SlideShare a Scribd company logo
1 of 7
Cyber Security
Why it matters?
• Intellectual property
• Customer or user data
• Organisation’s image and public perception
• Cost of attacks in relation to money
Who are they?
• Criminals
• Hacktivists
• “The concept of hacktivism is also becoming increasingly popular and refers,
essentially, to civil disobedience in the cyber realm. The motives of
hacktivists range from political issues, promoting free speech or supporting
human rights, and are not based on financial gain.” John Green
• General hackers
 White Hat’s
 Black Hat’s
Julian Assange,
founder of
Wikileaks
Edward
Snowden
What can be done?
• Education
• “In addition to IT protection, firms must fully educate company employees on
the nature of attacks and how to identify suspicious emails or behaviour, and
have adequate preparations in place for if attacks do arise. “ – Phil Beckett
• Security competence
What can be done?
• Organisations need to be pro-active
• Penetration test, within the organisation or by hiring
professionals
• Information Technology’s cyclic development and advancement
• Worst case scenario plan of action
Digitisation and Cyber Security
• Prospective employee’s of the field need to understand it’s nature.
References1. Toh, K.G (2013). Intellectual Property [Image]. Retrieved from http://fr.123rf.com/photo_9914637_background-concept-wordcloud-illustration-of-ideology.html
2. Database server [Image]. (2013). Retrieved from http://www.freepik.com/free-vector/database-server_610184.htm#term=server&page=3&position=12
3.Cisco logo [Image]. (2008). Retrieved from https://commons.wikimedia.org/wiki/File:Cisco_logo.svg
4. Falling off the chart [Image]. (2001). Retrieved from http://www.srilankamuslimeconomistsuk.org/2011/01/spectre-of-double-dip-recession.html
5. Data Thief [Image]. (2014). Retrieved from https://www.flickr.com/photos/111692634@N04/15855653380
6. Julian Assange [Image]. (2010). Retrieved from https://commons.wikimedia.org/wiki/File:Julian_Assange_20091117_Copenhagen_1_cropped_to_shoulders.jpg
7. Wikileaks (2008). Wikileaks Logo [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Wikileaks_logo.svg
8. Laura Poitras (2013). Edward Snowden [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Edward_Snowden-2.jpg
9. Louis Courtney (2012). Anonymous black [Image]. Retrieved from https://c2.staticflickr.com/8/7260/6870002408_abf6b5b6a8_b.jpg
10. Gerd Altmann (2014). Education [Image]. Retrieved from https://pixabay.com/p-379219/?no_redirect
11. Gerd Altmann (2015). Digital road sign [Image]. Retrieved from https://pixabay.com/p-579553/?no_redirect
12. Gerd Altmann (2015). Digital lock [Image]. Retrieved from https://pixabay.com/p-538722/?no_redirect
13. Safe [Image] (n.d.). Retrieved from https://www.jisc.ac.uk/sites/default/files/safe.jpg
14. Karn G. Bulsuk (2008). Plan of action [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg
15. Digitisation [Image]. (2015). Retrieved from https://www.linkedin.com/pulse/astounding-effects-digitisation-workplace-laura-white

More Related Content

What's hot

CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsINKPPT
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsCareer Communications Group
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security OverviewSupriyaGaikwad28
 
cyber security
cyber securitycyber security
cyber securitykm. nahid
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
cyber security
cyber securitycyber security
cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 

Viewers also liked

Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5stormie2796
 
Act.19 sarb
Act.19 sarbAct.19 sarb
Act.19 sarb951219
 
Presentación1
Presentación1Presentación1
Presentación1efren999
 
La energía en el mundo sam
La energía en el mundo samLa energía en el mundo sam
La energía en el mundo samSandra Bello
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxkhurlee kosmos
 
Estantería qu2
Estantería qu2Estantería qu2
Estantería qu2tumaniqui
 
La energía en el mundo
La energía en el mundo La energía en el mundo
La energía en el mundo Sandra Bello
 
5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using DataWebLink International
 
E catalogue (1)
E catalogue (1)E catalogue (1)
E catalogue (1)vinoth D
 
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACIONINFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACIONvivian_qui16
 
