ºÝºÝߣshows by User: bahamadoua / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: bahamadoua / Mon, 29 Aug 2022 00:04:40 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: bahamadoua Intro. to Cybersecurity Awareness.pptx /slideshow/intro-to-cybersecurity-awarenesspptx/252735147 intro-220829000440-0b372d39
What is Cyber Security? Cyber Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services. The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and availability, or CIA. Privacy means data can be accessed only by authorized parties; integrity means information can be added, altered, or removed only by authorized users; and availability means systems, functions, and data must be available on-demand according to agreed-upon parameters. The main element of Cyber Security is the use of authentication mechanisms. For example, a user name identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be. Types of Cyber Crimes Cybercrime is any unauthorized activity involving a computer, device, or network. The three types are computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related to it. CYBERSECURITY GOVERNANCE • The typical driver for cybersecurity governance remains the prevention of fraud and abuse • Prevention of abuse and fraud have led to increased regulations, standards, and guidelines. • Organizations now pay greater attention to governance, which has changed the dynamics of information security management. • Computer crimes & cyber attacks are on the rise, many of which are perpetrated using social engineering techniques. • Building security awareness into the governance structure has become essential. • Information security professionals are faced with ever-evolving technologies. These include sophisticated and determined cybercriminals and a blended threat landscape. • Even those security practitioners who work in non-regulated environments are expected to follow a common set of practices, criteria, and standards. • An understanding of the laws, regulations, and standards that apply to the field of information security is essential. • The most common frameworks are the National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO 27001 and ISO 27002). KEY INFORMATION SECURITY CONCEPTS • Access – A subject of objects ability to use, manipulate, modify, or affect another subject or object. • Asset – The resources that are being protected - workstation, servers, and network devices. • Attack – A intentional or unintentional act that can damage or compromise information systems. • Control, Safeguard, or Countermeasure – The security mechanisms, policies, or procedures that counter attacks, reduce risk, and resolve vulnerabilities • Exploit – A technique used to compromise a system. • Exposure – A state of being exposed when a vulnerability exist. • Loss – A instance of an in]]>

What is Cyber Security? Cyber Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services. The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and availability, or CIA. Privacy means data can be accessed only by authorized parties; integrity means information can be added, altered, or removed only by authorized users; and availability means systems, functions, and data must be available on-demand according to agreed-upon parameters. The main element of Cyber Security is the use of authentication mechanisms. For example, a user name identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be. Types of Cyber Crimes Cybercrime is any unauthorized activity involving a computer, device, or network. The three types are computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related to it. CYBERSECURITY GOVERNANCE • The typical driver for cybersecurity governance remains the prevention of fraud and abuse • Prevention of abuse and fraud have led to increased regulations, standards, and guidelines. • Organizations now pay greater attention to governance, which has changed the dynamics of information security management. • Computer crimes & cyber attacks are on the rise, many of which are perpetrated using social engineering techniques. • Building security awareness into the governance structure has become essential. • Information security professionals are faced with ever-evolving technologies. These include sophisticated and determined cybercriminals and a blended threat landscape. • Even those security practitioners who work in non-regulated environments are expected to follow a common set of practices, criteria, and standards. • An understanding of the laws, regulations, and standards that apply to the field of information security is essential. • The most common frameworks are the National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO 27001 and ISO 27002). KEY INFORMATION SECURITY CONCEPTS • Access – A subject of objects ability to use, manipulate, modify, or affect another subject or object. • Asset – The resources that are being protected - workstation, servers, and network devices. • Attack – A intentional or unintentional act that can damage or compromise information systems. • Control, Safeguard, or Countermeasure – The security mechanisms, policies, or procedures that counter attacks, reduce risk, and resolve vulnerabilities • Exploit – A technique used to compromise a system. • Exposure – A state of being exposed when a vulnerability exist. • Loss – A instance of an in]]>
