SlideShare a Scribd company logo
1 of 4
CYBER SECURITY ISSUES




 FATHIN NADHIRAH BT ZULKIFLI
          1117852
     NADHIRAH BT KADIR
          1113230
Definition
• Cyber security is the body of
  technologies, processes and practices
  designed to protect
  networks, computers, programs and data from
  attack, damage or unauthorized access. In a
  computing context, the term security implies
  cyber security.
Elements of cyber security include:


• Application security
• Information security
• Network security
• Disaster recovery / business continuity
  planning
• End-user education.
Cyber Security Glossary Terms

More Related Content

What's hot

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
introduction to information security
introduction to information security introduction to information security
introduction to information security ahmed sami
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training CourseOsman Suliman
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdfSprintzeal
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An OverviewApostolos Syropoulos
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
operation security
operation securityoperation security
operation securityKajalsing23
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 

What's hot (19)

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
introduction to information security
introduction to information security introduction to information security
introduction to information security
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training Course
 
Project cyper
Project cyper Project cyper
Project cyper
 
Information security
Information securityInformation security
Information security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdf
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An Overview
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
operation security
operation securityoperation security
operation security
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Cyber security issues

  • 1. CYBER SECURITY ISSUES FATHIN NADHIRAH BT ZULKIFLI 1117852 NADHIRAH BT KADIR 1113230
  • 2. Definition • Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security.
  • 3. Elements of cyber security include: • Application security • Information security • Network security • Disaster recovery / business continuity planning • End-user education.