Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of COMPUTER SECURITY
WHAT DOES COMPUTER SECURITY PROTECT AGAINST?
HOW DOES COMPUTER SECURITY PROTECT
Computer security comes in many different forms and types. For example, precautions that computer security uses to prevent malware and defend against cyber criminals include:
-the use of firewalls
-anti-virus software protection
-antispyware software protection
These examples aid in the prevention of information theft and in increasing privacy protection from cyber criminals and thieves.
Experts in cyber security are among the most sought-after professionals in the technology sector, according to an article written by Linda Masthaler for the online Network World newspaper. Also, other reports, such as Burning Glass Technologies' recent report state that the demand for cybersecurity professionals has grown more than 3.5 times faster than any other non-IT jobs.
Monday, November 12, 2014
Vol XCIII, No. 311
Computer Security & More...
WHAT IS COMPUTER SECURITY?
THE THREE MAIN OBJECTIVES OF
What comes to mind when you think of the word "Safety"? Perhaps thoughts of words such as "secure", "protected", or "invulnerable" come to mind.
This is exactly what Computer Security is about, but the only exception is that it is applied to technology! Computer security focuses upon security problems at all levels within the computer system, ranging from hardware to software.
It applies the principles of safety to technology by encompassing the protection of computer resources against accidental or intentional disclosure of important and confidential data, the destruction of data or info, and so much more.
Computer security is also known by the names of "IT Security" and "Cybersecurity".
Computer security can be divided up into 3 broad concepts, all of which can be easily memorized by the acronym "CIA":
-- Ensuring that information is not accessed by unauthorized persons
-- Ensuring that information is not altered by unauthorized persons in a way that is not detectable by authorized users
-- Ensuring that users are the persons they claim to be
These three concepts are the main objectives of computer security.
Just what does computer security even protect important data from?
- Computer security aims to provide defense for machines and any data residing on it, such as computers or laptops. It aims to use techniques to ensure that data stored on a person's computer will not be compromised by an individuals without authorization.
- Computer security protects against various types of malware:
- examples include file viruses, macro viruses, stealth viruses, and many more. Viruses are programs that are written to enter an individual's computer and either damage, delete, alter, or corrupt files and data.
- Worms are malicious programs that duplicate themselves over and over on the local drive, network shares, and more. The only purpose of the worm is to reproduce itself again and again. Worms spread by exploiting the vulnerabilities in operating systems. Worms also do not harm any data/file on the computer and it does not need to attach itself to an existing program.
- A Trojan horse is a destructive program that appears to be a genuine application but secretly opens a backdoor into an individual's computer, giving cyber criminals and users/programs access to personal or confidential information. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Other types of malware that computer security protects an individual's computer system and hard drive from include spam, spywares, adware, tracking cookies, and misleading applications. All the listed malware are all potential things that computer security works to defend against and protect the user's personal information and data. Without computer security; hackers, malicious users/programs, and cyber criminals are given free reign to try and access an individual's private and personal data.
AGAINST MALWARE AND CYBER CRIMINALS?
Firewalls are software or hardware that help to protect computers by preventing hackers or malicious software from penetrating and gaining access to the data stored within its system. It checks for info coming from a network or Internet and either allows it to pass to the user's computer or denies it access, depending on the user's fire wall settings.
Anti-virus software programs scan files, emails, and other data on the user's computer for different types of malware (like viruses, worms or Trojan horses). If the program discovers any of the listed, the software will attempt to isolate it and delete it before the malware can damage the user's computer or its files. Some anti-virus software logos are displayed in the the following picture.
Spyware is software that can change settings on a user's computer, collect personal information and display advertisements - all of which it can do generally without the user's consent. Examples include spyware installing unwanted toolbars or links and secretly collecting personal or sensitive information. Anti spyware programs help to detect and guard against any spyware threats. To ensure the accuracy and efficiency of the spyware, it must be updated as there new spyware that appears every day.