Mon, 29 Aug 2022 00:04:40 GMT /slideshow/intro-to-cybersecurity-awarenesspptx/252735147 bahamadoua@slideshare.net(bahamadoua) Intro. to Cybersecurity Awareness.pptx bahamadoua What is Cyber Security? Cyber Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services. The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and availability, or CIA. Privacy means data can be accessed only by authorized parties; integrity means information can be added, altered, or removed only by authorized users; and availability means systems, functions, and data must be available on-demand according to agreed-upon parameters. The main element of Cyber Security is the use of authentication mechanisms. For example, a user name identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be. Types of Cyber Crimes Cybercrime is any unauthorized activity involving a computer, device, or network. The three types are computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related to it. CYBERSECURITY GOVERNANCE • The typical driver for cybersecurity governance remains the prevention of fraud and abuse • Prevention of abuse and fraud have led to increased regulations, standards, and guidelines. • Organizations now pay greater attention to governance, which has changed the dynamics of information security management. • Computer crimes & cyber attacks are on the rise, many of which are perpetrated using social engineering techniques. • Building security awareness into the governance structure has become essential. • Information security professionals are faced with ever-evolving technologies. These include sophisticated and determined cybercriminals and a blended threat landscape. • Even those security practitioners who work in non-regulated environments are expected to follow a common set of practices, criteria, and standards. • An understanding of the laws, regulations, and standards that apply to the field of information security is essential. • The most common frameworks are the National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO 27001 and ISO 27002). KEY INFORMATION SECURITY CONCEPTS • Access – A subject of objects ability to use, manipulate, modify, or affect another subject or object. • Asset – The resources that are being protected - workstation, servers, and network devices. • Attack – A intentional or unintentional act that can damage or compromise information systems. • Control, Safeguard, or Countermeasure – The security mechanisms, policies, or procedures that counter attacks, reduce risk, and resolve vulnerabilities • Exploit – A technique used to compromise a system. • Exposure – A state of being exposed when a vulnerability exist. • Loss – A instance of an in <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intro-220829000440-0b372d39-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What is Cyber Security? Cyber Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services. The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and availability, or CIA. Privacy means data can be accessed only by authorized parties; integrity means information can be added, altered, or removed only by authorized users; and availability means systems, functions, and data must be available on-demand according to agreed-upon parameters. The main element of Cyber Security is the use of authentication mechanisms. For example, a user name identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be. Types of Cyber Crimes Cybercrime is any unauthorized activity involving a computer, device, or network. The three types are computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related to it. CYBERSECURITY GOVERNANCE • The typical driver for cybersecurity governance remains the prevention of fraud and abuse • Prevention of abuse and fraud have led to increased regulations, standards, and guidelines. • Organizations now pay greater attention to governance, which has changed the dynamics of information security management. • Computer crimes &amp; cyber attacks are on the rise, many of which are perpetrated using social engineering techniques. • Building security awareness into the governance structure has become essential. • Information security professionals are faced with ever-evolving technologies. These include sophisticated and determined cybercriminals and a blended threat landscape. • Even those security practitioners who work in non-regulated environments are expected to follow a common set of practices, criteria, and standards. • An understanding of the laws, regulations, and standards that apply to the field of information security is essential. • The most common frameworks are the National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO 27001 and ISO 27002). KEY INFORMATION SECURITY CONCEPTS • Access – A subject of objects ability to use, manipulate, modify, or affect another subject or object. • Asset – The resources that are being protected - workstation, servers, and network devices. • Attack – A intentional or unintentional act that can damage or compromise information systems. • Control, Safeguard, or Countermeasure – The security mechanisms, policies, or procedures that counter attacks, reduce risk, and resolve vulnerabilities • Exploit – A technique used to compromise a system. • Exposure – A state of being exposed when a vulnerability exist. • Loss – A instance of an in
Intro. to Cybersecurity Awareness.pptx from Amadou A. Bah
]]>
15 0 https://cdn.slidesharecdn.com/ss_thumbnails/intro-220829000440-0b372d39-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-bahamadoua-48x48.jpg?cb=1661730312 I a young boy of 24 yrs, am currently studying. I like to make friendship and love to share ideas and experience with other people