Module 3.6 Cyber Security

type of cyber threats

Risk of cyber threat an cyber attack with the advancement of new technology

Importance to focus on cyber security

to protect the valuable data

minimize the associate risks

cyber attacks: involve the gathering of politically
motivated information

cybercrimes: a single perpetrator or group that
targets the system for financial gain or to cause disruption

Cyberterrorism : aims to weaken electronic systems so as to
cause panic or fear

Cyber Security

the way of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks

also known as information technology security
or electronic information security

Categories:

Network security : the way of securing a computer network from intruders, whether targeted attackers or opportunistic malware

Application security : focuses on keeping
software and devices free from threats

Information security : protects the integrity and privacy of
data, both in storage and on the go

Operational security encompasses the processes and
decisions to handle and protect data assets

Disaster recovery policy

Determine how organization response to cyber security incidence that result in loss
of operations or data

Business continuity

Business continuity is a plan that revived by an organization while trying to operate without specific resources

User good practices

Delete suspicious email attachments

not insert unknown USB devices

lesson on cyber threat and attacks