SlideShare a Scribd company logo
1 of 9
Download to read offline
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
UNIT ONE
Introduction to CyberPatriot and
Cybersecurity
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
SECTION ONE
Introduction to CyberPatriot
1
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
SECTION TWO
Introduction to Cybersecurity
12
© Air Force Association 13
What is Cybersecurity?
All the tools we use and actions we
take to keep computers, networks,
and information safe and available
for those who need it, and
unavailable for those who should
not have it.
Source: www.UMUC.edu
That means protecting hardware and data from everything
from hacktivists to earthquakes
© Air Force Association 14
Why is Cybersecurity Important?
• Banks
• Factories
• Schools
• Airlines and Railroads
• Stores
• Police and fire departments
• Military and government systems
• Doctors’ offices
Answer: Cybersecurity isn’t just about protecting computers.
Almost everything relies on or could be affected by a computer.
Source: US Department of Homeland Security
7,200+ critical American industrial control systems
are linked to the Internet, and therefore vulnerable
to attack
Things that rely on computers:
© Air Force Association
• 2006: 26.5 million veterans’ personal information is compromised
after the theft of a Veteran Affairs employee’s laptop. The
employee thought it was safe to bring home VA records on an
unsecure drive.
• 2009: Coca-Cola executive clicks link in spoof email allowing
attackers to steal confidential files on $2.4 billion business deal
with Chinese juice company.
• 2011: DHS plants USB drives and CDs outside of government and
government contractor buildings. The majority are picked up by
employees and inserted directly into their organization’s
computers.
15
Why is Cybersecurity Important?
Sources: CSO magazine, www.csoonline.com, Bloomberg News, www.bloomberg.com, GCN Magazine, www.gcn.com
Answer: People make mistakes.
Cybersecurity is often about protecting organizations and individuals from themselves.
© Air Force Association
Case: RSA Security Services
• RSA: security firm that sells SecurID®
• Lockheed Martin: a $46 billion defense contractor that
uses SecurID®
16
Why is Cybersecurity Important?
Source: InformationWeek, http://www.informationweek.com/security/risk-management/lockheed-martin-suffers-massive-cyberattack/d/d-id/1098013
Attackers infiltrate
RSA’s network
through malware
deployed in spoof
emails sent to the
company’s
employees
Criminals capture
the algorithms used
to generate
Lockheed Martin’s
random SecurID®
passwords
Criminals launch
attack on
Lockheed’s
networks using the
algorithms they stole
from RSA
Luckily, Lockheed’s
security team is able
to thwart the
attacks.
Source: blogs.rsa.com
Answer: We’re all connected
A weakness in one system can be exploited by attackers to target another system.
© Air Force Association
• Nearly every organization needs cybersecurity professionals
• 300,000+ new information technology jobs were created in 2013
• Average salary for computer jobs in 2013 was ~$89,000, while
cybersecurity-specific jobs brought an average salary of $100,000+
17
Who’s Hiring?
Source: Computer World, http://www.computerworld.com/s/article/9237394/Demand_for_IT_security_experts_outstrips_supply?pageNumber=2
© Air Force Association
• Cyber workers
‐ Employees that maintain day-to-day
security and strengthen their
organization’s protection
• Cyber defenders
‐ Government or contractor employees
that protect American networks and
information from attacks
• Cyber sleuths
‐ Professionals that watch for espionage
and insider threats and perform digital
forensics for law enforcement
• Cyber leaders
‐ Industry veterans that decide company
security policies, train new employees,
and conduct R&D
18
Cyber Career Opportunities

More Related Content

What's hot

What's hot (20)

Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber security
Cyber securityCyber security
Cyber security
 
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 

Similar to introduction to cyber patriot and cyber security

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 

Similar to introduction to cyber patriot and cyber security (20)

Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
 

More from Erdo Deshiant Garnaby

More from Erdo Deshiant Garnaby (16)

Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Org Design
Org DesignOrg Design
Org Design
 
HOS Talent management presentation
HOS Talent management presentationHOS Talent management presentation
HOS Talent management presentation
 
Talent management
Talent managementTalent management
Talent management
 
Unit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resourcesUnit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resources
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
 
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machinesUnit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safety
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 

Recently uploaded

researching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffffresearching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffff
lolsDocherty
 
Program Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxProgram Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptx
ScottMeyers35
 
一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单
一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单
一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单
enbam
 
一比一原版(UWA毕业证)西澳大学毕业证成绩单
一比一原版(UWA毕业证)西澳大学毕业证成绩单一比一原版(UWA毕业证)西澳大学毕业证成绩单
一比一原版(UWA毕业证)西澳大学毕业证成绩单
enbam
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
TechSoup
 

Recently uploaded (20)

Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024
 
researching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffffresearching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffff
 
07/03/2024 Publiekdomeindag - voormiddag
07/03/2024 Publiekdomeindag - voormiddag07/03/2024 Publiekdomeindag - voormiddag
07/03/2024 Publiekdomeindag - voormiddag
 
Sponsoring a Girl Child's Education in kurnool
Sponsoring a Girl Child's Education in kurnoolSponsoring a Girl Child's Education in kurnool
Sponsoring a Girl Child's Education in kurnool
 
International Day of Families - 15 May 2024 - UNDESA.
International Day of Families - 15 May 2024 - UNDESA.International Day of Families - 15 May 2024 - UNDESA.
International Day of Families - 15 May 2024 - UNDESA.
 
Medieval Iraq Demographic Factors Yale Historical Review
Medieval Iraq Demographic Factors Yale Historical ReviewMedieval Iraq Demographic Factors Yale Historical Review
Medieval Iraq Demographic Factors Yale Historical Review
 
2024_End_of_Session_Report_Final_With_Vetoes.pdf
2024_End_of_Session_Report_Final_With_Vetoes.pdf2024_End_of_Session_Report_Final_With_Vetoes.pdf
2024_End_of_Session_Report_Final_With_Vetoes.pdf
 
Program Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxProgram Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptx
 
How to Save a Place: Get the Word Out Far And Wide
How to Save a Place: Get the Word Out Far And WideHow to Save a Place: Get the Word Out Far And Wide
How to Save a Place: Get the Word Out Far And Wide
 
RPO America Peer Exchange: Rural Transportation Planning Programs
RPO America Peer Exchange: Rural Transportation Planning ProgramsRPO America Peer Exchange: Rural Transportation Planning Programs
RPO America Peer Exchange: Rural Transportation Planning Programs
 
Lahore Resolution of 1940, Emergence of Bangladesh.pptx
Lahore Resolution of 1940, Emergence of Bangladesh.pptxLahore Resolution of 1940, Emergence of Bangladesh.pptx
Lahore Resolution of 1940, Emergence of Bangladesh.pptx
 
OilChange: Big Oil Reality Check May 2024
OilChange: Big Oil Reality Check May 2024OilChange: Big Oil Reality Check May 2024
OilChange: Big Oil Reality Check May 2024
 
一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单
一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单
一比一原版(MQU毕业证)麦考瑞大学毕业证成绩单
 
#Bepartoftheplan on International Day For Biological Diversity 2024
#Bepartoftheplan on International Day For Biological Diversity 2024#Bepartoftheplan on International Day For Biological Diversity 2024
#Bepartoftheplan on International Day For Biological Diversity 2024
 
Mothers Without Children Yale Historical Review
Mothers Without Children Yale Historical ReviewMothers Without Children Yale Historical Review
Mothers Without Children Yale Historical Review
 
Who are the Sherden Yale Historical Review
Who are the Sherden Yale Historical ReviewWho are the Sherden Yale Historical Review
Who are the Sherden Yale Historical Review
 
一比一原版(UWA毕业证)西澳大学毕业证成绩单
一比一原版(UWA毕业证)西澳大学毕业证成绩单一比一原版(UWA毕业证)西澳大学毕业证成绩单
一比一原版(UWA毕业证)西澳大学毕业证成绩单
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
 
Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...
 
