Cyber Security
Cyber Security
Challenges
https://www.youtube.com/watch?v=inWWhr5tnEA
Security Challenges and
Vulnerabilities
Tapping
Sniffing
Unauthorized Access Message
Errors Alteration
Theft and Fraud Theft of Data
Hacking Copying of Data
Malware Alteration of
Theft & Fraud Data
Denial of Service Hardware Failure
Attacks Software failure
Phishing
Malicious Software
Viruses
Worms
Trojan Horses
Spyware
Computer Crime
Breaking the Confidentiality of Protected Computer Data
Accessing a computer system without authority
Knowingly accessing protected computer with the intention
of Fraud
Causing damage to data or software or hardware
negligently or deliberately
Transmitting a computer code that damages a protected
computer
Threatening to cause damage to a protected computer
Infringing on the copyright of Software or data or image
or video or audio.
Using social media to threaten or commit crimes
Transmitting data, images or videos declared illegal by
the government of the land.
Electronic & Cyberwarfare
Electronic Intelligence (Elint)
Communications Intelligence (Comint)
Electronic Counter Measures (ECM)
Electronic Counter Counter measures (ECCM)
Cyber snooping
Cyber Warfare
Securing your Systems