CYBERSECURITY AWARENESS
CYBERSECURITY AWARENESS DEFINE CYBERSECURITY WHAT IS CYBERSECURITY? • Cybersecurity is a complete approach • Builds a strong barrier against illegal access, exploitation • The goal is to create a robust barrier • Safeguards digital information IMPORTANCE OF CYBERSECURITY WHY IS CYBER SECURITY IMPORTANT IN TODAY’S LINKED WORLD? • Data is becoming more accessible • Cybersecurity measures are crucial. • Cyber attacks have a negative impact • To guarantee integrity WHAT ARE THE KEY CONCEPTS IN CYBERSECURITY? • Cybersecurity fundamentals encompass availability, integrity, and confidentiality of data. • Confidentiality restricts data access to authorized users • Integrity guarantees data accuracy and prevents unauthorized alterations • Availability ensures data is accessible when required TYPES OF CYBER THREATS TYPES OF CYBER THREATS • Phishing • Spear phishing attack • Malware • Ransomware • Trojans horse • Spyware PHISHING AWARENESS (VIDEO 1:34 MINS) SPEAR PHISHING ISN’T JUST EMAIL (VIDEO 1:30 MINS) EXAMPLES OF CYBER ATTACKS EXAMPLES OF CYBER ATTACKS • Data breaches and denial-of-service assaults are examples of cyberattacks. • The goal of these attacks is to interfere with operations and weaken digital systems. • Some examples include,The WannaCry ransomware in 2017 disrupted systems across the world. • In 2017, millions of people’s personal information was stolen by Equifax. CYBER ATTACK EXAMPLE IN TEXAS DALLAS COUNTY • An international cyber hacker group targeted the Dallas County computer system, threatening to publish sensitive information unless a ransom is paid by Friday. • The cyber incident was detected on Oct. 19, with outside cybersecurity experts brought in to contain the threat and prevent file encryption. • While the county’s computer systems remain operational, concerns arise about potentially extracted data during the attack. • Hackers likely infiltrated the system through a phishing email, highlighting the risks of social engineering tactics in cyber attacks. • https://www.youtube.com/watch?v=zb38kIr5eu0 CYBER ATTACK EXAMPLES IN TEXAS – HOUSTON METHODIST HOSPITAL HEALTH SYSTEM • In 2018, Houston Methodist Hospital, a leading healthcare provider in Texas, experienced a ransomware attack that encrypted patient records and disrupted medical services. • The cybercriminals demanded a substantial ransom for the decryption key, impacting patient care and hospital operations. • The incident raised concerns about the vulnerability of healthcare institutions to cyber threats and the importance of robust cybersecurity defenses. • https://www.youtube.com/watch?v=i899TfS-P_M CYBER ATTACK EXAMPLES IN TEXAS – AUSTIN POLICE DEPARTMENT • In 2017, the Austin Police Department in Texas fell victim to a sophisticated cyber attack that compromised confidential case files and sensitive law enforcement data. • The breach, believed to be a targeted hacking incident, exposed operational vulnerabilities within the police department’s digital infrastructure. • The cybercriminals exploited weaknesses in the department’s network security, highlighting the critical need for enhanced cybersecurity measures in law enforcement agencies. • https://www.youtube.com/watch?v=lir36v3H5kU FIREWALLS • firewalls monitor and control network traffic • They filter out unsolicited connections and undesirable traffic • Firewalls stop unwanted users from accessing company networks • Ncessary to preserve the integrity and security of networks ANTIVIRUS SOFTWARE • Set up endpoints and servers using antivirus software • To minimize infection and data loss, identify and eliminate malware • Trojan horses, worms, and viruses are the objectives of antivirus software • Critical for eradicating and halting harmful malware ACCESS CONTROLS • Access controls limit user access based on roles and permissions. • They use login information to manage data and system access. • This minimizes the risk of insider attacks. • Limits access to private data effectively. SECURITY AWARENESS TRAINING • Security awareness training • Encourages a security culture • Reduces risk • Active involvement REFERENCES Equifax(2024). Unpacking the 2023 Equifax Security Annual Report.[YouTube]. https://www.youtube.com/watch?v=fPOqNOYuVk8&list=PPSV Herrmann, D., & Pridöhl, H. (2020). Basic concepts and models of cybersecurity. The ethics of cybersecurity, 11-44. Hussain, A., Mohamed, A., & Razali, S. (2020, March). A review on cybersecurity: Challenges & emerging threats. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (pp. 1-7). Kaur, G., Habibi Lashkari, Z., Habibi Lashkari, A., Kaur, G., Habibi Lashkari, Z., & Habibi Lashkari, A. (2021). Introduction to Cybersecurity. Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and Trends, 17-34 REFERENCES PcMag (2019).What Is Two-Factor Authentication?[YouTube]. https://www.youtube.com/watch?v=AMOtB7XkTT4&t=23s Priyadarshini, I. (2019). Introduction on cybersecurity. Cyber security in parallel and distributed computing: Concepts, techniques, applications and case studies, 1-37. Simplilearn (2021).Top 10 Cyber Attacks In History | Biggest Cyber Attacks Of All Time | Cyber Security | Simplilearn.[YouTube]. https://www.youtube.com/watch?v=fUeJtM1bgGo&t=45s Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. Kowalick, C. (2020). Study:Texas second for ransomware attacks on health care centers. Times Record News. https://www.timesrecordnews.com/story/news/local/2020/02/11/study-texas-second-ransomware-attacks-health-carecenters/4722638002/ Sangfor Technologies. (2021). Dallas Ransomware Attack Affects 30,253 People. Sangfor Technologies. https://www.sangfor.com/blog/cybersecurity/dallas-ransomware-attack-affects-30253-people
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.