0% found this document useful (0 votes)
166 views34 pages

Importance of Cyber Security: Mobile Phones

The document discusses the growing importance of cybersecurity due to the increasing reliance on technology, mobile devices, and smart systems. It outlines various aspects of cybersecurity, including its definition, the different realms of security, and the diverse career opportunities available in the field. Additionally, it highlights the need for protection against cyber threats and the complexity involved in managing cybersecurity challenges.

Uploaded by

Yasir Ejaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views34 pages

Importance of Cyber Security: Mobile Phones

The document discusses the growing importance of cybersecurity due to the increasing reliance on technology, mobile devices, and smart systems. It outlines various aspects of cybersecurity, including its definition, the different realms of security, and the diverse career opportunities available in the field. Additionally, it highlights the need for protection against cyber threats and the complexity involved in managing cybersecurity challenges.

Uploaded by

Yasir Ejaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Importance of Cyber Security

• Mobile Phones
• Total population of Pakistan (2020) → 219,067,896
• Number of mobile phone users in Pakistan has
reached 161.183 million, as of May 2019.
• Smart phones
• Traditional phones:
• SMS / Call Scams
Importance of Cyber Security
• Drones
• Here's How Hackers Could Have Spied On Your DJI Drone
Account
• https://thehackernews.com/2018/11/dji-drone-hack_8.html
Importance of Cyber Security
• Health / Medical
• Pacemaker: a device for stimulating the heart muscle and
regulating its contractions.
• Robotic Surgeons
• 5 Medical Robots Making a Difference in Healthcare
• https://online-engineering.case.edu/blog/medical-robots-making-
a-difference
• Remote Surgery
• China completes world’s first 5G remote surgery in test on animal
• https://www.youtube.com/watch?v=yFR61jjL1vo
• Robot Helps Perform First Long-Distance Heart Surgery
• A surgeon in India performed the first remote heart operation on
a patient 20 miles away.
• https://www.popularmechanics.com/technology/robots/a28941
179/robot-performs-first-long-distance-heart-surgery/
Bluetooth in health
• The field of ‘Cyber Security’ is becoming more important due to
increased reliance on
• computer systems
• the Internet
• wireless network standards
• such as Bluetooth and Wi-Fi
• due to the growth of "smart" devices
• including smartphones, televisions, and the "Internet of things".

• Owing to its complexity, both in terms of politics and technology,


cybersecurity is also one of the major challenges in the contemporary
world.
• Ease of use results in increasing underlying complexity
What is Cyber Security?
• Cyber
• Relating to or characteristic of the culture of computers, information technology, and virtual
reality.
• Cyberspace is a term for virtual reality coined by William Gibson.
• https://en.wikipedia.org/wiki/Cyberspace
• Cyber- is derived from "cybernetic", [https://en.wikipedia.org/wiki/Cybernetics ] which
comes from the Greek word κυβερνητικός meaning ’skilled in steering or governing’.
• Pronunciation:
[https://forvo.com/word/%CE%BA%CF%85%CE%B2%CE%B5%CF%81%CE%BD%CE%B7%CF%84%CE%B9
%CE%BA%CF%8C%CF%82/]
• Cybernetics: the science of communications and automatic control systems in both
machines and living things.
• Used to describe policies and politics regarding computer systems and networks.
• Term used in Information Technology industry and the Internet era.
• https://en.wikipedia.org/wiki/Internet-related_prefixes#.22Cyber-.22
• https://en.wikipedia.org/wiki/Cyber
What is Cyber Security?
• Security
• Degree of ‘protection’ [safe & secure].
• The state of being free from danger or threat.
• Security is freedom from, or resilience against, potential harm caused by
others. [Wikipedia]
• https://en.wikipedia.org/wiki/Security
What is Cyber Security?
• Computer security, cybersecurity or information technology
security (IT security) is the protection of computer systems from
the theft of or damage to their hardware, software, or electronic
data, as well as from the disruption or misdirection of the services
they provide.
• https://en.wikipedia.org/wiki/Computer_security
Security Realms
• Information Security
• IT Security
• Cyber Security
• Network Security
• System Security
• Data Security
• Operating System Security
• Physical Security
Information Security
• Information security, sometimes shortened to infosec, is the
‘practice of protecting information’ by mitigating information risks.
• It is part of information risk management.
• It typically involves preventing or at least reducing the probability of
unauthorized/inappropriate access, use, disclosure, disruption,
deletion/destruction, corruption, modification, inspection
(monitor), recording or devaluation of data and/or systems.
• Information may take any form, e.g. electronic or physical.
Cyber Security vs InfoSec
Cyber Security Jobs & Careers
https://www.cybersecurityeducation.org/careers/
• Start at any point in your life / career.
• Wide range of responsibilities.
• Crux of the job is to protect online data and systems form being compromised.
• Cyber security careers are complex.
• Many roles can be found with banks, retailers and government organizations.
• On the job, you can expect to:
• safeguard an organization's files and network
• install / configure firewalls
• create security plans
• monitor activity
• If a breach occurs, you'll be responsible for identifying the problem and finding a solution quickly.

