SlideShare a Scribd company logo
Day 1 Quiz Study Slides
 Cyber Security is the body of technologies,
 processes, and practices designed to
 protect networks, computers, programs,
 and data from attack, damage, or
 unauthorized access
   National Cyber Security Awareness campaign
    (stop.think.connect)

   Stop
     • Before using the internet consider the risks and learn to
       spot potential problems
   Think
     • Take a moment to be certain the path ahead is clear.
       Consider how your actions online could impact your safety,
       or your family’s
   Connect
     • Enjoy the Internet with greater confidence, knowing you’ve
       taken the right steps to safeguard yourself and your
       computer.
 Anybody      can be a threat to TVA’s
    computer security. Typically, these threats
    lie in three categories:

   Cyber Terrorism
   Hacktivism
   Scam Artists
 Cyber  Terrorism: The use of internet based
  attacks in terrorist activities
 Recent news of Chinese Terrorists
  suspected of hacking US government and
  business facilities
 Hacktivism: The use of computers and computer
  networks to promote political ends, chiefly free
  speech, human rights, and information ethics.
 Anonymous
   • Freedom fighters of the internet (digital robin
     hood)
   • Known for hacking many government websites
   • Janurary 25, 2013 Anonymous hacked the
     United States Commision website
 Scam   Artists can be anyone from a loosely
  organized group to one of your fellow
  employees.
 Scams typically intend to steal valuable
  information related to identification such as:
  social security numbers, credit card numbers,
  and passwords.
 So  why does TVA need to be worried?
 TVA controls many valuable resources and
  the power to the majority of the Tennessee
  Valley. Reasons to target TVA include:
  • Making a political statement
  • Terrorist attacks on nuclear facilities
  • Steal employee information

More Related Content

What's hot

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Balvant Biradar
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
Habib Siddiqui
 
Hacking
Hacking Hacking
Hacking
thajmohammed
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Fraz Ali
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
HadilAlHaj
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Aurobindo Nayak
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
CyberGuider IT Services Inc.
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Digital law
Digital lawDigital law
Digital law
Alieyn_
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
lydneat
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Rushabh Shah
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Muktadir Shoaib
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
RAKESH SHARMA
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
Irvin Costa
 

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Hacking
Hacking Hacking
Hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Digital law
Digital lawDigital law
Digital law
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 

Viewers also liked

Swami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwajSwami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwaj
Arvind Bhardwaj
 
Vivekananda's ideas on education
Vivekananda's ideas on educationVivekananda's ideas on education
Vivekananda's ideas on educationedusparx
 
Swami vivekananda
Swami vivekanandaSwami vivekananda
Swami vivekananda
Sriloy Mohanty
 
Swami Vivekananda History.ppt
Swami Vivekananda History.pptSwami Vivekananda History.ppt
Swami Vivekananda History.pptShama
 
Swami Vivekananda
Swami VivekanandaSwami Vivekananda
Swami Vivekananda
indrakumar
 
Swami vivekananda
Swami vivekananda Swami vivekananda
Swami vivekananda
GTClub
 

Viewers also liked (6)

Swami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwajSwami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwaj
 
Vivekananda's ideas on education
Vivekananda's ideas on educationVivekananda's ideas on education
Vivekananda's ideas on education
 
Swami vivekananda
Swami vivekanandaSwami vivekananda
Swami vivekananda
 
Swami Vivekananda History.ppt
Swami Vivekananda History.pptSwami Vivekananda History.ppt
Swami Vivekananda History.ppt
 
Swami Vivekananda
Swami VivekanandaSwami Vivekananda
Swami Vivekananda
 
Swami vivekananda
Swami vivekananda Swami vivekananda
Swami vivekananda
 

Similar to O'leary Cyber Secutiry

Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
rishith23
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
Adarsh
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Ashwini831102
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
Atika Zaimi
 
C3 Cyber
C3 CyberC3 Cyber
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero
 

Similar to O'leary Cyber Secutiry (20)

Brooks18
Brooks18Brooks18
Brooks18
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 

O'leary Cyber Secutiry

  • 1. Day 1 Quiz Study Slides
  • 2.  Cyber Security is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access
  • 3. National Cyber Security Awareness campaign (stop.think.connect)  Stop • Before using the internet consider the risks and learn to spot potential problems  Think • Take a moment to be certain the path ahead is clear. Consider how your actions online could impact your safety, or your family’s  Connect • Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.
  • 4.  Anybody can be a threat to TVA’s computer security. Typically, these threats lie in three categories:  Cyber Terrorism  Hacktivism  Scam Artists
  • 5.  Cyber Terrorism: The use of internet based attacks in terrorist activities  Recent news of Chinese Terrorists suspected of hacking US government and business facilities
  • 6.  Hacktivism: The use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics.  Anonymous • Freedom fighters of the internet (digital robin hood) • Known for hacking many government websites • Janurary 25, 2013 Anonymous hacked the United States Commision website
  • 7.  Scam Artists can be anyone from a loosely organized group to one of your fellow employees.  Scams typically intend to steal valuable information related to identification such as: social security numbers, credit card numbers, and passwords.
  • 8.  So why does TVA need to be worried?  TVA controls many valuable resources and the power to the majority of the Tennessee Valley. Reasons to target TVA include: • Making a political statement • Terrorist attacks on nuclear facilities • Steal employee information