SlideShare une entreprise Scribd logo
1  sur  49
SOCIAL RESPONSIBILITY
OF IT PROFESSIONAL
SECURIT
Y
HACKIN
G
MARK JOHN P. LADO
FRANKLIN C. LASDOCE
PREPARED BY:
Technology is science or knowledge put into practical use to solve
problems or invent useful tools. A computer is one of the examples of
a technology it is a programmable electronic device that accepts raw
data as input and processes it with a set of instructions (a program) to
produce the result as an output.
Technology is robust, where hacking is now common, there are two
different types of hacking, the ethical hacking and unethical hacking.
INTRODUCTION
11-4-21 2
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
The Same Tools Are Used By Both Hackers And Ethical Hackers. The
Only Difference Is That Hackers Use Tools To Steal Or Destroy
Information Whereas Ethical Hackers Use Same Tools To Safeguard
Systems From “Hackers With Malicious Intent”. Ethical Hacking Is
Legal And Hacking Is Done With Permission From The Client.
Computer Security Is The Protection Of Computer Systems And
Networks From Information Disclosure, Theft Of Or Damage To Their
Hardware, Software, Or Electronic Data, As Well As From The
Disruption Or Misdirection Of The Services They Provide.
INTRODUCTION
3
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Tell the definition of Computer Hacking
• Recognize the Ethical hacking and Unethical
hacking
• Illustrate the penetration tester do
• Summarize the top Skills Required for
Cybersecurity Jobs
• Define Computer Security
• Recite the different types of Computer Security
OBJECTIVES
4
At the end of this topic, you will be able to;
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Describe the importance of Computer Security
• Summarize the objectives for computer security
in any organization
• Discover in securing your Computer from
Unauthorized Access
• Relate the 15 Best practices for Computer
Security and Cyber Security
• Recognize the Social Engineering and Cyber
Attacks
OBJECTIVES
5
At the end of this topic, you will be able to;
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
COMPUTER HACKING
The act of compromising digital devices and
networks through unauthorized access to an
account or computer system. Hacking is not always
a malicious act, but it is most commonly associated
with illegal activity and data theft by cyber criminals.
6
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
ETHICAL HACKING
Also known as White Hat, or Penetration Tester.
COMPUTE
R
HACKING
7
UNETHICAL HACKING
Also know as Black Hat.
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
A white hat is an ethical computer
hacker, or a computer security expert,
who specializes in penetration testing
and other testing methodologies that
ensure the security of an organization's
information systems. Ethical hacking is
a term meant to imply a broader
category than just penetration testing.
ETHICAL HACKING
1/7/20XX 8
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
As a penetration tester, you will perform
authorized tests on computer systems
in order to expose weaknesses in their
security that could be exploited by
criminals. You can choose to specialise
in manipulating a particular type of
system, such as: networks and
infrastructures.
WHAT DOES A
PENETRATION TESTER DO?
1/7/20XX 9
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
COMPUTE
R
HACKING
10
UNETHICAL HACKING
Also know as Black Hat.
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 11
WHAT DOES A BLACK
HAT HACKER DO?
A black hat hacker is a hacker who
violates computer security for their
own personal profit or out of malice.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 12
UNETHICAL HACKING
Black Hat hackers are criminals who break into
computer networks with malicious intent. They may
also release malware that destroys files, holds
computers hostage, or steals passwords, credit
card numbers, and other personal information.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
One of the most famous black hat hackers is Kevin Mitnick, who, at
one point, was the most wanted cybercriminal in the world. As a black
hat hacker, he hacked into over 40 major corporations, including IBM
and Motorola, and even the US National Defense warning system.
Source:
Black hat, white hat & gray hat hackers | Kasperskyhttps://www.kaspersky.com ›
HACKING
11-4-21 13
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
SOURCE: WIKIPEDIA/KEVIN_MITNIC
COMPUTER SECURITY
Computer security,
cybersecurity, or information
technology security is the
protection of computer systems
and networks from information
disclosure, theft of or damage to
their hardware, software, or
electronic data, as well as from
the disruption or misdirection of
the services they provide.
11-4-21 15
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Also called cybersecurity, the protection of
computer systems and information from harm,
theft, and unauthorized use. Computer
hardware is typically protected by the same
means used to protect other valuable or
sensitive equipment—namely, serial numbers,
doors and locks, and alarms.
11-4-21 16
COMPUTER SECURITY
1011001010100101010111010100101
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
PROBLEM-
SOLVING SKILLS
