0% found this document useful (0 votes)
17 views15 pages

2 Introduction To Cyber Security1

The document provides an introduction to cyber security, covering its definition, common threats such as malware and phishing, and key concepts like confidentiality, integrity, and availability. It emphasizes the importance of cyber security for data protection, customer trust, and business continuity, while also outlining common practices and frameworks like NIST and ISO/IEC 27001. Additionally, it highlights the growing demand for cyber security professionals and the various career opportunities available in the field.

Uploaded by

medomajid2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views15 pages

2 Introduction To Cyber Security1

The document provides an introduction to cyber security, covering its definition, common threats such as malware and phishing, and key concepts like confidentiality, integrity, and availability. It emphasizes the importance of cyber security for data protection, customer trust, and business continuity, while also outlining common practices and frameworks like NIST and ISO/IEC 27001. Additionally, it highlights the growing demand for cyber security professionals and the various career opportunities available in the field.

Uploaded by

medomajid2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Introduction to Cyber

Security
This presentation will guide you through the fundamentals of cyber
security, explaining common threats, key concepts, and best
practices for safeguarding your data.

By/ Samah Ezz


What is Cyber Security?
Cyber security is the practice of protecting systems, In today's digital world, where information is constantly
networks, and data from digital attacks. being shared and accessed, cyber security is essential
for individuals and businesses.
Types of Cyber Threats
1 Malware like viruses, worms, and Trojans can infect systems
and steal data.

2 Phishing attacks use deceptive emails and websites to trick


users into revealing sensitive information.

3 Ransomware encrypts data and demands payment to


restore access.

4 DDoS attacks overwhelm systems with traffic to disrupt


service availability.
Firewall, IDS and IPS
• The core function of a firewall is to allow or block traffic between source hosts/networks and
destination hosts/networks.
• Basic firewalls work at the Layer 3 and Layer 4 of the OSI model, i.e they can allow or block IP
packets based on source/destination IP addresses and source/destination TCP/UDP ports.
An Intrusion Prevention System (IPS) An Intrusion Prevention System (IPS)
Key Concepts
Confidentiality Integrity
Protecting information from Ensuring data is accurate
unauthorized access, and unaltered, preventing
ensuring only authorized unauthorized modifications
users can access it. or data corruption.

Availability
Ensuring authorized users can access information when
needed, preventing disruptions or denial of service.
Common Cyber Security
Practices

Using strong passwords Regularly updating Implementing multi-


that are unique and software and operating factor authentication,
difficult to guess, a systems to patch which requires multiple
combination of vulnerabilities and fix forms of verification
uppercase, lowercase, security flaws. before granting access.
numbers, and symbols.

Encrypting sensitive
data, transforming it
into an unreadable
format to protect it
from unauthorized
access.
Importance of Cyber Security
1 Data Protection
Cyber security protects sensitive information from
theft, misuse, or unauthorized access.

2 Customer Trust
Strong security practices build trust with customers,
reassuring them that their data is secure.

3 Business Continuity
Cybersecurity ensures business continuity and
reputation by preventing disruptions caused by
cyberattacks.
Cyber Security Frameworks
NIST Cybersecurity Framework
A standardized approach to managing cybersecurity risk, developed by the National Institute of Standards and Technology.

ISO/IEC 27001
An internationally recognized standard for information security management systems, setting out best practices.

CIS Controls
A set of prioritized security controls for mitigating cyber threats, developed by the Center for Internet Security.
Career Opportunities
Roles
Cyber security offers a wide range of career opportunities,
including Security Analyst, Penetration Tester, Security
Engineer, and more.
Growing Demand
The demand for skilled cyber security professionals is
rapidly increasing as digital threats evolve.

Job Market Trends


Cybersecurity is one of the fastest-growing job markets,
offering competitive salaries and career advancement
opportunities.

You might also like