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...Salesforce Partners
 

Viewers also liked (19)

mohamed ramadan cv
mohamed ramadan cvmohamed ramadan cv
mohamed ramadan cv
 
Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5
 
Act.19 sarb
Act.19 sarbAct.19 sarb
Act.19 sarb
 
Presentación1
Presentación1Presentación1
Presentación1
 
La energía en el mundo sam
La energía en el mundo samLa energía en el mundo sam
La energía en el mundo sam
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Massage
MassageMassage
Massage
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Luke veltjensswana1
Luke veltjensswana1Luke veltjensswana1
Luke veltjensswana1
 
Estantería qu2
Estantería qu2Estantería qu2
Estantería qu2
 
Diagramas
DiagramasDiagramas
Diagramas
 
La energía en el mundo
La energía en el mundo La energía en el mundo
La energía en el mundo
 
fotos
fotosfotos
fotos
 
National_Service_Cert.
National_Service_Cert.National_Service_Cert.
National_Service_Cert.
 
5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data
 
E catalogue (1)
E catalogue (1)E catalogue (1)
E catalogue (1)
 
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACIONINFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
 
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
 
ISLA Sustaining the Vision
ISLA Sustaining the VisionISLA Sustaining the Vision
ISLA Sustaining the Vision
 

Similar to Cyber security

War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramBGA Cyber Security
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 

Similar to Cyber security (20)

War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
ethics final project
ethics final projectethics final project
ethics final project
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Cyber security

  • 2. Why it matters? • Intellectual property • Customer or user data • Organisation’s image and public perception • Cost of attacks in relation to money
  • 3. Who are they? • Criminals • Hacktivists • “The concept of hacktivism is also becoming increasingly popular and refers, essentially, to civil disobedience in the cyber realm. The motives of hacktivists range from political issues, promoting free speech or supporting human rights, and are not based on financial gain.” John Green • General hackers  White Hat’s  Black Hat’s Julian Assange, founder of Wikileaks Edward Snowden
  • 4. What can be done? • Education • “In addition to IT protection, firms must fully educate company employees on the nature of attacks and how to identify suspicious emails or behaviour, and have adequate preparations in place for if attacks do arise. “ – Phil Beckett • Security competence
  • 5. What can be done? • Organisations need to be pro-active • Penetration test, within the organisation or by hiring professionals • Information Technology’s cyclic development and advancement • Worst case scenario plan of action
  • 6. Digitisation and Cyber Security • Prospective employee’s of the field need to understand it’s nature.
  • 7. References1. Toh, K.G (2013). Intellectual Property [Image]. Retrieved from http://fr.123rf.com/photo_9914637_background-concept-wordcloud-illustration-of-ideology.html 2. Database server [Image]. (2013). Retrieved from http://www.freepik.com/free-vector/database-server_610184.htm#term=server&page=3&position=12 3.Cisco logo [Image]. (2008). Retrieved from https://commons.wikimedia.org/wiki/File:Cisco_logo.svg 4. Falling off the chart [Image]. (2001). Retrieved from http://www.srilankamuslimeconomistsuk.org/2011/01/spectre-of-double-dip-recession.html 5. Data Thief [Image]. (2014). Retrieved from https://www.flickr.com/photos/111692634@N04/15855653380 6. Julian Assange [Image]. (2010). Retrieved from https://commons.wikimedia.org/wiki/File:Julian_Assange_20091117_Copenhagen_1_cropped_to_shoulders.jpg 7. Wikileaks (2008). Wikileaks Logo [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Wikileaks_logo.svg 8. Laura Poitras (2013). Edward Snowden [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Edward_Snowden-2.jpg 9. Louis Courtney (2012). Anonymous black [Image]. Retrieved from https://c2.staticflickr.com/8/7260/6870002408_abf6b5b6a8_b.jpg 10. Gerd Altmann (2014). Education [Image]. Retrieved from https://pixabay.com/p-379219/?no_redirect 11. Gerd Altmann (2015). Digital road sign [Image]. Retrieved from https://pixabay.com/p-579553/?no_redirect 12. Gerd Altmann (2015). Digital lock [Image]. Retrieved from https://pixabay.com/p-538722/?no_redirect 13. Safe [Image] (n.d.). Retrieved from https://www.jisc.ac.uk/sites/default/files/safe.jpg 14. Karn G. Bulsuk (2008). Plan of action [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg 15. Digitisation [Image]. (2015). Retrieved from https://www.linkedin.com/pulse/astounding-effects-digitisation-workplace-laura-white