Cybersecurity
Master IAO (TA)
Plan
• What is cybersecurity?
• Why Computer Security the demand for specialists is growing?
• Worldwide work in the field of cybersecurity capacity building
• What is the future of computer security in the Modern World?
• Which to work in cybersecurity to study in the field?
• Conclusion
What is cybersecurity?
• Cybercrime is today’s fastest-growing form of criminal activity. The concept
associated with cyber security is that it protects important data and
information from strangers and hackers. Cyber security professionals are
responsible for protecting servers, networks, and computer systems. With the
confidentiality of this information in mind, these experts make sure that only
authorized people can access the information.
What is information security?
• Information security from any unauthorized use, access, alteration or removal
of information based on protection. He specializes in data security. It helps to
protect against data corruption or theft. On the computer all that is stored is
called data, which is converted into information when they are transferred.
Every information is a property. Once the information is processed, the
companies make any mistakes requires information security to protect against
use and tampering.
Cybercrime and Business
• Cybercrime is nowadays fastest-growing from of criminal activity.
• According to Accenture, the cost of cybercrimes to businesses will reach
$5.2 trillion within the next five years.
• According to Hiscox, an insurance carrier, the average cost of cyberattacks
to small businesses is $200,000 on average
• McAfee, an anti-virus provider, reports that 480 new high- tech threats are
introduced every minute
Current State of Cybercrime
• In 2017, Equifax, one of the largest consumer credit agency, was attacked.
• Hackers stole sensitive information of 143 million people.
• The incident cost Equifax $600 million.
• In 2017, Uber reported a data breach including information of 600,000
drivers and $7 million Uber users worldwide.
• Uber paid $148 million in regulatory fines.
Be Continued…..
• In 2018, Marriot reported that data of up to 383 million guests were
exposed. Marriot paid $200 million in fines
• In 2018, Aadhaar, the world’s largest government database was breached
and information about 1 billion people was exposed.
The demand for cyber and
information security professionals
is growing
In the current situation, Cybersecurity and Information.
The demand for security professionals is huge.
This is because of the use of the Internet increase with
extensive use of the Internet, more cases of abuse of the
rules of use this is due to the fact that these specialists
meets more requirements.
Bureau of Labor Statistics.
According to the data, in 2012–2022 information
security work
The growth rate of seats is 57.6% percent are other
professions much higher than the average fast.
Hackers
White hat hacker / Ethical hacker
Grey hat hacker
Black hat hacker
Tools in Cybersecurity/Cybercrime
• Software: Kali Linux applications, Exploits
• There are many platforms to get exploits
• Hardware: GPU, Hack5 package, rubber ducky
Cybersecurity.pptx
Cybersecurity.pptx
Cybersecurity.pptx
Multi-Factor Authentication
• Multi-factor authentication is a method that grants user access after presenting
two or more pieces of evidence proving his/her identity.
• Example: to withdraw money from ATM, you need correct card and
password combination.
• Many schools, companies, online services use two-factor authentication.
• Example: Password + code sent to your mobile
Good Browsing habits:
• Chrome: Incognito mode
• Clear DNS Cache: delete all unnecessary Ips, Cmd / ipconfig / Flushdns
• Antivirus
• Password manager
• Ad blocker
• Avoid danger websites, links, files
• Use VPN
• Check app permissions
In what areas do you need to study to work in
cybersecurity
• Information security analyst
• Information security coordinator
• Cybersecurity analyst
• Information security manager
• Information security engineer
• Cybersecurity security analyst
• Software security specialist
• Cryptographer
Conclusion
• In an organization, to accomplish an effective Cyber Security approach, the
peoples, processes, computers, networks and technology of an organization
either big or small should be equally responsible. If all component will
complement each other then, it is very much possible to stand against the
tough cyber threat and attacks.
Cybersecurity.pptx

More Related Content

PPTX
Cyber Security
PPTX
Cyber Security and data Security for all.pptx
PDF
Cybersecurity: Protecting the Digital Frontier
PDF
Cybersecurity Essentials: Safeguarding the Digital World
PPTX
Cyber crime and Information Security.pptx
PPTX
cybersecurity and its importance in digital era
PPTX
Digital literacy lecture 2 data security.pptx
PPTX
An An Exploration Into the Cyber Security
Cyber Security
Cyber Security and data Security for all.pptx
Cybersecurity: Protecting the Digital Frontier
Cybersecurity Essentials: Safeguarding the Digital World
Cyber crime and Information Security.pptx
cybersecurity and its importance in digital era
Digital literacy lecture 2 data security.pptx
An An Exploration Into the Cyber Security

Similar to Cybersecurity.pptx (20)