CAREER OPPORTUNITIES IN
Here are a few types of possible career opportunities in computer security/cyber security:
Click on the link to find out more opportunities to find a career path in the computer security and technology sector!
Usage of firewalls
Install and update antivirus software
Install and update antispyware technology
Keep operating systems up to date
Be careful of downloads, attachments or suspicious emails
-United States Army Intelligence and Security Command
-State Farm Insurance
Government Intellgence Services (ie: NSA, CSIS, CIA, FBI, Homeland Security, and much more)
Due to the increase in data breaches and potential hacking threats, governments are always on the lookout to strengthen their country's defense system against cyber attacks and threats.
-FBI's Cyber Team:
-Cyber Special Agent: FBI Cyber Special Agents aid to combat against global cyber threats, partnering with international law enforcement to help protect the nation's critical infrastructure.
Major Corporations and Banks (ie: PepsiCo Inc, Deere & Co, Target, ScotiaBank, and much more)
Following some major high-profile data breaches (such as last year's attack on Target Corp), there would be a general increase in major companies looking for skilled cybersecurity experts to aid in the prevention of such hacking threats. Banks, such as Scotia Bank, would need trained cybersecurity professionals to aid in the strengthening of their system against cyber theft. Credit card companies (like American Express) would also be a potential employer. Cyber security professionals would also find potential work opportunities in the IT sector of different companies and finance companies.
A LIST OF POSSIBLE EMPLOYERS FOR CYBERSECURITY PROFESSIONALS AND THOSE SPECIAILIZING IN COMPUTER SECURITY:
-To get into the cybersecurity sector, one must have at least a bachelor's degree. Both universities and colleges offer a Computer Security program, like York University, which offers Computer Security as a specialized honours program where one may receive a BA or BSc upon graduating.
-On average, reports show that professionals in the computer security area of the technology sector have (based upon median annual wages) earn from $70,000 to $118,000.
-Cyber security jobs can be found at numerous places, including defense contracting agencies and financial, telecommunications, industrial, and retail companies.
MORE INFO ON CYBERSECURITY CAREERS
In summary, cyber security jobs can be found at numerous places, including defense contracting agencies and financial, telecommunications, industrial, and retail companies.
"Cybersecurity." Cyber Security Overview, Jobs and Internships. University of Maryland University College, n.d. Web. 09 Nov. 2014. <http://www.umuc.edu/cybersecurity/careers/index.cfm>.
"FBI's Cyber Team." FBIJobs.gov. U.S. Federal Government, U.S. Department of Justice, n.d. Web. 09 Nov. 2014. <http://www.fbijobs.gov/CyberCareers/>.
Musthaler, Linda. "This Is a Great Time to Start a Career in Cybersecurity."Network World. Network World, Inc, 21 Mar. 2014. Web. 09 Nov. 2014. <http://www.networkworld.com/article/2175434/security/this-is-a-great-time-to-start-a-career-in-cybersecurity.html>.
"National Cybersecurity Career Fair." Brazen Connect. Brazen Careerist, n.d. Web. 09 Nov. 2014. <https://app.brazenconnect.com/events/cyberaces-us-careerfair#!eventLanding;eventCode=cyberaces-us-career-fair>.
Ross, Seth T. "Computer Security: A Practical Definition." Computer Security: A Practical Definition. Albion.com, 2006. Web. 09 Nov. 2014. <http://www.albion.com/security/intro-4.html>.
"Understanding Security and Safe Computing." Windows.microsoft.com. Microsoft, n.d. Web. 09 Nov. 2014. <http://windows.microsoft.com/en-ca/windows/understanding-security-safe-computing#1TC=windows-7>.
"Viruses And Spyware." Get Safe Online. Get Safe Online, n.d. Web. 09 Nov. 2014. <https://www.getsafeonline.org/protecting-your-computer/viruses-and-spyware/>.