to Cybersecurity:
Course Agenda and Objectives
Agenda
Unit 1 Cybersecurity
• Define cybersecurity
• Understand cybercrimes and the different types that are present today
• Define phishing, spam, hacking, and identity theft
Cybersecurity
Cybersecurity is protecting yourself from someone stealing your digital information/personal data
or from someone pretending to act as you online
Key Terms
o Password – A combination of letters and numbers that is kept secret and used to gain access to a
computer, website, etc.
o Phishing – A scam email/website that tricks you into revealing personal information such as username,
password, location, etc.
o Spam – Unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking a harmful
link
o Virus –Harmful “software” that attaches to other programs to hurt or destroy a computer’s ability to
function normally
o Hacker – An unauthorized user trying to disrupt or damage a computer or network of computers
*Content was created by the IBM GBS North America Transformation Office
Impact on your future
Cybersecurity is a BIG issue, just a couple of weeks ago Instagram was hacked and over 6 million verified
account information was stolen. The hackers went on to try and sell that information for money.
90 30,000 6 Million
Passwords Websites Accounts
That means that you could This means you must be careful
Hackers stole over 6 million
have 90 passwords to keep about the websites you visit and
famous Instagram accounts’
track of; it’s important to make that even if you trust them, your
information and are selling their
sure all of your accounts are information could be at risk
personal information
safe
*Content was created by the IBM GBS North America Transformation Office
Imagine this…
Currently, the cost of cybercrime is $445 Billion per year. That’s more than all the illegal drug
trade in the world
*Content was created by the IBM GBS North America Transformation Office
Types of cybercrimes
There are many different types of cybercrimes, and for this course we will be looking
at the following:
The attempt to acquire sensitive information such as usernames, passwords, and credit card
details by masquerading as a something trustworthy, like a bank.
*Content was created by the IBM GBS North America Transformation Office
An example of Phishing
Dear Heather,
*Content was created by the IBM GBS North America Transformation Office
Spam
Spam is unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking
a harmful link
Spamming is the act of sending mail to a large number of e-mail addressees, and is often
compared to the term "junk mail" used to describe similar activities performed via postal
services.
Hacking is when someone gets unauthorized access to your computer/laptop and your personal
data. A Hacker is an unauthorized user trying to disrupt or damage a computer or network of
computers
Identity theft is the illegal use of someone else's personal information in order to obtain money
or credit.
Presented by
Personal data
*Content was created by the IBM GBS North America Transformation Office
Digital Footprint
*Content was created by the IBM GBS North America Transformation Office
Social media
*Content was created by the IBM GBS North America Transformation Office
Cookies
*Content was created by the IBM GBS North America Transformation Office
IP Address
An IP address is the address the computer has
when it connects to the internet.
*Content was created by the IBM GBS North America Transformation Office
Unit 2: Module II
How to protect yourself
Cybersecurity tips
Stop, Think, and Connect is a memorable
Passwords needs to be complicated but Always keep your personal information
way for you to stop and consider your
something you can remember. private.
actions online
Avoid simple passwords like password, Stop before clicking on any links, opening
Keep your personal information private
123456, qwerty – they’re easy to guess messages, sending information
Avoid sharing your name, address, phone Think about who is on the other side of
Longer passwords are more secure; try for
number, birthday, passwords to anyone anything you send and about the information
8-12 characters
you’re sending
Connect once you stopped and thought
Don’t talk to strangers or let strangers
about it, decide whether you really want to
Make them easy to remember friend/follow you
connect, send, post
*Content was created by the IBM GBS North America Transformation Office
The 10 hygiene tips to keep you safe online
Keep private
Look for the “S” in Think before you Be cautious with Update software
information
HTPPS click email regularly
PRIVATE
Change passwords Create complex Be cautious of free Log out of all Spread awareness
regularly passwords WiFi accounts to other
*Content was created by the IBM GBS North America Transformation Office
Unit 3:
Protect Your Apps
Corporates may lose Illegal use of someone else's Hurts the brand
clients, or Business personal information can be image, misleads
Partners or Customers used to obtain money, or for customers
other serious crimes
Encryption of Strong
Digital signatures
data passwords (the source contains a digital
(storing data in such a way (Create password using certificate that authenticates the
that only authorized parties different characters, and store message)
can access it) them safely)
We are increasingly using phones for banking, online shopping, and social media. The more we travel and access the
Internet on the go, the more risks we face on our mobile devices.