Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
31 views9 pages

Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views9 pages

Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Arba Minch University Institute of Technology

Faculity of Computing and Software Engineering

Group 2 members
1. Hailemariam Hailegiorgis
Cyber-Security and
Human-Computer
Interaction
Introduction
The internet has made the world smaller in many ways but it has also opened us up
to influences that have never before been so varied and so challenging. As fast as
security grew, the hacking world grew faster. There are two ways of looking at the
issue of cyber security. One is that the companies that provide cloud computing do
that and only that so these companies will be extremely well secured with the latest
in cutting edge encryption technology
What Is Cyber-Security ?
Cyber security are techniques generally set forth in published materials that attempt
to safeguard the cyber environment of a user or organization.
It manages the set of techniques used to save the integrity of networks, programs and
data from unauthorized access. It refers to the body of technologies, processes, and it
may also be referred to as information technology security.
The field is of growing importance due to increasing reliance on computer systems,
including smart phones, televisions and the various tiny devices that constitute the
Internet of Things.
cont ...
Its being protected by internet-connected systems, including hardware, software
and data, from cyber attacks. In a computing context, security comprises cyber
security and physical security both are used by enterprises to safe against
unauthorized access to data centre and other computerized systems.
The security, which is designed to maintain the confidentiality, integrity and
availability of data, is a subset of cyber security.
Cyber security is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks.
The term applies in a variety of contexts, from business to mobile computing, and
can be divided into a few common categories.
Cont ...
1) Network security .
2) Application security
3) Information security .
4) Operational security
5) Disaster recovery
6) End-user education
WHY DO WE NEED CYBER SECURITY ?
The range of operations of cyber security involves protecting information and systems
from major cyber threats. These threats take many forms. As a result, keeping pace with
cyber security strategy and operations can be a challenge, particularly in government
and enterprise networks where, in their most innovative form, cyber threats often take
aim at secret, political and military assets of a nation, or its people. Some of the
common threats are :
Cyber terrorism It is the innovative use of information technology by terrorist groups
to further their political agenda. It took the form of attacks on networks, computer
systems and telecommuni cation infrastructures.
Cyber warfare It involves nation-states using information technology to go through
something another nation‟s networks to cause damage. Cyber warfare attacks are
primarily executed by hackers who are well-trained in use of benefit the quality of
details computer networks, and operate under the favourable and support of nation-
states.
Cont ...
Cyber spionage It is the practice of using information technology to obtain
secret information without permission from its owners or holders. It is the
most often used to gain strategic, economic, military advantage, and is
conducted using cracking techniques and malware.
Who are Cyber Criminals ?
It involves such activities as credit card fraud; cyber stalking; defaming another
online; gaining unauthorized access to computer systems; ignoring copyright,
software licensing and trademark safe to protect; overriding encryption to
make illegal copies; software piracy and stealing another‟s identity to perform
criminal acts. Cybercriminals are those who conduct such acts. They can be
categorized into three groups that reflect their motivation.
cont ...
Type 1: Cybercriminals – hungry for recognition:
Hobby hackers;
IT professionals (social engineering is one of the biggest threat);
 Politically motivated hackers;
Terrorist organizations.
Type 2: Cybercriminals – not interested in recognition:
 Psychological prevents;
 Financially motivated hackers (corporate espionage);
 State – sponsored hacking (national espionage, sabotage);
 Organized criminals.
Type 3: Cybercriminals – the insiders:
 former employees seeking revenge;
 Competing companies using employees to gain economic advantage through

You might also like