CYBER
SECURI
TY
Presented By
HAMADI
DOUAA
and GUIOUA
OUHILA
TABLE OF CONTENTS
WHAT
INTRODUC
IS CYBER
00 TION 01 SECURITY?
WHY BIG
CONCEPT CYBERCRI
CYBER MES –
02 SECURITY?03
HOW - CIA IS A
WHO 04 STATISTICS
HACKERS
CYBER CYBER & FACTS
SECURITY SECURITY ABOUT
05 WORK? 06 EXPERT? 07 CYBER
SECURITY
INTRODUCTION
Cyber security refers to the practice of protecting
computers, networks, and data from unauthorized access,
theft, or damage. It plays a crucial role in safeguarding
sensitive information in today's digital world, where cyber
threats are constantly evolving. By implementing security
measures like encryption, firewalls, and strong passwords,
individuals and organizations can reduce risks and ensure
WHAT IS
0 CYBER
1 SECURITY?
WHAT IS
CYBER
SECURITY?
Cyber Security is the technology and
process that is designed to protect
networks and devices from attack ,
damage , or unauthorized access .
Protection for Increase productivity Inspires customer
your confidence
customers or
clients
Stops your website Protection of your
from crashing business
0
2
WHY
CYBER
WHY
CYBER SECURITY?
Confidentiality , Integrity ,
Availability CIA
Have served as the TRIAD
industry standard for
Computer Security since
the time of first
mainframes .
CI Confidenti Integri Availab
A ality ty ility
03
BIG
CONCEPT
CIA The principles of
cnfidentiality assert that
information and functions
can be accessed only by
authorized parties .
Confiden Example: Military Secrets.
tiality The principles of
The principles of
cnfidentiality
cnfidentiality
assert that
assert that
systems ,
information and
functions can be CI functions, and
data must be
added , altered , A available on
or removed only
demand according
by authorized Integr Availab to agreed upon
people & means . ity ility parameters based
Example:
on levels of
Incorrect data
service .
entered by a user
Threats to CIA
Confiden
tiality
CI
A
Cyberc Hack
rime Integr Availab ing
ity ility
0
4
CYBERCRIMES
– HACKERS
Cybercrime
Cybercrime is any
criminal activity
that involves a
computer, network
device, or a
network.
Cybercrime are
carried out against
Most Cybercrime are
computers or devices
carried out in order to
directly to damage or
generate profit for the
disable them, spread
Cyber Criminals.
malware, steal secret
information, etc.
Hacking
Types of
Hackers
TYPES OF
CYBERCRIM
Computer
ES
assisted Sniffing ,
crimes Viruses
Fraud,
Denial of
Service
(DOS) Comput
er as
Comput the
er target
incident crimes
al to the
Costom
crimes
er
trafficke
Motives behind
cybercrime
Common attacks in
cybersecurity
0
HOW 5
CYBER
SECURITY
WORK?
HOW CYBER SECURITY
WORK?
Secure Antivir Secure
Passwords No DNS
us Phishing
2_Way Regular Cryptograp
Authentica Update Firewall
hy
tion s (encryption
)
0
WHO IS A
6
CYBER
SECURITY
EXPERT?
WHO IS A CYBER
SECURITY
Monitoring Network
Finding Systems Breach
EXPERT?
Weaknes
s A Cyber Security
expert is an
individual employed
by an organization
to proyect their
After they find weakness, they repair and
strengthen the areasdata.
where an attack may have
occurred .
cybersecurity average by job
names in
cybersecurity
1988 1990 1999 2004
Robert T. Kevin Lee David L. Adam
Morris Poulsen Smith Botbyl
First internet Hacked Created Melissa Steal credit card
Worm telephone lines Virus information
of KIIS_FM
(LOS ANGELES)
STATISTICS
& FACTS
ABOUT
CYBER
SECURITY 0
top 20 countries generating
cyber crime
$16,4 $11
Billion per Million per minute
day
$684. GLOBAL
CYBERCRIME
DAMAGE BY
9 $190,0
2021
Million per hour
00
Per second
CONCLUSION
In conclusion, cybersecurity is essential to
protect data and systems from the
increasing threats in the digital age. With
the rapid technological development, the
need to enhance cybersecurity and
awareness of its importance has become a
shared responsibility between individuals
and organizations to ensure a safe and
sustainable digital environment.
THAN
K
Does
YOU!
anyone
have any
questions?