Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

| GONZALES • RAMIREZ • LLANES • DELA CRUZ |

CYBER SECURITY
It is the state or process of
protecting and recovering
networks, devices, and programs
from any type of cyberattack.
• Attacks on confidentiality – personal
identifying information and your bank
account or credit card information.
• Attacks on integrity – personal or
enterprise sabotage, often called
“leaks.”
• Attacks on availability – to block users
from accessing their own data until
they pay a fee or ransom.
TYPES OF CYBER THREATS
• Social Engineering – the process of
psychologically manipulating people into
performing actions or giving away
information.
• APTs (Advanced Persistent Threats) – attacks
in which an unauthorized user infiltrates a
network undetected and stays in the network
for a long period of time.
• Malware – software that is
specifically designed to gain access
or damage a computer without the
knowledge of the owner.
• Application Security
• Information Security
• Network Security
• Business Continuity Planning
• Operational Security
• End-user education
• Leadership commitment
CAREERS IN CYBER SECURITY
• Chief Information Security Officer (CISO) – implements
the security program across the organization and oversees
the IT security department’s operations.
• Security Engineer – protects company assets from threats
with a focus on quality control within the IT infrastructure.
• Security Architect – responsible for planning, analyzing,
designing, testing, maintaining and supporting an
enterprise’s critical infrastructure.
• Security Analyst – has several responsibilities that include
planning security measures and controls, protecting digital
files, and conducting both internal and external security
audits.

You might also like