Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Cyber Security
Types of Cyber Attakcs
Effect on World Politics
Internet based conflict involving politically motivated attacks on information and information systems.
Estonian government, businesses and media websites across the country were shut down in 2007. The cyber threat was suspected to originate from Russia motivated by political tension between the two countries.
In 1998 United States hacked Serbia's air defense system to compromise air traffic control and facilitate the bombing of Serbian targets
An unknown foreign party hacked into high tech and militery agencies in the United States and downloaded terabytes of information
Any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets.
Disable Websites and Networks
Disrupt Essential Services
Steal, Leak, and Alter Classified Information
Cripple Financial System
Cause tension between states
Negatively Impacting Economies
Impacting Balance of Powers
What is Cyber Security
measures taken to protect a computer, computer system, networks, programs and data from attack, damage or unauthorized access
Who Are the Actors
The Playing Field
Impact on Glabalization
The world is becoming more technologically orientated providing access to technology in even the most remote parts of the world which results in:
Providing anyone the chance to participate in cyber warfare and terrorism
Turning anyone into victims of cyber warfare and terrorism
By Derek Lartey-Young