際際滷

際際滷Share a Scribd company logo
Module #1:
Module #1:
Introduction to Cyber Security
Introduction to Cyber Security
Estimated time for Module 1 is 3 minutes
What is Cyber Security?
What is Cyber Security?
Cyber or Computer Security is the
protection of computing systems and
the data that these systems store or access.
These systems include:
PCs
Laptops
SmartPhones
Mobile Devices
Printers
Why is Computer Security
Why is Computer Security
Important?
Important?
Computer Security allows the City of Albuquerque to
carry out its mission by:
 Enabling staff to carry out their jobs,
 Decreases the threat of current and future vulnerabilities
 Supporting critical business processes
 Protecting personal and sensitive information
Why do I need to know about
Why do I need to know about
Cyber Security?
Cyber Security?
It is estimated that 10% of security safeguards are technical in
nature. Firewalls and Intrusion Detection devices are a few
devices that can help prevent approximately 10% of security
threats.
The additional 90% of safeguards rely on each of us. By
understanding and adhering to these safeguards, we can
reduce or eliminate most cyber security threats.
Example: Locking your car doors is the 10%. Making sure
nothing of value is left on the seat, windows are rolled up and
parking in a safe area account for the remaining 90%.
The CIA of Cyber Security
The CIA of Cyber Security
There are many reasons why you should protect
the information you use on your computer.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy
(information integrity)
Availability: Making sure that your information is available when
you need it (by making back-up copies and, if
appropriate, storing the back-up copies off-site)
What does this mean to me?
What does this mean to me?
This means that everyone who uses a computer
or mobile device needs to understand how to
keep their computer, device and data secure.
Information Technology Security is
Everyones responsibility
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
The Answer is E, All of the above
Computer Security allow us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #2: The Integrity of information means:
A. Ensuring that your information remains confidential and only
those who should access that information, can
B. Knowing that no one has been able to change your information,
so you can depend on its accuracy.
C. Making sure that your information is available when you need it
(by making back-up copies and, if appropriate, storing the back-
up copies off-site)
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
The answer is B. Knowing that your information has not
been changed.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy.
Availability: Making sure that your information is available when you
need it (by making back-up copies and, if appropriate, storing
the back-up copies off-site)
This concludes Module 1: Introduction
This concludes Module 1: Introduction
to Cyber Security
to Cyber Security
Continue on to module 2: Sensitive Data
Module 2 will provide information on Personal
Identifiable Information or PII and best practices in
protecting this data from theft.

More Related Content

Similar to Module1_Intro to Security1111111_Final.ppt (20)

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
Devyani Vaidya
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
EmanAzam
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
Takshila Learning
secued cloud
 secued cloud secued cloud
secued cloud
Devyani Vaidya
secued cloud ppt
secued cloud pptsecued cloud ppt
secued cloud ppt
Kartik Kalpande Patil
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
Manjushree Mashal
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
Rohana K Amarakoon
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
George Delikouras
Kel1 Computer security - UC Santa Cruz's.pdf
Kel1 Computer security - UC Santa Cruz's.pdfKel1 Computer security - UC Santa Cruz's.pdf
Kel1 Computer security - UC Santa Cruz's.pdf
rikimauludin0205
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
Symbiosis Group
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docx
priestmanmable
CyberCore Security Essentials_ Protecting Your Digital World.docx
CyberCore  Security Essentials_ Protecting Your Digital World.docxCyberCore  Security Essentials_ Protecting Your Digital World.docx
CyberCore Security Essentials_ Protecting Your Digital World.docx
Oscp Training
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
EmanAzam
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
Takshila Learning
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
Rohana K Amarakoon
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
George Delikouras
Kel1 Computer security - UC Santa Cruz's.pdf
Kel1 Computer security - UC Santa Cruz's.pdfKel1 Computer security - UC Santa Cruz's.pdf
Kel1 Computer security - UC Santa Cruz's.pdf
rikimauludin0205
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
Symbiosis Group
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docx
priestmanmable
CyberCore Security Essentials_ Protecting Your Digital World.docx
CyberCore  Security Essentials_ Protecting Your Digital World.docxCyberCore  Security Essentials_ Protecting Your Digital World.docx
CyberCore Security Essentials_ Protecting Your Digital World.docx
Oscp Training

Recently uploaded (20)

