This document discusses cyber security and information communication technology (ICT). It defines cyber security as technologies, practices, and methods to protect computers, networks, data and programs from attacks. It outlines common cyber threats like ransomware, botnets, phishing, and machine learning attacks. The document also defines ICT infrastructure, explains how cyber security protects ICT systems, and discusses principles of information security management like planning, policy, programs, protection and people.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
110 views10 pages
Ashley Furniture Cyber Security
This document discusses cyber security and information communication technology (ICT). It defines cyber security as technologies, practices, and methods to protect computers, networks, data and programs from attacks. It outlines common cyber threats like ransomware, botnets, phishing, and machine learning attacks. The document also defines ICT infrastructure, explains how cyber security protects ICT systems, and discusses principles of information security management like planning, policy, programs, protection and people.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10
Cyber security
Ashley Furniture Cyber security
Cyber security Cyber security- a body of technologies, practices, and methods designed to offer protection to computers, networks, data and programs from attack and unauthorized access The cyber threats to public and private organizations include: Ransom ware- The practice involves holding of organizations’ data for ransom. cyber threats to public and private organizations Internet of Things Botnets- remotely accessing organization’s computers without the knowledge of the owner Phishing and Whaling attacks- The practice involves sending fraudulent emails from trusted accounts and target organizations through the staff members Business Process Compromise Attacks- The process involves manipulating day to day operations of a business to suit the hackers. Machine Learning enabled attacks- Machine learning is being used by cyber-criminals to launch social engineering attacks. Information and communication technology (ICT) ICT- Infrastructure and components that facilitate computing. It is a combination of all applications, devices and networking components that allow individuals and organizations to communicate in this digital era Cyber security and ICT Cyber security concerns itself with protecting ICT systems. Cyber security is a crucial tool in protecting privacy, surveillance and information sharing. Effective cyber security is gauged with the way it manages risks to information systems. The ICT systems require protection and levels of cyber security must develop as the ICT is developing. The internet has become a necessity for many people across the globe and this has led to increased and aggressive cyber-attacks and hacking. The pillars of personal security include: Strengthening one's passwords- Hackers can get into peoples accounts because they can force into their passwords or even guess the passwords pillars of personal security Installing security software- It is one of the easiest ways of avoiding getting hacked and protecting one from spyware or a malware before it can do major damage to your device. Paying close attention to personal emails Update frequently- It is important for a person to have their internet-enabled devices set to update their software automatically because older programs are vulnerable to hacking. Principles of Information Security Management and legislation constraints Planning- The planning principle includes aspects such as planning for policy, risk management, planning of personnel, planning for disaster recovery, planning for security programs and planning for business continuity Policy- It is the second principle, and it involves aspects such as Enterprise information security policy. Programs- programs involve risk analysis, training and security education, and physical security of the system Principles of Information Security Management and legislation constraints Protection-concerns itself with protecting the systems against threats to one's assets as well as protecting the system against vulnerabilities. People – Human factors affect information security management systems. Project management- It usually involves the application of knowledge skills, techniques, and tools to meet the obligations of a project. References Amoroso, E. G. (2007). Cybersecurity. Norwood Mass: Books24x7.com. California. (2016). Personal security. Sacramento, CA (1515 K St., Suite 383, Sacramento, 95814: Crime Prevention Center, Office of the Attorney General. Shortis, T. (2016). The language of ICT: Information and communication technology. New York, NY: Routledge Tipton, H. F., & Nozaki, M. K. (2014). Information security management handbook: Volume 7.