• Because of the frequency of cyber attacks, careers are varied and qualified professionals are in demand.
• If you're ready to get started in this fast-growing career, start exploring cyber careers now.
Job Titles
• Cyber Security Vendor • Malware Analyst
• Solution Provider • Forensic
• Services Analyst/Expert/Investigator
• Security Auditor • Incident Handler / Manager
• PenTester / Ethical Hacker • InfoSec / Cyber Security
• Security Analyst Specialist
• InfoSec Engineer • InfoSec Manager
• InfoSec Consultant • CISO
Job Sectors
• Internships
• Education
• Teaching / Training
• Universities / Certs
• CERTs
• Private Organizations
• Government Institutes
• Financial Sector
• Law Enforcement & Military
• Freelancing
• Independent Consultant
Offensive Security – Jobs
https://www.offensive-security.com/careers/
Offensive Security – Jobs
https://www.flexjobs.com/jobs/telecommuting-jobs-at-offensive_security_services
Offensive Security – Jobs
https://www.flexjobs.com/jobs/telecommuting-jobs-at-offensive_security_services
Offensive Security – Jobs
https://www.indeed.com/q-Offensive-Security-jobs.html
CYBRARY Career Opportunities
https://www.cybrary.it/join-our-team/
CYBRARY Career Opportunities
https://www.cybrary.it/contribute/
CYBRARY Career Opportunities
https://www.cybrary.it/contribute/
CYBRARY Instructor
https://jobs.lever.co/cybrary/299bcf29-3b8a-46b9-8b33-4fd454f6f0de
CYBRARY Instructor
https://jobs.lever.co/cybrary/299bcf29-3b8a-46b9-8b33-4fd454f6f0de
CYBRARY Instructor
https://jobs.lever.co/cybrary/299bcf29-3b8a-46b9-8b33-4fd454f6f0de
Fiverr Security Projects
https://www.fiverr.com/gigs/cyber-security
Online Job Application / Search Sources
• Job Websites / Online Career Portals
• Social Media
• Facebook
• LinkedIn
• Company Websites
• InfoSec Organization’s career portals
Other Ways
• Search for company contact, submit CV’s, turn up in-person.

• Word of mouth
• Increase your social circle

• Attend InfoSec/IT related meetups, seminars, workshops &


conferences.
Pre-requisites / Previous Knowledge
• Hardware
• PC, Server, DC
• Network Devices: Router, Switch, Load Balancer
• Operating Systems
• Microsoft Windows, Apple Mac, Unix, Linux
• Networking
• OSI, TCP/IP, Ports, Protocols, Devices
• Virtualization / Cloud Computing
• Programming / Scripting

You might also like