Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Cyber Security
“cyber threat is one of the most serious economic and national security challenges we face as a nation”
“America's economic prosperity in the 21st century will depend on cybersecurity.”
trying to have federal government defend our information and communications infrastructure
created a report called the Cyberspace Policy Review
gave Howard Schmidt opportunity to serve at U.S. Cybersecurity office within national security staff
everything relies on computers and internet
communications, entertainment, transportion, shopping, medicine, etc.
involves protecting your information by preventing, detecting, and responding to attacks
Risk of Cyber Threat
viruses can erase entire system
someone break into file accessing your files
someone using your computer to attack others
someone stealing credit card info and making unauthorized purchases
no one can fully protect themselves but can prevent most risk
What Is Cyber Security?
also referred to as information technology security
from unintended or unauthorized access, change or destruction.
Why is Cyber Security Important?
governments, military, financial institutions, hospitals, business, etc
collect, process, and store confidental info on computers
transmit data across networks to other computers
number of cyber attacks increased recently
March 2013, warned cyber attacks and digital spying is top threat to national security
warned by nation's top intelligence officials
Terms to recognize if a computer is in danger
malicious code (malware)
Types of Cyber Threats Groups
Foreign intelligence services
Confidentiality: confidential info; should only be share with trusted people
Integrity: info that shouldnt be changed without permission
Availability: info available to people allowed to have
Denial-of-service: successfully disrupts functions of systems or networks
Malware, worms, and Trojan horses:
spread by email, instant messaging, malicious websites,and infected non-malicious websites
Some download the malware without user knowing
“Scareware” (fake security software warnings):
persuades users with pop-up warnings saying system is infected
persuaded into downloading and paying for special software to "protect" system
Social Network Attacks: person clicks link on someone's page. leading to malicious website
"Foreign Policy Cyber Security | The White House." 2013. 12 Mar. 2014 <http://www.whitehouse.gov/issues/foreign-policy/cybersecurity>
"Cyber Security Primer." What Is Cyber Security? N.p., n.d. Web. 19 Mar. 2014. <http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm>.
"Cyber Threat Source Descriptions." ICS-CERT. N.p., n.d. Web. 19 Mar. 2014. <https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions#hacker>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://2.bp.blogspot.com/-4MR-gq62sVs/UX_MluoHraI/AAAAAAAAAH4/k1l8b6qi1lk/s1600/small-business-cyber-security.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://2.bp.blogspot.com/-7qyVkP5ybGA/UZj6pqkKHDI/AAAAAAAACO0/Mlqpc6LA-vM/s1600/wifi-hotspot2.png.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://blogs.terrapinn.com/total-electricity/files/2012/10/cyber-security-lock.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://cms.bsu.edu/-/media/WWW/DepartmentalContent/SecurityServices/Images/Poster_Contest_2013_002.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://helix.northwestern.edu/sites/helix/files/wp-content/uploads/2012/10/iStockCyberSecurityLock.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://ordinary-gentlemen.com/eliasisquith/files/2012/03/obama.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://pspinfo.us/wp-content/uploads/2013/06/cyber-security.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <https://blog.bit9.com/wp-content/uploads/2013/08/Shield.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://sce.ntu.edu.sg/Research/cyber/PublishingImages/iStock_Cybersecurity%5B1%5D.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <https://fedoraproject.org/w/uploads/d/da/Artwork_F10Themes_Binary_grid1.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://www.comparebusinessproducts.com/content/assets/20/images/security/red-lock.png>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://www.net-security.org/images/articles/lock6.jpg>.
Digital image. N.p., n.d. Web. 19 Mar. 2014. <http://www.ucl.ac.uk/cybersecurity/images/iStock_000021429778_Medium.png>.
N.p., n.d. Web. 19 Mar. 2014. <http://www.wyoming.gov/pdf/brochure_security-is-important.pdf>.
"Security Tip (ST04-001)." Why Is Cyber Security a Problem? N.p., n.d. Web. 19 Mar. 2014. <https://www.us-cert.gov/ncas/tips/ST04-001>.
Thank you!!!! :)