Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Security

No description
by

Serge C

on 28 March 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Security

Cyber Security
“cyber threat is one of the most serious economic and national security challenges we face as a nation”
“America's economic prosperity in the 21st century will depend on cybersecurity.”
Obama's Thoughts
trying to have federal government defend our information and communications infrastructure
created a report called the Cyberspace Policy Review
gave Howard Schmidt opportunity to serve at U.S. Cybersecurity office within national security staff
Obama's Actions
Cyber Security
everything relies on computers and internet
communications, entertainment, transportion, shopping, medicine, etc.
involves protecting your information by preventing, detecting, and responding to attacks
Risk of Cyber Threat
viruses can erase entire system
someone break into file accessing your files
someone using your computer to attack others
someone stealing credit card info and making unauthorized purchases
no one can fully protect themselves but can prevent most risk
What Is Cyber Security?
also referred to as information technology security
focuses on:
protecting computers
networks
programs
data
from unintended or unauthorized access, change or destruction.
Why is Cyber Security Important?
governments, military, financial institutions, hospitals, business, etc
collect, process, and store confidental info on computers
transmit data across networks to other computers
number of cyber attacks increased recently
March 2013, warned cyber attacks and digital spying is top threat to national security
warned by nation's top intelligence officials
Terms to recognize if a computer is in danger
hacker
malicious code (malware)
virus
vulnerability
Types of Cyber Threats Groups
Bot-network operators
Criminal groups
Foreign intelligence services
Hackers
Insiders
Phishers
Spammers
Spyware/malware authors
Terrorists
Confidentiality: confidential info; should only be share with trusted people

Integrity: info that shouldnt be changed without permission

Availability: info available to people allowed to have
Types Threats/Attacks
Denial-of-service: successfully disrupts functions of systems or networks
Malware, worms, and Trojan horses:
spread by email, instant messaging, malicious websites,and infected non-malicious websites
Some download the malware without user knowing
“Scareware” (fake security software warnings):
persuades users with pop-up warnings saying system is infected
persuaded into downloading and paying for special software to "protect" system
Social Network Attacks: person clicks link on someone's page. leading to malicious website
Works Cited
"Foreign Policy Cyber Security | The White House." 2013. 12 Mar. 2014 <http://www.whitehouse.gov/issues/foreign-policy/cybersecurity>
"Cyber Security Primer." What Is Cyber Security? N.p., n.d. Web. 19 Mar. 2014. <http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm>.
"Cyber Threat Source Descriptions." ICS-CERT. N.p., n.d. Web. 19 Mar. 2014. <https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions#hacker>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://2.bp.blogspot.com/-4MR-gq62sVs/UX_MluoHraI/AAAAAAAAAH4/k1l8b6qi1lk/s1600/small-business-cyber-security.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://2.bp.blogspot.com/-7qyVkP5ybGA/UZj6pqkKHDI/AAAAAAAACO0/Mlqpc6LA-vM/s1600/wifi-hotspot2.png.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://blogs.terrapinn.com/total-electricity/files/2012/10/cyber-security-lock.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://cms.bsu.edu/-/media/WWW/DepartmentalContent/SecurityServices/Images/Poster_Contest_2013_002.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://helix.northwestern.edu/sites/helix/files/wp-content/uploads/2012/10/iStockCyberSecurityLock.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://ordinary-gentlemen.com/eliasisquith/files/2012/03/obama.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://pspinfo.us/wp-content/uploads/2013/06/cyber-security.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <https://blog.bit9.com/wp-content/uploads/2013/08/Shield.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://sce.ntu.edu.sg/Research/cyber/PublishingImages/iStock_Cybersecurity%5B1%5D.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <https://fedoraproject.org/w/uploads/d/da/Artwork_F10Themes_Binary_grid1.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://www.comparebusinessproducts.com/content/assets/20/images/security/red-lock.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://www.net-security.org/images/articles/lock6.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://www.ucl.ac.uk/cybersecurity/images/iStock_000021429778_Medium.png>.
N.p., n.d. Web. 19 Mar. 2014. <http://www.wyoming.gov/pdf/brochure_security-is-important.pdf>.
"Security Tip (ST04-001)." Why Is Cyber Security a Problem? N.p., n.d. Web. 19 Mar. 2014. <https://www.us-cert.gov/ncas/tips/ST04-001>.
Thank you!!!! :)
Full transcript