SlideShare a Scribd company logo
Module #1:
Module #1:
Introduction to Cyber Security
Introduction to Cyber Security
Estimated time for Module 1 is 3 minutes
What is Cyber Security?
What is Cyber Security?
Cyber or Computer Security is the
protection of computing systems and
the data that these systems store or access.
These systems include:
PC’s
Laptops
SmartPhones
Mobile Devices
Printers
Why is Computer Security
Why is Computer Security
Important?
Important?
Computer Security allows the City of Albuquerque to
carry out its mission by:
• Enabling staff to carry out their jobs,
• Decreases the threat of current and future vulnerabilities
• Supporting critical business processes
• Protecting personal and sensitive information
Why do I need to know about
Why do I need to know about
Cyber Security?
Cyber Security?
It is estimated that 10% of security safeguards are technical in
nature. Firewalls and Intrusion Detection devices are a few
devices that can help prevent approximately 10% of security
threats.
The additional 90% of safeguards rely on each of us. By
understanding and adhering to these safeguards, we can
reduce or eliminate most cyber security threats.
Example: Locking your car doors is the 10%. Making sure
nothing of value is left on the seat, windows are rolled up and
parking in a safe area account for the remaining 90%.
The CIA of Cyber Security
The CIA of Cyber Security
There are many reasons why you should protect
the information you use on your computer.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy
(information integrity)
Availability: Making sure that your information is available when
you need it (by making back-up copies and, if
appropriate, storing the back-up copies off-site)
What does this mean to me?
What does this mean to me?
This means that everyone who uses a computer
or mobile device needs to understand how to
keep their computer, device and data secure.
Information Technology Security is
Everyone’s responsibility
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
The Answer is E, All of the above
Computer Security allow us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #2: The Integrity of information means:
A. Ensuring that your information remains confidential and only
those who should access that information, can
B. Knowing that no one has been able to change your information,
so you can depend on its accuracy.
C. Making sure that your information is available when you need it
(by making back-up copies and, if appropriate, storing the back-
up copies off-site)
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
The answer is B. Knowing that your information has not
been changed.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy.
Availability: Making sure that your information is available when you
need it (by making back-up copies and, if appropriate, storing
the back-up copies off-site)
This concludes Module 1: Introduction
This concludes Module 1: Introduction
to Cyber Security
to Cyber Security
Continue on to module 2: Sensitive Data
Module 2 will provide information on Personal
Identifiable Information or PII and best practices in
protecting this data from theft.

More Related Content

PPT
Intro to Cyber Security Final in the field of CS
PPT
Module1_Intro to Security and cyber challenges_Final.ppt
PPT
Module1_Intro to Security_Final.ppt
PPT
Module 1 :Introduction to Cyber Security
PPT
Module1_Intro to Security_Final.ppt
PPT
Module1_Intro to Security_Finallllllll.ppt
PPTX
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
PDF
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Intro to Cyber Security Final in the field of CS
Module1_Intro to Security and cyber challenges_Final.ppt
Module1_Intro to Security_Final.ppt
Module 1 :Introduction to Cyber Security
Module1_Intro to Security_Final.ppt
Module1_Intro to Security_Finallllllll.ppt
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers

Similar to Cyber Security For Computer Science & Engineering.ppt (20)

PPTX
secued cloud ppt
PPTX
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PPTX
Secued Cloud
PPTX
02-overview.pptx
PDF
Cyber Safety Class 4 Computers Worksheet.pdf
PPTX
secued cloud
PPTX
secued cloud ppt
PPT
Module 5 security
 
PPTX
Career in cyber security
PDF
Will Internet of Things (IoT) be secure enough?
PPTX
Security in IT (data and cyber security)
PPTX
security in it (data and cyber security)
PDF
Encrytpion information security last stand
PDF
Kel1 Computer security - UC Santa Cruz's.pdf
PDF
Concept Of Cyber Security.pdf
PDF
Small Business Administration Recommendations
PDF
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
PPT
Information Technology Security Basics
DOCX
ISYS 2394 Business Globalisation and Business IT.docx
secued cloud ppt
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
Secued Cloud
02-overview.pptx
Cyber Safety Class 4 Computers Worksheet.pdf
secued cloud
secued cloud ppt
Module 5 security
 
Career in cyber security
Will Internet of Things (IoT) be secure enough?
Security in IT (data and cyber security)
security in it (data and cyber security)
Encrytpion information security last stand
Kel1 Computer security - UC Santa Cruz's.pdf
Concept Of Cyber Security.pdf
Small Business Administration Recommendations
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
Information Technology Security Basics
ISYS 2394 Business Globalisation and Business IT.docx
Ad

Recently uploaded (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Artificial Intelligence
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
communication and presentation skills 01
PPT
introduction to datamining and warehousing
PDF
PPT on Performance Review to get promotions
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
introduction to high performance computing
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
UNIT - 3 Total quality Management .pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Artificial Intelligence
Exploratory_Data_Analysis_Fundamentals.pdf
86236642-Electric-Loco-Shed.pdf jfkduklg
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
communication and presentation skills 01
introduction to datamining and warehousing
PPT on Performance Review to get promotions
Automation-in-Manufacturing-Chapter-Introduction.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Information Storage and Retrieval Techniques Unit III
R24 SURVEYING LAB MANUAL for civil enggi
Safety Seminar civil to be ensured for safe working.
introduction to high performance computing
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
UNIT - 3 Total quality Management .pptx
Ad

Cyber Security For Computer Science & Engineering.ppt

  • 1. Module #1: Module #1: Introduction to Cyber Security Introduction to Cyber Security Estimated time for Module 1 is 3 minutes
  • 2. What is Cyber Security? What is Cyber Security? Cyber or Computer Security is the protection of computing systems and the data that these systems store or access. These systems include: PC’s Laptops SmartPhones Mobile Devices Printers
  • 3. Why is Computer Security Why is Computer Security Important? Important? Computer Security allows the City of Albuquerque to carry out its mission by: • Enabling staff to carry out their jobs, • Decreases the threat of current and future vulnerabilities • Supporting critical business processes • Protecting personal and sensitive information
  • 4. Why do I need to know about Why do I need to know about Cyber Security? Cyber Security? It is estimated that 10% of security safeguards are technical in nature. Firewalls and Intrusion Detection devices are a few devices that can help prevent approximately 10% of security threats. The additional 90% of safeguards rely on each of us. By understanding and adhering to these safeguards, we can reduce or eliminate most cyber security threats. Example: Locking your car doors is the 10%. Making sure nothing of value is left on the seat, windows are rolled up and parking in a safe area account for the remaining 90%.
  • 5. The CIA of Cyber Security The CIA of Cyber Security There are many reasons why you should protect the information you use on your computer. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy (information integrity) Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 6. What does this mean to me? What does this mean to me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is Everyone’s responsibility
  • 7. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 8. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: The Answer is E, All of the above Computer Security allow us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 9. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #2: The Integrity of information means: A. Ensuring that your information remains confidential and only those who should access that information, can B. Knowing that no one has been able to change your information, so you can depend on its accuracy. C. Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back- up copies off-site)
  • 10. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security The answer is B. Knowing that your information has not been changed. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy. Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 11. This concludes Module 1: Introduction This concludes Module 1: Introduction to Cyber Security to Cyber Security Continue on to module 2: Sensitive Data Module 2 will provide information on Personal Identifiable Information or PII and best practices in protecting this data from theft.