Please enable JavaScript.
Coggle requires JavaScript to display documents.
Module 3.6 Cyber Security - Coggle Diagram
Module 3.6 Cyber Security
type of cyber threats
cyber attacks: involve the gathering of politically
motivated information
cybercrimes: a single perpetrator or group that
targets the system for financial gain or to cause disruption
Cyberterrorism : aims to weaken electronic systems so as to
cause panic or fear
Risk of cyber threat an cyber attack with the advancement of new technology
Importance to focus on cyber security
to protect the valuable data
minimize the associate risks
Cyber Security
the way of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks
also known as information technology security
or electronic information security
Categories:
Network security : the way of securing a computer network from intruders, whether targeted attackers or opportunistic malware
Application security : focuses on keeping
software and devices free from threats
Information security : protects the integrity and privacy of
data, both in storage and on the go
Operational security encompasses the processes and
decisions to handle and protect data assets
Disaster recovery policy
Determine how organization response to cyber security incidence that result in loss
of operations or data
Business continuity
Business continuity is a plan that revived by an organization while trying to operate without specific resources
User good practices
Delete suspicious email attachments
not insert unknown USB devices
lesson on cyber threat and attacks