Successful management of intussusception in a cow under double drip anaesthesia
Successful management of intussusception  in a cow under double drip anaesthesiaSuccessful management of intussusception  in a cow under double drip anaesthesia
Successful management of intussusception in a cow under double drip anaesthesia
rajvet4163
Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...
Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...
Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...
ThrombUS+ Project
epidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptxepidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptx
lopamudraray88
Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...
Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...
Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...
christianagboeze2427
Moulding techniques for polymers industrial process
Moulding techniques for polymers industrial processMoulding techniques for polymers industrial process
Moulding techniques for polymers industrial process
JinnJinnkiJaddu
Climate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and EngineeringClimate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and Engineering
Zachary Labe
Liquid waste- problems and treatment.ppt
Liquid waste- problems and treatment.pptLiquid waste- problems and treatment.ppt
Liquid waste- problems and treatment.ppt
bharatbengali
Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...
Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...
Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...
jhnewshour
Transgenic Sheep and high quality wool production.pptx
Transgenic Sheep and high quality wool production.pptxTransgenic Sheep and high quality wool production.pptx
Transgenic Sheep and high quality wool production.pptx
PSG College of Technology
biochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptxbiochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptx
Amri559698
Blotting techniques and types of blotting .pptx
Blotting techniques and  types of blotting .pptxBlotting techniques and  types of blotting .pptx
Blotting techniques and types of blotting .pptx
sakshibhongal26
Investigational New drug application process
Investigational New drug application processInvestigational New drug application process
Investigational New drug application process
onepalyer4
Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...
Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...
Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...
ThrombUS+ Project
CONDUCTOMETRY presentation for MSc students.pptx
CONDUCTOMETRY presentation for MSc students.pptxCONDUCTOMETRY presentation for MSc students.pptx
CONDUCTOMETRY presentation for MSc students.pptx
NakulBarwat
Units and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptxUnits and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptx
Dr Sarika P Patil
Energ and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE PhysicsEnerg and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE Physics
Blessing Ndazie
2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...
2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...
2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...
Graz University of Technology & Know-Center
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
tibhathakur77
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptxGrade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
MarvinAlegado
quantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yrquantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yr
KushiBhatia
Successful management of intussusception in a cow under double drip anaesthesia
Successful management of intussusception  in a cow under double drip anaesthesiaSuccessful management of intussusception  in a cow under double drip anaesthesia
Successful management of intussusception in a cow under double drip anaesthesia
rajvet4163
Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...
Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...
Automating Compression Ultrasonography of Human Thigh Tissue and Vessels via ...
ThrombUS+ Project
epidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptxepidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptx
lopamudraray88
Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...
Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...
Unjustly Incriminating Bacteria: the Role of Bacteriophages in Bacterial Infe...
christianagboeze2427
Moulding techniques for polymers industrial process
Moulding techniques for polymers industrial processMoulding techniques for polymers industrial process
Moulding techniques for polymers industrial process
JinnJinnkiJaddu
Climate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and EngineeringClimate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and Engineering
Zachary Labe
Liquid waste- problems and treatment.ppt
Liquid waste- problems and treatment.pptLiquid waste- problems and treatment.ppt
Liquid waste- problems and treatment.ppt
bharatbengali
Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...
Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...
Unraveling the BETICHUMD Mechanism of CHUSOMERADUCK: A Game-Changing Paradigm...
jhnewshour
Transgenic Sheep and high quality wool production.pptx
Transgenic Sheep and high quality wool production.pptxTransgenic Sheep and high quality wool production.pptx
Transgenic Sheep and high quality wool production.pptx
PSG College of Technology
biochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptxbiochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptx
Amri559698
Blotting techniques and types of blotting .pptx
Blotting techniques and  types of blotting .pptxBlotting techniques and  types of blotting .pptx
Blotting techniques and types of blotting .pptx
sakshibhongal26
Investigational New drug application process
Investigational New drug application processInvestigational New drug application process
Investigational New drug application process
onepalyer4
Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...
Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...
Preparing Ultrasound Imaging Data for Artificial Intelligence Tasks: Anonymis...
ThrombUS+ Project
CONDUCTOMETRY presentation for MSc students.pptx
CONDUCTOMETRY presentation for MSc students.pptxCONDUCTOMETRY presentation for MSc students.pptx
CONDUCTOMETRY presentation for MSc students.pptx
NakulBarwat
Units and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptxUnits and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptx
Dr Sarika P Patil
Energ and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE PhysicsEnerg and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE Physics
Blessing Ndazie
2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...
2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...
2025-03-03-Data-related-Ethics Issues in Technologies for Professional Learni...
Graz University of Technology & Know-Center
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
tibhathakur77
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptxGrade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
MarvinAlegado
quantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yrquantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yr
KushiBhatia

Module1_Intro to Security1111111_Final.ppt

  • 1. Module #1: Module #1: Introduction to Cyber Security Introduction to Cyber Security Estimated time for Module 1 is 3 minutes
  • 2. What is Cyber Security? What is Cyber Security? Cyber or Computer Security is the protection of computing systems and the data that these systems store or access. These systems include: PCs Laptops SmartPhones Mobile Devices Printers
  • 3. Why is Computer Security Why is Computer Security Important? Important? Computer Security allows the City of Albuquerque to carry out its mission by: Enabling staff to carry out their jobs, Decreases the threat of current and future vulnerabilities Supporting critical business processes Protecting personal and sensitive information
  • 4. Why do I need to know about Why do I need to know about Cyber Security? Cyber Security? It is estimated that 10% of security safeguards are technical in nature. Firewalls and Intrusion Detection devices are a few devices that can help prevent approximately 10% of security threats. The additional 90% of safeguards rely on each of us. By understanding and adhering to these safeguards, we can reduce or eliminate most cyber security threats. Example: Locking your car doors is the 10%. Making sure nothing of value is left on the seat, windows are rolled up and parking in a safe area account for the remaining 90%.
  • 5. The CIA of Cyber Security The CIA of Cyber Security There are many reasons why you should protect the information you use on your computer. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy (information integrity) Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 6. What does this mean to me? What does this mean to me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is Everyones responsibility
  • 7. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 8. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: The Answer is E, All of the above Computer Security allow us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 9. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #2: The Integrity of information means: A. Ensuring that your information remains confidential and only those who should access that information, can B. Knowing that no one has been able to change your information, so you can depend on its accuracy. C. Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back- up copies off-site)
  • 10. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security The answer is B. Knowing that your information has not been changed. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy. Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 11. This concludes Module 1: Introduction This concludes Module 1: Introduction to Cyber Security to Cyber Security Continue on to module 2: Sensitive Data Module 2 will provide information on Personal Identifiable Information or PII and best practices in protecting this data from theft.