Information Security - ENG
Information Security - ENG
Information security
What is cyber security ?
Cyber security is the protection of data from unauthorized
access, modification, or destruction.
Main objectives:
Cyber security
The main threats to cyber security
Cyber security
Data protection methods
Cyber security
Protection from password guessing
Example:
If someone tries to log into a bank account and enters the wrong password 5 times, the system
will temporarily block the login.
Cyber security
Secure network connection
Example:
An employee works from a cafe and connects to public Wi-Fi. If he or she doesn't use a VPN, an
attacker can intercept their data.
Cyber security
Physical computer security
Example:
An employee left an unlocked laptop in the office and the attacker gained access to it.
Cyber security
Data encryption
Converting information into an encrypted form that can only be accessed
with a key. It is used to protect databases, files, and correspondence.
Basic methods:
Example:
Messengers use end-to-end encryption so that only the sender and recipient can read
the messages.
Cyber security
Malicious attachments and
mail protection
Filters and antivirus scanners protect against viruses
in emails.
Do not open suspicious attachments, Use spam filters and verify the
even if you know the sender. sender's domain.
Example:
An employee received an email with an attachment "Invoice.ехе ". If the email is opened,
a virus is installed on the computer.
Cyber security
Restrict access to systems
Example:
A company accountant can see employee salaries, but cannot edit them without
the approval of the executive.
Cyber security
Security monitoring and auditing
Includes:
Example:
A company conducts a security audit and discovers that many employees
have weak passwords.
Cyber security
Human factor and user training
Training employees to recognize
Conducting cyber security trainings. phishing attacks.
Example:
A company sent test phishing emails to employees. Half of the employees have opened them,
which means additional training is needed.
Cyber security
Modern protection technologies
Biometric authentication
(fingerprints, Face ID)
Example:
An AI system notices that a user has logged into their account from a different country and
requests additional verification.
Cyber security
What should be done
in the event of an incident?
Cyber security
Results and key conclusions
Cyber security