2. WHAT IS CYBER SECURITY ?
Cyber Security is the practice
of defending computers
servers, mobile devices,
electronics systems, networks
and data from malicious
attacks It also known as
Information technology
security or electronic
information security. The term
applies in a variety of context,
from business to mobile
computing.
3. MAJOR AREAS COVERED IN CYBER
SECURITY
A. Application Security
B. Information Security
C. Disaster recovery
D. Network Security
4. WHY CYBERSECURITY IS REQUIRED?
The core functionality of cyber security involves protecting
information systems from major cyber threats.
FORMS OF CYBERTHREATS
1. Application attacks
2. Malware
3. Ransom ware
4. Phishing
5. Exploit kits
5. NEED FOR INFORMATION SECURITY
The purpose of information security management is to ensure
business continuity and reduce business damage by preventing and
minimizing the impact of security incidents.
THREATS TO INFORMATION SYSTEMS :
A threat is anything (man made or act of nature ) that has the
potential to cause of harm. A threat is also defined as “ a potential for
violation of security, which exists when there is a circumstance,
capability, action or event that could breach security and cause
harm.
7. HOW TO MAINTAIN EFFECTIVE
CYBER SECURITY
Historically, organizations and governments have taken a reactive “
point product” approach to combating cyber threats, cobbling together
individual security technologies- one on top of another – to protect
their networks and valuable data within them. Not only in this method
expensive and complex, but news of devastating cyber breaches
continues to dominate headlines, rendering this method expensive and
complex, but news of devastating cyber breaches continuous to
dominate headlines, rendering, this method ineffective. In fact, given
the pervasiveness of data breaches, the topic of cyber security has
catapulted to the top of the priority list for boards of directors, which
are seeking a far less risky way.
8. REFERENCE: “Cyber Security”. 3g E learning, 2018 (International)
REFERENCE: “Information Technology fundamentals”. Velasco,
Londren, Jimcyville Publications, inc. 2018 (local)