Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Team Presentation
Group 28: Jordan Masterson, Cristian Del Valle, Matthew Strickland, Hunter Morris, Nicholas Calabrese
What is Cyber Security?
"Cyber Security: measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack"
Why Is Cyber Security Important?
Cyber security is important for innumerable reasons, some of which are:
Ensuring the safety of financial information
Allowing online services to perform without interruption
Keeping critical devices functioning
Protecting the identities of individuals and preventing cyber crime
Binary Wallpaper. wallpaperli. Web. 3 Nov. 2013. <http://wallpaperli.com/wp-content/uploads/2013/08/binary-wallpaper.jpg>
Examples of Cyber Crime
PlayStation (c) Network hacked (April 2011)
Adobe Network infiltrated (October 2013)
UK's energy infrastructure under threat of shutdown (October 2013)
CYBLDCStats. ITU. Web. 3 Nov. 2013. <www.itu.int/en/ITU-D/Partners/Pages/Call4Partners/CYBLDCStats.aspx>.
Who Are Behind These Attacks?
Streater, Kevin. "Cyber Security Challenge."ITNOW 52.6
(2010): 28. Web. 3 Nov. 2013.
Bennett, Louise. "Cyber Security Strategy." ITNOW 54.1
(2012): 10-11. Web. 3 Nov. 2013.
Grant, Jeremy A. "The National Strategy for Trusted
Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy through Standards." IEEE Internet Computing 15.6 (2011): 80-84. Web. 3 Nov. 2013.
United States. Cong. Sen. Committee on the
Judiciary. Subcommittee on Crime and Terrorism.
112th Cong., 1st
sess. Washington: GPO, 2011. Web. 3 Nov. 2013.
Olson, Ryan, et al. Boca Raton, FL:
Auerbach Publications, 2011. Web. 3 Nov. 2013.
Top Five Hacker Groups:
5.Network Crack Program Hacker Group
3.Masters of Deception
1. Define cyber security
2. Explain why cyber security is important
3. Define Contemporary issues with cyber security
4. Mention hacker groups
5. Define our current cyber security infrastructure
6. Inform viewers proper ways to stay secure
What can you do to secure yourself?
Always use your firewall and anti-virus program
Protect your computer by downloading safe security patches
Encrypt any personal information held electronically
Take regular back-ups of information on your computer
Two techniques for identifying malicious code
- Active Analysis
- Passive Analysis
Companies are introducing the Intrusion Detection System (IDS)
The government highers ex-hackers
Increase in spending in the cyber security sector
CyberSecurityHome. Maryland.gov. Web. 3 Nov. 2013. <http://doit.maryland.gov/cybersecurity/Pages/CyberSecurityHome.aspx>
Cybersecurity Boom. Huffington Post. Web. 3 Nov. 2013. <http://www.huffingtonpost.com/2011/09/15/former-government-officials-cybersecurity-boom_n_958790.html>.
Cyber security [electronic resource] : responding to the threat of cyber crime and terrorism.
Just how much are we spending...?
Cyber Security Essentials.
More References Cited
"10 Most Notorious Hacker Groups
2012. Web. 3 Nov. 2013.
Takahashi, Dean. "Chronology of the
attack on Sony's PlayStation Network."
4 May 2011. Web. 3
Rubio, Justin. "Adobe Network Attacked,
User Information Compromised."
4 Oct. 2013. Web. 3 Nov. 2013.
Macalister, Terry. "UK energy infrastructure
'at risk of shutdown from cyber-attacks'." 18 Oct. 2013. Web. 3 Nov. 2013.
Top Computer Science Degrees,
What is Being Done?
1. Defined cyber security
2. Importance of Cyber Security
3. Contemporary issues with cyber security
4. Hacker groups
5. Current cyber security infrastructure
6. Proper ways to stay secure
Hacker Criminal. Digital image. Tess Rinearson. N.p., 15 Feb. 2012. Web. 2 Nov. 2013.
< http://www.tessrinearson.com/blog/?p=196 >.
We Are Anonymous. themissouritorch. Web. 3 Nov. 2013