SlideShare a Scribd company logo
Module #1:
Module #1:
Introduction to Cyber Security
Introduction to Cyber Security
Estimated time for Module 1 is 3 minutes
What is Cyber Security?
What is Cyber Security?
Cyber or Computer Security is the
protection of computing systems and
the data that these systems store or access.
These systems include:
PC’s
Laptops
SmartPhones
Mobile Devices
Printers
Why is Computer Security
Why is Computer Security
Important?
Important?
Computer Security allows the City of Albuquerque to
carry out its mission by:
• Enabling staff to carry out their jobs,
• Decreases the threat of current and future vulnerabilities
• Supporting critical business processes
• Protecting personal and sensitive information
Why do I need to know about
Why do I need to know about
Cyber Security?
Cyber Security?
It is estimated that 10% of security safeguards are technical in
nature. Firewalls and Intrusion Detection devices are a few
devices that can help prevent approximately 10% of security
threats.
The additional 90% of safeguards rely on each of us. By
understanding and adhering to these safeguards, we can
reduce or eliminate most cyber security threats.
Example: Locking your car doors is the 10%. Making sure
nothing of value is left on the seat, windows are rolled up and
parking in a safe area account for the remaining 90%.
The CIA of Cyber Security
The CIA of Cyber Security
There are many reasons why you should protect
the information you use on your computer.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy
(information integrity)
Availability: Making sure that your information is available when
you need it (by making back-up copies and, if
appropriate, storing the back-up copies off-site)
What does this mean to me?
What does this mean to me?
This means that everyone who uses a computer
or mobile device needs to understand how to
keep their computer, device and data secure.
Information Technology Security is
Everyone’s responsibility
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
The Answer is E, All of the above
Computer Security allow us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #2: The Integrity of information means:
A. Ensuring that your information remains confidential and only
those who should access that information, can
B. Knowing that no one has been able to change your information,
so you can depend on its accuracy.
C. Making sure that your information is available when you need it
(by making back-up copies and, if appropriate, storing the back-
up copies off-site)
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
The answer is B. Knowing that your information has not
been changed.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy.
Availability: Making sure that your information is available when you
need it (by making back-up copies and, if appropriate, storing
the back-up copies off-site)
This concludes Module 1: Introduction
This concludes Module 1: Introduction
to Cyber Security
to Cyber Security
Continue on to module 2: Sensitive Data
Module 2 will provide information on Personal
Identifiable Information or PII and best practices in
protecting this data from theft.

More Related Content

PPT
Intro to Cyber Security Final in the field of CS
PPT
Module1_Intro to Security_Final.ppt
PPT
Module 1 :Introduction to Cyber Security
PPT
Module1_Intro to Security_Final.ppt
PPT
Module1_Intro to Security_Finallllllll.ppt
PPT
Module1_Intro to Security and cyber challenges_Final.ppt
PPTX
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
PDF
Cyber security
Intro to Cyber Security Final in the field of CS
Module1_Intro to Security_Final.ppt
Module 1 :Introduction to Cyber Security
Module1_Intro to Security_Final.ppt
Module1_Intro to Security_Finallllllll.ppt
Module1_Intro to Security and cyber challenges_Final.ppt
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
Cyber security

Similar to Module1_Intro to Security1111111_Final.ppt (20)

PPTX
gagan internship.pptx
PPTX
Importance of Cyber_Security_(Shivling).pptx
PPTX
PPTX
Cyber Security and data Security for all.pptx
PDF
cyber security.pdf
PDF
Cyber security
PDF
Course Slides for CS_6035_01_Security Mindset (1)
PDF
W1-2 Module 1 Introduction to Cyber Security PPT.pdf
DOCX
Instructor_manual_for_principles_of_information_security_7th_edition.
PPTX
Cysecc.pptx
PPTX
Introduction to intelligence cybersecurity_2
PDF
CYBER SECURITY (R18A0521).pdf
PPTX
Network Security Basics in networking to learn
PPTX
Cyber-security Vs Information Security.pptx
PPTX
Introduction Of Cyber Security in 2024.pptx
PDF
The Importance of Cyber Security.pptx (1).pdf
PDF
The Importance of Cyber Security.pptx.pdf
PDF
A Systematic Literature Review On The Cyber Security
PPTX
Computer Security
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
gagan internship.pptx
Importance of Cyber_Security_(Shivling).pptx
Cyber Security and data Security for all.pptx
cyber security.pdf
Cyber security
Course Slides for CS_6035_01_Security Mindset (1)
W1-2 Module 1 Introduction to Cyber Security PPT.pdf
Instructor_manual_for_principles_of_information_security_7th_edition.
Cysecc.pptx
Introduction to intelligence cybersecurity_2
CYBER SECURITY (R18A0521).pdf
Network Security Basics in networking to learn
Cyber-security Vs Information Security.pptx
Introduction Of Cyber Security in 2024.pptx
The Importance of Cyber Security.pptx (1).pdf
The Importance of Cyber Security.pptx.pdf
A Systematic Literature Review On The Cyber Security
Computer Security
Computer Securityyyyyyyy - Chapter 1.ppt
Ad

