Cyber Security Intro1
Cyber Security Intro1
Example: Locking your car doors is the 10%. Making sure nothing of
value is left on the seat, windows are rolled up and parking in a safe
area account for the remaining 90%.
The CIA of Cyber Security
There are many reasons why you should protect the
information you use on your computer.
A. Ensuring that your information remains confidential and only those who
should access that information, can
B. Knowing that no one has been able to change your information, so you
can depend on its accuracy.
C. Making sure that your information is available when you need it (by
making back-up copies and, if appropriate, storing the back-up copies
off-site)
Questions Module 1:
Introduction to Cyber Security
The answer is B. Knowing that your information has not been
changed.
• The global cyber threat continues to evolve at a rapid pace, with a rising
number of data breaches each year. A report by RiskBased
Security revealed that a shocking 7.9 billion records have been exposed by
data breaches in the first nine months of 2019 alone. This figure is more
than double (112%) the number of records exposed in the same period in
2018.
• Governments across the globe have responded to the rising cyber threat
with guidance to help organizations implement effective cyber-security
practices.
Types of cyber threats
• The threats countered by cyber-security are three-
fold:
1.Cybercrime includes single actors or groups
targeting systems for financial gain or to cause
disruption.
2.Cyber-attack often involves politically motivated
information gathering.
3.Cyberterrorism is intended to undermine electronic
systems to cause panic or fear.
So, how do malicious actors gain control of computer systems?
Malware: