0% found this document useful (0 votes)
110 views10 pages

Ashley Furniture Cyber Security

This document discusses cyber security and information communication technology (ICT). It defines cyber security as technologies, practices, and methods to protect computers, networks, data and programs from attacks. It outlines common cyber threats like ransomware, botnets, phishing, and machine learning attacks. The document also defines ICT infrastructure, explains how cyber security protects ICT systems, and discusses principles of information security management like planning, policy, programs, protection and people.

Uploaded by

Alex Mwas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views10 pages

Ashley Furniture Cyber Security

This document discusses cyber security and information communication technology (ICT). It defines cyber security as technologies, practices, and methods to protect computers, networks, data and programs from attacks. It outlines common cyber threats like ransomware, botnets, phishing, and machine learning attacks. The document also defines ICT infrastructure, explains how cyber security protects ICT systems, and discusses principles of information security management like planning, policy, programs, protection and people.

Uploaded by

Alex Mwas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Cyber security

Ashley Furniture Cyber security


Cyber security
 Cyber security- a body of technologies, practices, and
methods designed to offer protection to computers,
networks, data and programs from attack and
unauthorized access
 The cyber threats to public and private organizations
include:
 Ransom ware- The practice involves holding of
organizations’ data for ransom.
cyber threats to public and private
organizations
Internet of Things Botnets- remotely accessing organization’s
computers without the knowledge of the owner
Phishing and Whaling attacks- The practice involves sending
fraudulent emails from trusted accounts and target
organizations through the staff members
Business Process Compromise Attacks- The process involves
manipulating day to day operations of a business to suit the
hackers.
Machine Learning enabled attacks- Machine learning is
being used by cyber-criminals to launch social engineering
attacks.
Information and communication technology
(ICT)
 ICT- Infrastructure and components that facilitate
computing.
 It is a combination of all applications, devices and
networking components that allow individuals and
organizations to communicate in this digital era
Cyber security and ICT
 Cyber security concerns itself with protecting ICT
systems.
 Cyber security is a crucial tool in protecting privacy,
surveillance and information sharing.
 Effective cyber security is gauged with the way it
manages risks to information systems.
 The ICT systems require protection and levels of cyber
security must develop as the ICT is developing.
 The internet has become a necessity for many people
across the globe and this has led to increased and
aggressive cyber-attacks and hacking.
 The pillars of personal security include:
 Strengthening one's passwords- Hackers can get into
peoples accounts because they can force into their
passwords or even guess the passwords
pillars of personal security
 Installing security software- It is one of the easiest ways of
avoiding getting hacked and protecting one from spyware
or a malware before it can do major damage to your device.
 Paying close attention to personal emails
 Update frequently- It is important for a person to have their
internet-enabled devices set to update their software
automatically because older programs are vulnerable to
hacking.
Principles of Information Security
Management and legislation constraints
 Planning- The planning principle includes aspects
such as planning for policy, risk management,
planning of personnel, planning for disaster recovery,
planning for security programs and planning for
business continuity
 Policy- It is the second principle, and it involves
aspects such as Enterprise information security policy.
 Programs- programs involve risk analysis, training and
security education, and physical security of the system
Principles of Information Security
Management and legislation constraints
 Protection-concerns itself with protecting the systems
against threats to one's assets as well as protecting the
system against vulnerabilities.
 People – Human factors affect information security
management systems.
 Project management- It usually involves the
application of knowledge skills, techniques, and tools
to meet the obligations of a project.
References
 Amoroso, E. G. (2007). Cybersecurity. Norwood Mass:
Books24x7.com.
 California. (2016). Personal security. Sacramento, CA
(1515 K St., Suite 383, Sacramento, 95814: Crime
Prevention Center, Office of the Attorney General.
 Shortis, T. (2016). The language of ICT: Information
and communication technology. New York, NY:
Routledge
 Tipton, H. F., & Nozaki, M. K. (2014). Information
security management handbook: Volume 7.

You might also like