2. INTRODUCTION
TYPES OF CYBER SECURITY THREATE
CYBER SECURITY VENDORS
ADVANTAGE IN CYBER SECURITY
DISADVANTAGE IN CYBER SECURITY
BENEFITS IN CYBER SECURITY
CAREER IN CYBER SECURITY
CONCLUSION This Photo by Unknown Author is licensed under CC BY
3. INTRODUCTION
• CYBER SECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS
INCLUDING ,HARDWARE,SOFTWARE,
• AND DATA FROM CYBERATTACKS.
• MEANING OF CYBER
• IT IS A COMBINING FORM RELATING TO INFORMATION TECHNOLOGY,THE
INTERNET AND VIRTUAL REALITY
• NEED OF CYBER SECURITY
• CYBER SECURITY IS NECESSARY SINCE IT HELPS IN SECURING DATA FROM
THREATS SUCH AS DATA THEFT OR MISUSE ALSO SAFEGUARDS YOUR
SYSTEM FROM VIRUS.
•
•
•
•
4. TYPES OF CYBER SECURITY THREATE
The process of keeping up with new
technologies security trends and
threat intelligence is a challenging
task . However, it is necessary in
order to protect information and
other assets from cyber threats,
which take many forms they are ….
• ransomware
• Malware
• Social engineering
• phishing
5. RANSOMWARE:
Ransome ware is a type of
malware that involve an
attacked locking the victims
computer system files
typically through encryption-
and demanding a payment
to decrypt and unlock them.
This Photo by Unknown Author is licensed under CC BY
6. MALWARE:
Malware is any file
or program used to
harm a computer
user, such as
worms, computer
viruses, trojan
horses and spyware.
This Photo by Unknown Author is licensed under CC BY
7. SOCIAL ENGINEERING:
Social engineering is an
attack that relies on human
interactions to trick users
into breaking security
producers in order to gain
sensitive information that is
typically protected.
This Photo by Unknown Author is licensed under CC BY-SA
8. PHISHING:
Phishing is a form where
fraudulent emails are sent
that resemble emails
from reputable of these
emails is to steel sensitive
data such as credit card or
login information.
This Photo by Unknown Author is licensed under CC BY-SA-NC
9. CYBER SECURITY VENDORS
Vendors in cyber security
fields will typically use
endpoint ,network,and
advanced
threat,protection security
as well as data loss
prevention .
three commonaly
cybersecurity
vendors are..
cisco Mcafee Trend micro.
This Photo by Unknown
Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY-SA
10. ADVANTAGE OF CYBER SECURITY
it will defend from hacks and virus.
the application of cyber security used in ourpc
needs update everyweek
The security develpers will update their database
every week once. Henc the new virus also deleted
11. DIS ADVANTAGE OF CYBER SECURITY
make the system slower than before
Need to keep uploading the new software
In order to keep security up to date
Could be costly for average user
12. BENEFITS IN CYBER SECURITY
Protection for data and network
Prevention of unauthorized users
Improve recovery time after a breech
Protection to end users
13.
14. CAREER IN CYBER SECURITY
• AS the cyber threat land scape continues to grow and
emerging threats such as the internet of things require
hardware and software skills. it is estimated that there are
1 million unfilled cyber security job world wide. IT
professionals and other computer specialist are needed in
security job.
15. CISO (CHIEF INFORMATION SECURITY OFFICER)
SECURITY ENGINEER
ARCHITECT
ANALYST
This Photo by Unknown Author is licensed under CC BY-SA
16. CONCLUSION
• The only system which is truly secure is one
which is switched off and unplugged.
• So, only way to be safe is pay attention and act
smart
17. This Photo by Unknown Author is
licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is
licensed under CC BY-NC-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by Unknown
Author is licensed under CC
BY-SA-NC
This Photo by Unknown Author is licensed under CC BY-ND
This Photo by Unknown Author is licensed under CC
BY-SA
This Photo by
Unknown Author
is licensed under
CC BY
This Photo by Unknown Author is licensed under
CC BY-SA
This Photo by Unknown Author is licensed
under CC BY
This Photo by
Unknown Author is
licensed under CC
BY-ND