Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Security - MAALL Presentation

This presentation demonstrates best way to use Prezi in an educational environment.

yael davis

on 20 January 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Security - MAALL Presentation

18 U.S.C sec. 1029

Fraud and Related Activity in Connection with Access Devices

18 U.S.C sec. 1030

Fraud and Related Activity in Connection with Computers

18 U.S.C sec. 1362

Communication Lines, Stations, or Systems

Computer Security Vulnerabilities
Jail Time
United States Department of Homeland Security
ICE - Immigration Customs Enforcement
Secret Service
FEMA - Federal Emergency Management Agency
FBI - Federal Bureau of Investigation
CIA - Central Intellegence Agency
NSA - National Security Agency
State & Local Law Enforcement
Cyber Operations and National Security: A Panel Discussion
GRADD -- Kurt Pritchett, FBI Cyber Crimes Task Force (11/9/11)
FBI's Top Cyber Official Discusses Threat
VOA (Voice of America) - Cyber Crime Growing Global Threat
The Communicators: Cybersecurity, Part 4
Why the cyber security bill in Congress is getting big push from Pentagon

The Christian Science Monitor
By Anna Mulrine, Staff writer / March 7, 2012
AP | Jul 10, 2012, 06.21PM IST
US cybersecurity chief worries about al-Qaida

The Times of India
Genetics-Inspired Research Prevents Cyber Attacks

February 14, 2012
Science Daily
E-mail typos result in 20GB of stolen data

September 09, 2011|By Kim Zetter, WIRED
posted on CNN TECH
Congressional Cyber Security Caucus
Subcommittee on Investigations and Oversight Hearing - NASA Cybersecurity: An Examination of the Agency’s Information Security

Energy and Commerce Committee:
Cybersecurity: Threats to Communications Networks and Public-Sector Responses
Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

For much more information visit web sites of the United States House and Senate and search "cyber security".

FULL COMMITTEE HEARING: Cyber Security and the Grid

Cyber Security: Developing a National Strategy

Cyber Security

MAALL Presentation

Click ESC to exit Presentation
Full transcript