Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Cyber Security

No description

Derek Lartey-Young

on 30 April 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Security

Cyber Security
Types of Cyber Attakcs
Effect on World Politics
Internet based conflict involving politically motivated attacks on information and information systems.
Estonian government, businesses and media websites across the country were shut down in 2007. The cyber threat was suspected to originate from Russia motivated by political tension between the two countries.
In 1998 United States hacked Serbia's air defense system to compromise air traffic control and facilitate the bombing of Serbian targets
An unknown foreign party hacked into high tech and militery agencies in the United States and downloaded terabytes of information
Any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets.
Disable Websites and Networks
Disrupt Essential Services
Steal, Leak, and Alter Classified Information
Cripple Financial System
Cause tension between states

Negatively Impacting Economies
Impacting Balance of Powers
What is Cyber Security
measures taken to protect a computer, computer system, networks, programs and data from attack, damage or unauthorized access
Who Are the Actors
The Playing Field
Impact on Glabalization
The world is becoming more technologically orientated providing access to technology in even the most remote parts of the world which results in:
Providing anyone the chance to participate in cyber warfare and terrorism
Turning anyone into victims of cyber warfare and terrorism
By Derek Lartey-Young
Full transcript