0% found this document useful (0 votes)
30 views28 pages

Chapter 3. Lesson 6 Cybersecurity

Cybersecurity is the practice of defending computers, servers, networks, and data from malicious attacks. It involves people implementing secure processes and using technology like firewalls and antivirus software to protect endpoints, networks, and data. The goals of cybersecurity are to ensure confidentiality of data, integrity of systems and information, and availability of networks and resources to authorized users. It is crucial for both individuals and organizations in today's connected world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views28 pages

Chapter 3. Lesson 6 Cybersecurity

Cybersecurity is the practice of defending computers, servers, networks, and data from malicious attacks. It involves people implementing secure processes and using technology like firewalls and antivirus software to protect endpoints, networks, and data. The goals of cybersecurity are to ensure confidentiality of data, integrity of systems and information, and availability of networks and resources to authorized users. It is crucial for both individuals and organizations in today's connected world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

CYBERSECURITY

WHAT IS CYBER?

relating to, or
involving
computers or
computer
networks (such
as the Internet)
WHAT IS SECURITY?

 precautions taken
to ensure against t
heft, espionage,
etc.
WHAT IS CYBERSECURITY?
CYBERSECURITY

 is the practice of defending


computers, servers, mobile devices,
electronic systems, networks, and data
from malicious attacks. It's also known
as information technology security or
electronic information security.
CYBERSECURITY

A successful cybersecurity approach has


multiple layers of protection spread
across the computers, networks,
programs, or data that one intends to
keep safe. In an organization, the people,
processes, and technology must all
complement one another to create an
effective defense from cyber attacks.
1. PEOPLE
Users must
understand and
comply with basic
data security
principles like
choosing strong
passwords, being
wary of attachments
in email, and backing
up data.
BASIC CYBER-SECURITY PRINCIPLES

1. Realize that you are an attractive target to


attackers, and it can happen to anyone,
anytime, anywhere, on any device.
2. Practice good password management.
3. Never leave your devices unattended.
4. Always be careful when clicking on
attachments or links in email.
5. Sensitive browsing, such as banking or
shopping, should only be done on a device
that belongs to you, on a network that you
trust.
BASIC CYBER-SECURITY PRINCIPLES

6. Back up your data regularly.


7. Be conscientious of what you plug in to your
computer.
8. Watch what you’re sharing on social networks.
9. Be wary of social engineering, where someone
attempts to gain information from you through
manipulation.
10. Be sure to monitor your accounts for any
suspicious activity.
2. PROCESSES

 Organizations must have a


framework for how they deal
with both attempted and
successful cyber attacks. One
well-respected framework can
guide you. It explains how you
can identify attacks, protect
systems, detect and respond
to threats, and recover from
successful attacks.
3. TECHNOLOGY

Technology is essential to giving


organizations and individuals the
computer security tools needed to
protect themselves from cyber
attacks. Three main entities must
be protected: endpoint devices like
computers, smart devices, and
routers; networks; and the cloud.
Common technology used to
protect these entities include next-
generation firewalls, DNS filtering,
malware protection, antivirus
software, and email security
solutions.
CYBERSECURITY

The term applies in a variety


of contexts, from business to
mobile computing, and can
be divided into a few
common categories.
CATEGORIES

 Network Security
 Application Security
 Information Security
 Operational Security
 Disaster recovery and business continuity
 End-user education
NETWORK SECURITY
 is the practice of
securing a
computer
network from
intruders,
whether
targeted
attackers or
opportunistic
malware.
APPLICATION SECURITY
 focuses on keeping
software and devices free
of threats. A
compromised application
could provide access to
the data its designed to
protect. Successful
security begins in the
design stage, well before
a program or device is
deployed.
INFORMATION SECURITY

 Protects the
integrity and
privacy of data,
both in storage
and in transit.
OPERATIONAL SECURITY

includes the processes and


decisions for handling and
protecting data assets. The
permissions users have
when accessing a network
and the procedures that
determine how and where
data may be stored or
shared all fall under this
umbrella.
DISASTER RECOVERY AND BUSINESS
CONTINUITY
 define how an organization responds
to a cyber-security incident or any
other event that causes the loss of
operations or data. Disaster recovery
policies dictate how the organization
restores its operations and
information to return to the same
operating capacity as before the event.
Business continuity is the plan the
organization falls back on while trying
to operate without certain resources.
END USER EDUCATION
 addresses the most
unpredictable cyber-security
factor: people. Anyone can
accidentally introduce a virus
to an otherwise secure system
by failing to follow good
security practices. Teaching
users to delete suspicious email
attachments, not plug in
unidentified USB drives, and
various other important
lessons is vital for the security
of any organization.
SECURITY FEATURES
Confidentiality
Integrity
Availability
CONFIDENTIALITY

is roughly equivalent to
privacy. Measures undertaken
to ensure confidentiality are
designed to prevent sensitive
information from reaching the
wrong people, while making
sure that the right people can
in fact get it:
CONFIDENTIALITY

Assurance that information is


shared only among authorized
persons or organizations.
INTEGRITY

 Assurance that the


information is authentic
and complete.
 In information security, data
integrity means maintaining
and assuring the accuracy and
consistency of data over its
entire life-cycle.
AVAILABILITY

 Assurance that the


systems responsible
for delivering, storing
and processing
information are
accessible when
needed, by those who
need them.
IMPORTANCE
 Intoday’s connected world, everyone benefits
from advanced cyberdefense programs. At an
individual level, a cybersecurity attack can
result in everything from identity theft, to
extortion attempts, to the loss of important
data like family photos. Everyone relies on
critical infrastructure like power plants,
hospitals, and financial service companies.
Securing these and other organizations is
essential to keeping our society functioning.
REFERENCES
 Merriam Webster https://
www.merriam-webster.com/dictionary/cyber
 Collins Dictionary, British English, American English https://
www.collinsdictionary.com/dictionary/english/security
 International Telecommunications Union https://
www.itu.int/en/ITUD/Cybersecurity/Documents/Introduction
%20to%20the%20Concept%20of%20IT%20Security.pdf

 Kaspersky https://
www.kaspersky.com/resource-center/definitions/what-is-cybe
r-security
 Cisco Umbrella https
://umbrella.cisco.com/blog/2019/12/04/cisco-umbrella-top-1
0-cybersecurity-tips/?utm_medium=web-referral&utm_source

You might also like