KNOWLEDGE OF
SECURITY ACROSS
VARIOUS
PLATFORMS
ATTENTIO
N TO
DETAIL
TECHNICA
L
APTITUDE
THE TOP SKILLS REQUIRED FOR CYBERSECURITY JOBS
11-4-21 17
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
As a cybersecurity professional, problem-
solving will play a major role in your day-
to-day work. Those in the field need to
find creative ways to take on and address
complex information security challenges
across a variety of existing and emerging
technologies and digital environments.
11-4-21 18
PROBLEM-SOLVING SKILLS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
As the name implies, cybersecurity is a
technology-focused field: you will be likely be
tasked with responsibilities such as
troubleshooting, maintaining, and updating
information security systems; implementing
continuous network monitoring; and providing
real-time security solutions. Being technologically
savvy is essential in order to perform the daily
activities of a cybersecurity professional.
Technical aptitude helps assess a candidate's:
Ability to reason with logic
11-4-21 19
TECHNICAL APTITUDE
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Cybersecurity isn't just limited to
computers: you'll need to be
comfortable working on a variety of
operating systems, computer
systems, mobile devices, cloud
networks, and wireless networks -
and keep up to date on advances in
the field for all of them.
11-4-21 20
KNOWLEDGE OF SECURITY ACROSS VARIOUS
PLATFORMS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Being able to defend an organization
against cyber breaches requires you to be
highly vigilant and detail-oriented, in order
to effectively detect vulnerabilities and
risks. You'll like be responsible for
continuous network monitoring and will
need to be able to quickly identify
concerns and come up with real-time
security solutions to address them.
11-4-21 21
ATTENTION TO DETAIL
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Physical Security
• Network Security
• Executable Security
11-4-21 22
DIFFERENT TYPES OF COMPUTER SECURITY
THERE ARE THREE DIFFERENT TYPES OF COMPUTER SECURITY. THEY ARE AS
FOLLOWS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
This type of computer security is one of
the simplest and easiest to interpret.
Anyone who has access to the computer
can access it.
Always we need to make sure not to share
our passwords in-order to safeguard our
system from data thefts.
11-4-21 23
DIFFERENT TYPES OF COMPUTER SECURITY
PHYSICAL SECURITY
Our computers should not be left
unattended, as others can access
all our files.
Physical security is one of the
basic securities that one must
consider.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Firewall is one of the most
important computer security.
11-4-21 24
DIFFERENT TYPES OF COMPUTER SECURITY
NETWORK SECURITY
This firewall helps the network
security by stopping any of the
unauthorized networks that
would attempt to access your
computer.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Anti-virus security is known as
executable security.
This type of security is quite complex
as it requires a team to code the anti-
virus. Anti-virus is a must, to block the
virus from attacking the system.
11-4-21 25
DIFFERENT TYPES OF COMPUTER SECURITY
EXECUTABLE SECURITY
These anti-virus securities are called
executable security as they are
executable files that need to be run
on the computer, to be installed. With
this, our computers would be more
reliable.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
IMPORTANCE OF COMPUTER SECURITY
Computer security is one of the most important aspects,
as it keeps all our data safe.
Prevention helps to stop hackers (unauthorized users)
from accessing our computers.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
IMPORTANCE OF COMPUTER SECURITY
Today most of the transactions that we perform from shopping to
banking are by accessing the websites (through a network).
The main intention of a hacker is to attack the system and get all
the data stored in the system.
Once the hacker can access different computers, they can cause
damage by formatting the hard drive.
Also, it would be easy for the hacker to attack other computers
through your computer as they can hide their actual information.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
28
SOME OF THE OBJECTIVES FOR COMPUTER SECURITY
IN ANY ORGANIZATION ARE
• Confidentiality – This means that information should be
accessed only by authorized users.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
29
SOME OF THE OBJECTIVES FOR COMPUTER SECURITY
IN ANY ORGANIZATION ARE
• Integrity – Here information should be added, modified, or
deleted only by an authorized user which means we need to
protect information being modified.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
30
SOME OF THE OBJECTIVES FOR COMPUTER SECURITY
IN ANY ORGANIZATION ARE
• Availability – This means that the information should be
available only to authorized people on demand.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
31
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Secure passwords – Always we should keep in mind to
create passwords that have at least 15 characters which
include capital letters, special characters, and numbers.