PPT
Ch01 Introduction to Security
PDF
Cyber security for Developers
PDF
Career guide on cyber security
PDF
The Importance of Cyber Security.pptx (1).pdf
PDF
The Importance of Cyber Security.pptx.pdf
PDF
Introduction to Cybersecurity
PPTX
Introduction-to-Cybersecurit57hhfcbbcxxx
PPTX
unit -ii security1.pptx for Information system management
PPTX
CyberSecurity.pptx
PPTX
Cybersecurity Training For Sales People.pptx
PPTX
Cyber security
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PDF
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
PPTX
Introduction to intelligence cybersecurity_2
PPTX
Starting your Career in Information Security
PDF
Cybersecurity solution-guide
DOCX
What you need to know about cyber security
PPTX
What is Cyber & information security.pptx
PDF
introduction to cyber security
PPTX
Introduction to cyber security
Ch01 Introduction to Security
Cyber security for Developers
Career guide on cyber security
The Importance of Cyber Security.pptx (1).pdf
The Importance of Cyber Security.pptx.pdf
Introduction to Cybersecurity
Introduction-to-Cybersecurit57hhfcbbcxxx
unit -ii security1.pptx for Information system management
CyberSecurity.pptx
Cybersecurity Training For Sales People.pptx
Cyber security
100+ Cyber Security Interview Questions and Answers in 2022
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
Introduction to intelligence cybersecurity_2
Starting your Career in Information Security
Cybersecurity solution-guide
What you need to know about cyber security
What is Cyber & information security.pptx
introduction to cyber security
Introduction to cyber security
Ad

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Configure Apache Mutual Authentication
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Five Habits of High-Impact Board Members
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Developing a website for English-speaking practice to English as a foreign la...
Chapter 5: Probability Theory and Statistics
A contest of sentiment analysis: k-nearest neighbor versus neural network
Configure Apache Mutual Authentication
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Zenith AI: Advanced Artificial Intelligence
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Flame analysis and combustion estimation using large language and vision assi...
Module 1.ppt Iot fundamentals and Architecture
Five Habits of High-Impact Board Members
Final SEM Unit 1 for mit wpu at pune .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
2018-HIPAA-Renewal-Training for executives
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
OpenACC and Open Hackathons Monthly Highlights July 2025
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Architecture types and enterprise applications.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
Enhancing emotion recognition model for a student engagement use case through...
Developing a website for English-speaking practice to English as a foreign la...
Ad

Cybersecurity.pptx

  • 2. Plan • What is cybersecurity? • Why Computer Security the demand for specialists is growing? • Worldwide work in the field of cybersecurity capacity building • What is the future of computer security in the Modern World? • Which to work in cybersecurity to study in the field? • Conclusion
  • 3. What is cybersecurity? • Cybercrime is today’s fastest-growing form of criminal activity. The concept associated with cyber security is that it protects important data and information from strangers and hackers. Cyber security professionals are responsible for protecting servers, networks, and computer systems. With the confidentiality of this information in mind, these experts make sure that only authorized people can access the information.
  • 4. What is information security? • Information security from any unauthorized use, access, alteration or removal of information based on protection. He specializes in data security. It helps to protect against data corruption or theft. On the computer all that is stored is called data, which is converted into information when they are transferred. Every information is a property. Once the information is processed, the companies make any mistakes requires information security to protect against use and tampering.
  • 5. Cybercrime and Business • Cybercrime is nowadays fastest-growing from of criminal activity. • According to Accenture, the cost of cybercrimes to businesses will reach $5.2 trillion within the next five years. • According to Hiscox, an insurance carrier, the average cost of cyberattacks to small businesses is $200,000 on average • McAfee, an anti-virus provider, reports that 480 new high- tech threats are introduced every minute
  • 6. Current State of Cybercrime • In 2017, Equifax, one of the largest consumer credit agency, was attacked. • Hackers stole sensitive information of 143 million people. • The incident cost Equifax $600 million. • In 2017, Uber reported a data breach including information of 600,000 drivers and $7 million Uber users worldwide. • Uber paid $148 million in regulatory fines.
  • 7. Be Continued….. • In 2018, Marriot reported that data of up to 383 million guests were exposed. Marriot paid $200 million in fines • In 2018, Aadhaar, the world’s largest government database was breached and information about 1 billion people was exposed.
  • 8. The demand for cyber and information security professionals is growing In the current situation, Cybersecurity and Information. The demand for security professionals is huge. This is because of the use of the Internet increase with extensive use of the Internet, more cases of abuse of the rules of use this is due to the fact that these specialists meets more requirements. Bureau of Labor Statistics. According to the data, in 2012–2022 information security work The growth rate of seats is 57.6% percent are other professions much higher than the average fast.
  • 9. Hackers White hat hacker / Ethical hacker Grey hat hacker Black hat hacker
  • 10. Tools in Cybersecurity/Cybercrime • Software: Kali Linux applications, Exploits • There are many platforms to get exploits • Hardware: GPU, Hack5 package, rubber ducky
  • 14. Multi-Factor Authentication • Multi-factor authentication is a method that grants user access after presenting two or more pieces of evidence proving his/her identity. • Example: to withdraw money from ATM, you need correct card and password combination. • Many schools, companies, online services use two-factor authentication. • Example: Password + code sent to your mobile
  • 15. Good Browsing habits: • Chrome: Incognito mode • Clear DNS Cache: delete all unnecessary Ips, Cmd / ipconfig / Flushdns • Antivirus • Password manager • Ad blocker • Avoid danger websites, links, files • Use VPN • Check app permissions
  • 16. In what areas do you need to study to work in cybersecurity • Information security analyst • Information security coordinator • Cybersecurity analyst • Information security manager • Information security engineer • Cybersecurity security analyst • Software security specialist • Cryptographer
  • 17. Conclusion • In an organization, to accomplish an effective Cyber Security approach, the peoples, processes, computers, networks and technology of an organization either big or small should be equally responsible. If all component will complement each other then, it is very much possible to stand against the tough cyber threat and attacks.

