SlideShare a Scribd company logo
Cyber Security
Why it matters?
• Intellectual property
• Customer or user data
• Organisation’s image and public perception
• Cost of attacks in relation to money
Who are they?
• Criminals
• Hacktivists
• “The concept of hacktivism is also becoming increasingly popular and refers,
essentially, to civil disobedience in the cyber realm. The motives of
hacktivists range from political issues, promoting free speech or supporting
human rights, and are not based on financial gain.” John Green
• General hackers
 White Hat’s
 Black Hat’s
Julian Assange,
founder of
Wikileaks
Edward
Snowden
What can be done?
• Education
• “In addition to IT protection, firms must fully educate company employees on
the nature of attacks and how to identify suspicious emails or behaviour, and
have adequate preparations in place for if attacks do arise. “ – Phil Beckett
• Security competence
What can be done?
• Organisations need to be pro-active
• Penetration test, within the organisation or by hiring
professionals
• Information Technology’s cyclic development and advancement
• Worst case scenario plan of action
Digitisation and Cyber Security
• Prospective employee’s of the field need to understand it’s nature.
References1. Toh, K.G (2013). Intellectual Property [Image]. Retrieved from http://fr.123rf.com/photo_9914637_background-concept-wordcloud-illustration-of-ideology.html
2. Database server [Image]. (2013). Retrieved from http://www.freepik.com/free-vector/database-server_610184.htm#term=server&page=3&position=12
3.Cisco logo [Image]. (2008). Retrieved from https://commons.wikimedia.org/wiki/File:Cisco_logo.svg
4. Falling off the chart [Image]. (2001). Retrieved from http://www.srilankamuslimeconomistsuk.org/2011/01/spectre-of-double-dip-recession.html
5. Data Thief [Image]. (2014). Retrieved from https://www.flickr.com/photos/111692634@N04/15855653380
6. Julian Assange [Image]. (2010). Retrieved from https://commons.wikimedia.org/wiki/File:Julian_Assange_20091117_Copenhagen_1_cropped_to_shoulders.jpg
7. Wikileaks (2008). Wikileaks Logo [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Wikileaks_logo.svg
8. Laura Poitras (2013). Edward Snowden [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Edward_Snowden-2.jpg
9. Louis Courtney (2012). Anonymous black [Image]. Retrieved from https://c2.staticflickr.com/8/7260/6870002408_abf6b5b6a8_b.jpg
10. Gerd Altmann (2014). Education [Image]. Retrieved from https://pixabay.com/p-379219/?no_redirect
11. Gerd Altmann (2015). Digital road sign [Image]. Retrieved from https://pixabay.com/p-579553/?no_redirect
12. Gerd Altmann (2015). Digital lock [Image]. Retrieved from https://pixabay.com/p-538722/?no_redirect
13. Safe [Image] (n.d.). Retrieved from https://www.jisc.ac.uk/sites/default/files/safe.jpg
14. Karn G. Bulsuk (2008). Plan of action [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg
15. Digitisation [Image]. (2015). Retrieved from https://www.linkedin.com/pulse/astounding-effects-digitisation-workplace-laura-white

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
TanmoyMaitra
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
rishirvk1995
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
Jacqueline Fick
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
Microsoft
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Career Communications Group
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Aurobindo Nayak
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
SupriyaGaikwad28
 
cyber security
cyber securitycyber security
cyber security
km. nahid
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
anjalika sinha
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
cyber security
cyber securitycyber security
cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 

Viewers also liked

Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5
stormie2796
 
Act.19 sarb
Act.19 sarbAct.19 sarb
Act.19 sarb
951219
 
Presentación1
Presentación1Presentación1
Presentación1efren999
 
La energía en el mundo sam
La energía en el mundo samLa energía en el mundo sam
La energía en el mundo sam
Sandra Bello
 
Massage
MassageMassage
Massage
Claudia Varez
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxkhurlee kosmos
 
Luke veltjensswana1
Luke veltjensswana1Luke veltjensswana1
Luke veltjensswana1
Luke Veltjens-Swan
 
Estantería qu2
Estantería qu2Estantería qu2
Estantería qu2tumaniqui
 
Diagramas
DiagramasDiagramas
Diagramas
RafaelDavid07
 
La energía en el mundo
La energía en el mundo La energía en el mundo
La energía en el mundo
Sandra Bello
 
5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data
WebLink International
 
E catalogue (1)
E catalogue (1)E catalogue (1)
E catalogue (1)
vinoth D
 
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACIONINFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
vivian_qui16
 
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Partners
 

Viewers also liked (19)

mohamed ramadan cv
mohamed ramadan cvmohamed ramadan cv
mohamed ramadan cv
 
Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5Vmarioneaux el7002 8-5
Vmarioneaux el7002 8-5
 
Act.19 sarb
Act.19 sarbAct.19 sarb
Act.19 sarb
 
Presentación1
Presentación1Presentación1
Presentación1
 
La energía en el mundo sam
La energía en el mundo samLa energía en el mundo sam
La energía en el mundo sam
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Massage
MassageMassage
Massage
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Luke veltjensswana1
Luke veltjensswana1Luke veltjensswana1
Luke veltjensswana1
 
Estantería qu2
Estantería qu2Estantería qu2
Estantería qu2
 
Diagramas
DiagramasDiagramas
Diagramas
 
La energía en el mundo
La energía en el mundo La energía en el mundo
La energía en el mundo
 
fotos
fotosfotos
fotos
 
National_Service_Cert.
National_Service_Cert.National_Service_Cert.
National_Service_Cert.
 