Recently uploaded (20)

PPTX
BODY FLUIDS AND CIRCULATION class 11 .pptx
PPTX
The Minerals for Earth and Life Science SHS.pptx
PPTX
Hypertension_Training_materials_English_2024[1] (1).pptx
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
Pharmacology of Autonomic nervous system
PPTX
perinatal infections 2-171220190027.pptx
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
PPTX
Introcution to Microbes Burton's Biology for the Health
PPTX
BIOMOLECULES PPT........................
PPTX
Science Quipper for lesson in grade 8 Matatag Curriculum
PPT
1. INTRODUCTION TO EPIDEMIOLOGY.pptx for community medicine
PDF
Placing the Near-Earth Object Impact Probability in Context
PPTX
Biomechanics of the Hip - Basic Science.pptx
PPTX
CORDINATION COMPOUND AND ITS APPLICATIONS
PDF
Biophysics 2.pdffffffffffffffffffffffffff
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PPTX
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
PPTX
Application of enzymes in medicine (2).pptx
BODY FLUIDS AND CIRCULATION class 11 .pptx
The Minerals for Earth and Life Science SHS.pptx
Hypertension_Training_materials_English_2024[1] (1).pptx
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
. Radiology Case Scenariosssssssssssssss
Pharmacology of Autonomic nervous system
perinatal infections 2-171220190027.pptx
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
Introcution to Microbes Burton's Biology for the Health
BIOMOLECULES PPT........................
Science Quipper for lesson in grade 8 Matatag Curriculum
1. INTRODUCTION TO EPIDEMIOLOGY.pptx for community medicine
Placing the Near-Earth Object Impact Probability in Context
Biomechanics of the Hip - Basic Science.pptx
CORDINATION COMPOUND AND ITS APPLICATIONS
Biophysics 2.pdffffffffffffffffffffffffff
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
Application of enzymes in medicine (2).pptx
Ad

Module1_Intro to Security1111111_Final.ppt

  • 1. Module #1: Module #1: Introduction to Cyber Security Introduction to Cyber Security Estimated time for Module 1 is 3 minutes
  • 2. What is Cyber Security? What is Cyber Security? Cyber or Computer Security is the protection of computing systems and the data that these systems store or access. These systems include: PC’s Laptops SmartPhones Mobile Devices Printers
  • 3. Why is Computer Security Why is Computer Security Important? Important? Computer Security allows the City of Albuquerque to carry out its mission by: • Enabling staff to carry out their jobs, • Decreases the threat of current and future vulnerabilities • Supporting critical business processes • Protecting personal and sensitive information
  • 4. Why do I need to know about Why do I need to know about Cyber Security? Cyber Security? It is estimated that 10% of security safeguards are technical in nature. Firewalls and Intrusion Detection devices are a few devices that can help prevent approximately 10% of security threats. The additional 90% of safeguards rely on each of us. By understanding and adhering to these safeguards, we can reduce or eliminate most cyber security threats. Example: Locking your car doors is the 10%. Making sure nothing of value is left on the seat, windows are rolled up and parking in a safe area account for the remaining 90%.
  • 5. The CIA of Cyber Security The CIA of Cyber Security There are many reasons why you should protect the information you use on your computer. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy (information integrity) Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 6. What does this mean to me? What does this mean to me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is Everyone’s responsibility
  • 7. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 8. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: The Answer is E, All of the above Computer Security allow us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 9. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #2: The Integrity of information means: A. Ensuring that your information remains confidential and only those who should access that information, can B. Knowing that no one has been able to change your information, so you can depend on its accuracy. C. Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back- up copies off-site)
  • 10. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security The answer is B. Knowing that your information has not been changed. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy. Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 11. This concludes Module 1: Introduction This concludes Module 1: Introduction to Cyber Security to Cyber Security Continue on to module 2: Sensitive Data Module 2 will provide information on Personal Identifiable Information or PII and best practices in protecting this data from theft.