3. But who initiates a cyber threat/attack?
A type of Hacker
CYBER=
+
SECURITY=
The digital world or the online realm. This relates to the
network and communication between used devices.
How we safeguard and protect ourselves from harm
CYBERSECURITY=
The practice of defending our computers, servers,
mobile devices, electronic systems, and any kind
of network, from malicious attacks.
The opposite = ??
4. THEBLACK
HATHACKER
“I want to access your data to harm you”
• Engage in hacking activities with malicious intent
• Exploit vulnerabilities in computer systems,
networks, or software
• Motivated by personal gain, financial benefits, or
stealing sensitive information
• Cause damage or disrupt services
• Actions are illegal and unethical
5. THEWHITE
HATHACKER
“Someone has to save the day! I am the good guy”
• Also known as ethical hackers or security
researchers
• Use hacking skills for positive purposes
• Identify vulnerabilities in systems, networks, or
software
• Help organizations strengthen their security
• Conduct security assessments with permission
• Uncover weaknesses and provide
recommendations for improving cybersecurity
6. • Be aware of the risks of sharing information
online.
• Manage your online accounts and passwords:
⚬ Use different passwords across multiple
accounts.
⚬ Lock your devices to prevent unauthorized
access.
⚬ Create long and memorable passwords.
• Install antivirus software.
• Be cautious of suspicious links and emails.
HOWTOBE
SAFEFROM
CYBERATTACKS
WHAT
HAPPENSTO
YOUUNDERA
CYBER
ATTACK?
• Financial losses for individuals and
organizations
• Theft of personal and sensitive information
• Damage to reputation and trust
• Disruption of services or operations
• Potential legal and regulatory consequences
7. RECAP:OURKEYTAKEAWAYS
TODAY
What is Cybersecurity?
Cypbersecurity is ...
Who is a white hat hacker?
A white hat hacker is someone
who....
Who is a black hat hacker?
A white hat hacker is someone who...
How can you be safe online?
To be safe online....
01 02 03
05
04
**What is the difference between the
white hat hacker and the black hat
hacker?
8. **ONE STEP FURTHER
Unauthorized access to your data
Considered cybercriminals as they do not
follow rules when it comes to system hacking.
They exploit security flaws for their own
personal gain
Authorized access
Considered the good guys because they
follow the rules when it comes to hacking
into systems.
They do not exploit security flaws but rather
identify them to build stronger systems