5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data5 Surefire Ways to Grow Membership Using Data
5 Surefire Ways to Grow Membership Using Data
 
E catalogue (1)
E catalogue (1)E catalogue (1)
E catalogue (1)
 
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACIONINFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
INFLUENCIA DE LA TECNOLOGIA EN LA EDUCACION
 
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
Salesforce Member Connect Healthcare Payor Solution Partner Training (July 29...
 
ISLA Sustaining the Vision
ISLA Sustaining the VisionISLA Sustaining the Vision
ISLA Sustaining the Vision
 

Similar to Cyber security

War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
Ayodeji Rotibi
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
siswarren
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
University of Geneva
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
Shiva Bissessar
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
NISIInstituut
 
ethics final project
ethics final projectethics final project
ethics final project
Victoriya Poplavskaya
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
lior mazor
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
InfinIT - Innovationsnetværket for it
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
BGA Cyber Security
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Vishwajeet Singh
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
ronoelias98
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 

Similar to Cyber security (20)

War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
ethics final project
ethics final projectethics final project
ethics final project
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Cyber security

  • 2. Why it matters? • Intellectual property • Customer or user data • Organisation’s image and public perception • Cost of attacks in relation to money
  • 3. Who are they? • Criminals • Hacktivists • “The concept of hacktivism is also becoming increasingly popular and refers, essentially, to civil disobedience in the cyber realm. The motives of hacktivists range from political issues, promoting free speech or supporting human rights, and are not based on financial gain.” John Green • General hackers  White Hat’s  Black Hat’s Julian Assange, founder of Wikileaks Edward Snowden
  • 4. What can be done? • Education • “In addition to IT protection, firms must fully educate company employees on the nature of attacks and how to identify suspicious emails or behaviour, and have adequate preparations in place for if attacks do arise. “ – Phil Beckett • Security competence
  • 5. What can be done? • Organisations need to be pro-active • Penetration test, within the organisation or by hiring professionals • Information Technology’s cyclic development and advancement • Worst case scenario plan of action
  • 6. Digitisation and Cyber Security • Prospective employee’s of the field need to understand it’s nature.
  • 7. References1. Toh, K.G (2013). Intellectual Property [Image]. Retrieved from http://fr.123rf.com/photo_9914637_background-concept-wordcloud-illustration-of-ideology.html 2. Database server [Image]. (2013). Retrieved from http://www.freepik.com/free-vector/database-server_610184.htm#term=server&page=3&position=12 3.Cisco logo [Image]. (2008). Retrieved from https://commons.wikimedia.org/wiki/File:Cisco_logo.svg 4. Falling off the chart [Image]. (2001). Retrieved from http://www.srilankamuslimeconomistsuk.org/2011/01/spectre-of-double-dip-recession.html 5. Data Thief [Image]. (2014). Retrieved from https://www.flickr.com/photos/111692634@N04/15855653380 6. Julian Assange [Image]. (2010). Retrieved from https://commons.wikimedia.org/wiki/File:Julian_Assange_20091117_Copenhagen_1_cropped_to_shoulders.jpg 7. Wikileaks (2008). Wikileaks Logo [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Wikileaks_logo.svg 8. Laura Poitras (2013). Edward Snowden [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Edward_Snowden-2.jpg 9. Louis Courtney (2012). Anonymous black [Image]. Retrieved from https://c2.staticflickr.com/8/7260/6870002408_abf6b5b6a8_b.jpg 10. Gerd Altmann (2014). Education [Image]. Retrieved from https://pixabay.com/p-379219/?no_redirect 11. Gerd Altmann (2015). Digital road sign [Image]. Retrieved from https://pixabay.com/p-579553/?no_redirect 12. Gerd Altmann (2015). Digital lock [Image]. Retrieved from https://pixabay.com/p-538722/?no_redirect 13. Safe [Image] (n.d.). Retrieved from https://www.jisc.ac.uk/sites/default/files/safe.jpg 14. Karn G. Bulsuk (2008). Plan of action [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg 15. Digitisation [Image]. (2015). Retrieved from https://www.linkedin.com/pulse/astounding-effects-digitisation-workplace-laura-white