Sie sind auf Seite 1von 17

CYBER SECURITY

Buan, Jessa C.
Cordero, Kaila
 Cyber security is the protection of internet-
connected systems, including hardware, software
and data, from cyber attacks.
 Ina computing context, security comprises cyber
security and physical security -- both are used by
enterprises to protect against unauthorized access
to data centers and other computerized systems.
 Information security, which is designed to maintain
the confidentiality, integrity and availability of data,
is a subset of cyber security.

CYBER SECURITY
 Thepurpose of cyber security is to help prevent
cyber attacks, data breaches and identity theft
and can aid in risk management.
 When an organization has a strong sense of
network security and an effective incident
response plan, it is better able to prevent and
mitigate cyber-attacks.
 For example, end user protection defends
information and guards against loss or theft while
also scanning computers for malicious code.

WHAT CAN CYBER SECURITY PREVENT?


 Theprocess of keeping up with new technologies,
security trends and threat intelligence is a
challenging task. However, it's necessary in order to
protect information and other assets from cyber
threats, which take many forms.

TYPES OF CYBER SECURITY THREATS


 Ransomware is a type of malware that involves an
attacker locking the victim's computer system files -
- typically through encryption -- and demanding a
payment to decrypt and unlock them.
 Malware is any file or program used to harm a
computer user, such as worms, computer viruses,
Trojan horses and spyware.

TYPES OF CYBER SECURITY THREATS


 Social engineering is an attack that relies on
human interaction to trick users into breaking
security procedures in order to gain sensitive
information that is typically protected.
 Phishingis a form of fraud where fraudulent emails
are sent that resemble emails from reputable
sources; however, the intention of these emails is to
steal sensitive data, such as credit card or login
information.

TYPES OF CYBER SECURITY THREATS


 Ensuringcyber security requires the coordination of
efforts throughout an information system, which
includes:
 Application security
 Information security
 Network security
 Disaster recovery/business continuity planning
 Operational security
 End-user education

ELEMENTS OF CYBER SECURITY


 One of the most problematic elements of cyber
security is the continually evolving nature of security
risks. The traditional approach has been to focus
resources on crucial system components and
protect against the biggest known threats, which
meant leaving components undefended and not
protecting systems against less dangerous risks.
 As a result of security risks, investments in cyber
security technologies and services are increasing.
In 2017, Gartner predicted that worldwide
spending on information security products and
services would reach $83.4 billion -- a 7% increase
from 2016 -- and that it would continue to grow to
$93 billion by 2018.
 Business
protection against malware, ransomware,
phishing and social engineering.
 Protection for data and networks.
 Prevention of unauthorized users.
 Improves recovery time after a breach.
 Protection for end-users.
 Improvedconfidence in the product for both
developers and customers.

BENEFITS OF CYBER SECURITY


 Vendors in cyber security fields will typically use
endpoint, network and advanced threat
protection security as well as data loss prevention.
 Threecommonly known cyber security vendors
include Cisco, McAfee and Trend Micro.

CYBER SECURITY VENDORS


 Cisco
tends to focus on networks and allows its
customers to utilize firewalls, VPNs and advanced
malware protection along with supporting email
and endpoint security. Cisco also supports real-time
malware blocking.

CYBER SECURITY VENDORS


 McAfee makes cyber security products for
consumers and enterprise users. McAfee supports
mobile, enterprise clouds, network, web and server-
based security. Data protection and encryption is
also offered.

CYBER SECURITY VENDORS


 TrendMicro is an anti-malware vendor which offers
threat protection for mobile, hybrid
clouds, SaaS and the IoT. Trend Micro provides
users with endpoint, email and web security.

CYBER SECURITY VENDORS


 Asthe cyber threat landscape continues to grow
and emerging threats, such as the internet of
things, require hardware and software skills, it is
estimated that there are 1 million unfilled cyber
security jobs worldwide.

CAREERS IN CYBER SECURITY


 IT
professionals and other computer specialists are
needed in security jobs, such as:
 Chief information security officer (CISO): This
individual implements the security program across
the organization and oversees the IT security
department's operations.
 Security engineer: This individual protects company
assets from threats with a focus on quality control
within the IT infrastructure.

CAREERS IN CYBER SECURITY


 IT
professionals and other computer specialists are
needed in security jobs, such as:
 Security architect: This individual is responsible for
planning, analyzing, designing, testing, maintaining
and supporting an enterprise's critical infrastructure.
 Security analyst: This individual has several
responsibilities that include planning security
measures and controls, protecting digital files, and
conducting both internal and external security
audits.

CAREERS IN CYBER SECURITY

Das könnte Ihnen auch gefallen