07/03/2024 Publiekdomeindag - namiddag
07/03/2024 Publiekdomeindag - namiddag07/03/2024 Publiekdomeindag - namiddag
07/03/2024 Publiekdomeindag - namiddag
 

introduction to cyber patriot and cyber security

  • 1. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org UNIT ONE Introduction to CyberPatriot and Cybersecurity
  • 2. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION ONE Introduction to CyberPatriot 1
  • 3. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION TWO Introduction to Cybersecurity 12
  • 4. © Air Force Association 13 What is Cybersecurity? All the tools we use and actions we take to keep computers, networks, and information safe and available for those who need it, and unavailable for those who should not have it. Source: www.UMUC.edu That means protecting hardware and data from everything from hacktivists to earthquakes
  • 5. © Air Force Association 14 Why is Cybersecurity Important? • Banks • Factories • Schools • Airlines and Railroads • Stores • Police and fire departments • Military and government systems • Doctors’ offices Answer: Cybersecurity isn’t just about protecting computers. Almost everything relies on or could be affected by a computer. Source: US Department of Homeland Security 7,200+ critical American industrial control systems are linked to the Internet, and therefore vulnerable to attack Things that rely on computers:
  • 6. © Air Force Association • 2006: 26.5 million veterans’ personal information is compromised after the theft of a Veteran Affairs employee’s laptop. The employee thought it was safe to bring home VA records on an unsecure drive. • 2009: Coca-Cola executive clicks link in spoof email allowing attackers to steal confidential files on $2.4 billion business deal with Chinese juice company. • 2011: DHS plants USB drives and CDs outside of government and government contractor buildings. The majority are picked up by employees and inserted directly into their organization’s computers. 15 Why is Cybersecurity Important? Sources: CSO magazine, www.csoonline.com, Bloomberg News, www.bloomberg.com, GCN Magazine, www.gcn.com Answer: People make mistakes. Cybersecurity is often about protecting organizations and individuals from themselves.
  • 7. © Air Force Association Case: RSA Security Services • RSA: security firm that sells SecurID® • Lockheed Martin: a $46 billion defense contractor that uses SecurID® 16 Why is Cybersecurity Important? Source: InformationWeek, http://www.informationweek.com/security/risk-management/lockheed-martin-suffers-massive-cyberattack/d/d-id/1098013 Attackers infiltrate RSA’s network through malware deployed in spoof emails sent to the company’s employees Criminals capture the algorithms used to generate Lockheed Martin’s random SecurID® passwords Criminals launch attack on Lockheed’s networks using the algorithms they stole from RSA Luckily, Lockheed’s security team is able to thwart the attacks. Source: blogs.rsa.com Answer: We’re all connected A weakness in one system can be exploited by attackers to target another system.
  • 8. © Air Force Association • Nearly every organization needs cybersecurity professionals • 300,000+ new information technology jobs were created in 2013 • Average salary for computer jobs in 2013 was ~$89,000, while cybersecurity-specific jobs brought an average salary of $100,000+ 17 Who’s Hiring? Source: Computer World, http://www.computerworld.com/s/article/9237394/Demand_for_IT_security_experts_outstrips_supply?pageNumber=2
  • 9. © Air Force Association • Cyber workers ‐ Employees that maintain day-to-day security and strengthen their organization’s protection • Cyber defenders ‐ Government or contractor employees that protect American networks and information from attacks • Cyber sleuths ‐ Professionals that watch for espionage and insider threats and perform digital forensics for law enforcement • Cyber leaders ‐ Industry veterans that decide company security policies, train new employees, and conduct R&D 18 Cyber Career Opportunities