Editor's Notes

  • #3: Qu'est-ce que la cybersécurité ? Pourquoi la demande de spécialistes en sécurité informatique est-elle croissante ? Travail mondial dans le domaine du renforcement des capacités en cybersécurité Quel est l'avenir de la sécurité informatique dans le monde moderne ? Lequel travailler en cybersécurité pour étudier sur le terrain ?
  • #4: La cybercriminalité est aujourd'hui la forme d'activité criminelle qui connaît la croissance la plus rapide. Le concept associé à la cybersécurité est qu'il protège les données et informations importantes des étrangers et des pirates. Les professionnels de la cybersécurité sont responsables de la protection des serveurs, des réseaux et des systèmes informatiques. Gardant à l'esprit la confidentialité de ces informations, ces experts s'assurent que seules les personnes autorisées peuvent y accéder.
  • #5: Sécurité des informations contre toute utilisation, accès, modification ou suppression non autorisés d'informations basées sur la protection. Il est spécialisé dans la sécurité des données. Il aide à protéger contre la corruption ou le vol de données. Sur l'ordinateur, tout ce qui est stocké s'appelle des données, qui sont converties en informations lorsqu'elles sont transférées. Chaque information est une propriété. Une fois que l'information est traitée, les entreprises commettent d'éventuelles erreurs en matière de sécurité de l'information pour se protéger contre l'utilisation et la falsification.
  • #6: La cybercriminalité connaît aujourd'hui la croissance la plus rapide à partir des activités criminelles. Selon Accenture, le coût des cybercrimes pour les entreprises atteindra 5 200 milliards de dollars au cours des cinq prochaines années. Selon Hiscox, une compagnie d'assurance, le coût moyen des cyberattaques pour les petites entreprises est de 200 000 $ en moyenne McAfee, un fournisseur d'antivirus, rapporte que 480 nouvelles menaces de haute technologie sont introduites chaque minute
  • #7: État actuel de la cybercriminalité En 2017, Equifax, l'une des plus grandes agences de crédit à la consommation, a été attaquée. Les pirates ont volé les informations sensibles de 143 millions de personnes. L'incident a coûté 600 millions de dollars à Equifax. En 2017, Uber a signalé une violation de données, y compris des informations sur 600 000 chauffeurs et 7 millions de dollars d'utilisateurs d'Uber dans le monde. Uber a payé 148 millions de dollars d'amendes réglementaires.
  • #8: En 2018, Marriot a signalé que les données de jusqu'à 383 millions de clients avaient été exposées. Marriot a payé 200 millions de dollars d'amendes En 2018, Aadhaar, la plus grande base de données gouvernementale au monde, a été violée et des informations sur 1 milliard de personnes ont été exposées.
  • #9: La demande de professionnels de la cybersécurité et de la sécurité de l'information augmente: Dans la situation actuelle, Cybersécurité et Information. La demande de professionnels de la sécurité est énorme. Cela est dû à l'augmentation de l'utilisation d'Internet avec une utilisation intensive d'Internet, plus de cas d'abus des règles d'utilisation cela est dû au fait que ces spécialistes répondent à plus d'exigences. Bureau des statistiques du travail. Selon les données, en 2012-2022, le travail de sécurité de l'information, Le taux de croissance des places est de 57,6% pour cent sont d'autres professions très supérieures à la moyenne rapide.
  • #11: Outils en cybersécurité/cybercriminalité
  • #15: L'authentification multifacteur est une méthode qui accorde l'accès à l'utilisateur après avoir présenté deux éléments de preuve ou plus prouvant son identité. Exemple : pour retirer de l'argent à un distributeur automatique, vous avez besoin d'une combinaison correcte de carte et de mot de passe. De nombreuses écoles, entreprises, services en ligne utilisent l'authentification à deux facteurs. Exemple : Mot de passe + code envoyé sur votre mobile
  • #16: Bonnes habitudes de navigation :
  • #17: Dans quels domaines devez-vous étudier pour travailler dans la cybersécurité
  • #18: Dans une organisation, pour accomplir une approche de cybersécurité efficace, les personnes, les processus, les ordinateurs, les réseaux et la technologie d'une organisation, grande ou petite, doivent être également responsables. Si tous les composants se complètent alors, il est tout à fait possible de résister à la cybermenace et aux attaques difficiles.