0% found this document useful (0 votes)
10 views2 pages

Why Cyber Security Is Important

what is cyber cecurity and impoertance

Uploaded by

kunsiif2022
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

Why Cyber Security Is Important

what is cyber cecurity and impoertance

Uploaded by

kunsiif2022
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

WHAT CAN YOU DO?

It’s important that we each understand the CYBER SECURITY IS


risks as well as the actions we can take to
OUR SHARED
help protect our information and systems.
RESPONSIBILITY
• Properly configure and patch operating
systems, browsers, and other software DO YOUR
programs.
• Use and regularly update firewalls, PART!
anti-virus, and anti-spyware programs.
• Use strong passwords (combination of Why Cyber
upper and lower case letters, numbers
and special characters) and do not
share passwords. How we can empower you? Security Is
Important?
• Be cautious about all communications;
think before you click. Use common
sense when communicating with users
[email protected]
you DO and DO NOT know. Phone 718-368-6679
• Do not open email or related www.kbcc.cuny.edu
attachments from un-trusted sources.
• Allow access to systems and data to
only those who need it, and protect
those access credentials.
• Follow your organization’s cyber
security policies, and report violations Brought to you in partnership
and issues when they occur. with the Multi-State Information
Sharing and Analysis Center
BE SAFE Multi-State Information
Sharing and Analysis Center
THAN SORRY! www.msisac.org
[email protected]
WHAT IS CYBER SECURITY? WHY IS CYBER SECURITY IMPORTANT? Malware, Worms and Trojan horses: These
spread by email, instant messaging, malicious
Many aspects of our lives rely on the Internet The increasing volume and sophistication of cyber websites and infected non-malicious websites.
and computers, including communications security threats–including targeting phishing scams, Some websites will automatically download the
(email, cell phones, texting), transportation data theft, and other online vulnerabilities–demand malware without the user's knowledge or
(traffic control signals, car engine systems, that we remain vigilant about securing our systems intervention. This is known as a "drive-by
airplane navigation), government (birth/death and information. download." Other methods will require the users
records, social security, licensing, tax records), to click on a link or button.
finance (bank accounts, loans, electronic The average unprotected computer (i.e. does not have
paychecks), medicine (equipment, medical proper security controls in place) connected to the Botnets and zombies: A botnet, short for
records), and education (virtual classrooms, Internet can be compromised in moments. Thousands robot network, is an aggregation of
online report cards, research). of infected web pages are being discovered every day. compromised computers that are connected to a
Hundreds of millions of records have been involved in central "controller." The compromised
Consider how much of your personal data breaches. New attack methods are launched computers are often referred to as "zombies."
information is stored either on your own continuously. These are just a few examples of the These threats will continue to proliferate as the
computer or on someone else’s system. How is threats facing us, and they highlight the importance of attack techniques evolve and become available
that data and the systems on which that data information security as a necessary approach to to a broader audience, with less technical
resides (or is transmitted) kept secure? protecting data and systems. knowledge required to launch successful
attacks. Botnets designed to steal data are
Cyber security involves protecting the RISKS improving their encryption capabilities and thus
information and systems we rely on every day— becoming more difficult to detect.
whether at home, work or school. There are many risks, some more serious than others.
Some examples of how your computer and systems “Scareware” – fake security software
There are three core principles of cyber could be affected by a cyber security incident — warnings: This type of scam can be
security: Confidentiality, Integrity and whether because of improper cyber security controls, particularly profitable for cyber criminals, as
Availability. manmade or natural disasters, or malicious users many users believe the pop-up warnings telling
wreaking havoc—include the following: them their system is infected and are lured into
Confidentiality: Information which is sensitive downloading and paying for the special software
or confidential must remain so and be shared Denial-of-service: refers to an attack that to "protect" their system.
only with appropriate users. successfully prevents or impairs the authorized
Integrity: Information must retain its integrity functionality of networks, systems or applications by Social Network Attacks: Social network
and not be altered from its original state. exhausting resources. What impact could a denial-of- attacks are major sources of attacks because of
Availability: Information and systems must be service have if it shut down a government agency’s the volume of users and the amount of personal
available to those who need it. website, thereby preventing citizens from accessing information that is posted. Users' inherent trust
information or completing transactions? What in their online friends is what makes these
For example, your confidential medical records financial impact might a denial-of-service have on a networks a prime target. For example, users
should be released only to those people or business? What would the impact be on critical may be prompted to follow a link on someone's
organizations (i.e. doctor, hospital, insurance, services such as emergency medical systems, police page, which could bring users to a malicious
government agency, you) authorized to see it communications or air traffic control? Can some of website.
(confidentiality); the records should be well these be unavailable for a week, a day, or even an
protected so that no one can change the hour?
information without authorization (integrity); DO YOUR PART!
and the records should be available and
accessible to authorized users (availability). BE MORE SECURE...

You might also like