• Anti-virus – Make sure to install and update the anti-virus
regularly to prevent malware. Examples are Norton and
McAfee.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
32
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Two-way authentication – Here there would be two layers of
authentication making it difficult for the hackers to get access
to your accounts.
• Firewalls – Firewalls do not allow unauthorized users from
accessing the network connected to the internet.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
33
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Anti-phishing tactics – Attackers normally try to send an
email with a malicious link or ask us to provide our data or
send us any attached files. By doing this (by clicking on the
malicious link, sending our personal data, or clicking on any
attachments) we fall into their trap and they would succeed to
hack our computers.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
34
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Encryption – This is a method of converting plain text to
secret text. Many applications follow this – Banking
transactions, Computer passwords, etc.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
People need to be smart and
need to pay attention to the
security of their personal
computers. Few points that we
need to keep in mind.
35
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
1. Do not click on anything you
are not sure to be safe.
2. Do not open any
attachments that show up in
emails from an unknown
person. 36
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
3. Do not hand over your
personal identification or
debit card details, credit
card details to strangers.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
4. Do not use unsecured public
Wi-Fi networks as we don’t
know if someone is looking at
our data
5. Always keep data back up
safe elsewhere. 37
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
6. Make sure to keep
changing the passwords
often and follow the
standards while choosing a
password.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
7. Install a good Anti-virus on
your computer and keep it up
to date.
8. Always enable the firewall
38
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
9. Install the security
software that helps to
recognize the website that
you be aware of.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
10. Do not use USBs or hard
disks in other machines that
you don’t trust.
11. Make sure all the software
is up to date.
39
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
12. Lock your computers
when you are not around.
13. Do not run the programs
that are unknown to you.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
14. Keep an eye on installed
software and remove
unnecessary software.
40
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
15. Use a pop-up blocker.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
When the network is secure,
hackers fail to hack it and
they in-turn target the users
of that network. This is called
Social Engineering.
11-4-21 41
SOCIAL ENGINEERING AND CYBER ATTACKS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
In recent days these types of
hackers have increased
subsequently.
11-4-21 42
SOCIAL ENGINEERING AND CYBER ATTACKS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Following are different
techniques used in social
engineering attacks –
11-4-21 43
SOCIAL ENGINEERING AND CYBER ATTACKS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 44
SOCIAL ENGINEERING AND CYBER
ATTACKS
VISHING
PHISHING SMISHING WHALING
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 45
SOCIAL ENGINEERING AND CYBER ATTACKS
• Phishing – This is one of the oldest methods used. In this
method, the Attacker sends an email expecting to get the
information from the user back.
• Vishing – Here attackers attack in the form of voice phishing.
They would contact you over the phone and pretend to be
from a bank or any other company.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 46
SOCIAL ENGINEERING AND CYBER ATTACKS
• Smishing – Here attackers use SMS phishing and the
person will receive a text message which looks like it is from
the bank, asking for all the personal details.
• Whaling – In this form of phishing, the attackers attack the
CEO or high-level person from the organization to get all the
financial information.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Computer Hacking and Computer Security
• Ethical hacking and Unethical hacking
• What penetration tester do
• Top Skills Required for Cybersecurity Jobs
11-4-21 47
WRAP-UP
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Different types of Computer Security
• The importance of Computer Security
• Objectives for computer security in any
organization
• Securing your Computer from Unauthorized
Access
• Best practices for Computer Security and Cyber
Security
• Social Engineering and Cyber Attacks
11-4-21 48
WRAP-UP
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 49
Online References
https://www.classmate4u.com/computer-security-and-cyber-security/
THANK YOU!
• Mark John P. Lado
• Franklin C. Lasdoce
PREPARED BY:
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL

Contenu connexe

Tendances

Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Knowledge Group
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 

Tendances (20)

Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Topic11
Topic11Topic11
Topic11
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 

Similaire à Importance of Computer Security

Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdfssuserfb92ae
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 

Similaire à Importance of Computer Security (20)

Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Network security
Network securityNetwork security
Network security
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
sams ppt.pptx
sams ppt.pptxsams ppt.pptx
sams ppt.pptx
 

Plus de Mark John Lado, MIT

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Mark John Lado, MIT
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignMark John Lado, MIT
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfMark John Lado, MIT
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Mark John Lado, MIT
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoMark John Lado, MIT
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOMark John Lado, MIT
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
 
Introduction to Networks and Programming Language
Introduction to Networks and Programming LanguageIntroduction to Networks and Programming Language
Introduction to Networks and Programming LanguageMark John Lado, MIT
 

Plus de Mark John Lado, MIT (20)

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology Design
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdf
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John Lado
 
What is CRUD in TPS?
What is CRUD in TPS?What is CRUD in TPS?
What is CRUD in TPS?
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 
Introduction to Networks and Programming Language
Introduction to Networks and Programming LanguageIntroduction to Networks and Programming Language
Introduction to Networks and Programming Language
 

Dernier

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Dernier (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Importance of Computer Security

  • 1. SOCIAL RESPONSIBILITY OF IT PROFESSIONAL SECURIT Y HACKIN G MARK JOHN P. LADO FRANKLIN C. LASDOCE PREPARED BY:
  • 2. Technology is science or knowledge put into practical use to solve problems or invent useful tools. A computer is one of the examples of a technology it is a programmable electronic device that accepts raw data as input and processes it with a set of instructions (a program) to produce the result as an output. Technology is robust, where hacking is now common, there are two different types of hacking, the ethical hacking and unethical hacking. INTRODUCTION 11-4-21 2 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 3. The Same Tools Are Used By Both Hackers And Ethical Hackers. The Only Difference Is That Hackers Use Tools To Steal Or Destroy Information Whereas Ethical Hackers Use Same Tools To Safeguard Systems From “Hackers With Malicious Intent”. Ethical Hacking Is Legal And Hacking Is Done With Permission From The Client. Computer Security Is The Protection Of Computer Systems And Networks From Information Disclosure, Theft Of Or Damage To Their Hardware, Software, Or Electronic Data, As Well As From The Disruption Or Misdirection Of The Services They Provide. INTRODUCTION 3 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 4. • Tell the definition of Computer Hacking • Recognize the Ethical hacking and Unethical hacking • Illustrate the penetration tester do • Summarize the top Skills Required for Cybersecurity Jobs • Define Computer Security • Recite the different types of Computer Security OBJECTIVES 4 At the end of this topic, you will be able to; 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 5. • Describe the importance of Computer Security • Summarize the objectives for computer security in any organization • Discover in securing your Computer from Unauthorized Access • Relate the 15 Best practices for Computer Security and Cyber Security • Recognize the Social Engineering and Cyber Attacks OBJECTIVES 5 At the end of this topic, you will be able to; 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 6. COMPUTER HACKING The act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals. 6 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 7. ETHICAL HACKING Also known as White Hat, or Penetration Tester. COMPUTE R HACKING 7 UNETHICAL HACKING Also know as Black Hat. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 8. A white hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing. ETHICAL HACKING 1/7/20XX 8 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 9. As a penetration tester, you will perform authorized tests on computer systems in order to expose weaknesses in their security that could be exploited by criminals. You can choose to specialise in manipulating a particular type of system, such as: networks and infrastructures. WHAT DOES A PENETRATION TESTER DO? 1/7/20XX 9 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 10. COMPUTE R HACKING 10 UNETHICAL HACKING Also know as Black Hat. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 11. 11-4-21 11 WHAT DOES A BLACK HAT HACKER DO? A black hat hacker is a hacker who violates computer security for their own personal profit or out of malice. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 12. 11-4-21 12 UNETHICAL HACKING Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 13. One of the most famous black hat hackers is Kevin Mitnick, who, at one point, was the most wanted cybercriminal in the world. As a black hat hacker, he hacked into over 40 major corporations, including IBM and Motorola, and even the US National Defense warning system. Source: Black hat, white hat & gray hat hackers | Kasperskyhttps://www.kaspersky.com › HACKING 11-4-21 13 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 15. COMPUTER SECURITY Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. 11-4-21 15 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 16. Also called cybersecurity, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. 11-4-21 16 COMPUTER SECURITY 1011001010100101010111010100101 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 17. PROBLEM- SOLVING SKILLS KNOWLEDGE OF SECURITY ACROSS VARIOUS PLATFORMS ATTENTIO N TO DETAIL TECHNICA L APTITUDE THE TOP SKILLS REQUIRED FOR CYBERSECURITY JOBS 11-4-21 17 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 18. As a cybersecurity professional, problem- solving will play a major role in your day- to-day work. Those in the field need to find creative ways to take on and address complex information security challenges across a variety of existing and emerging technologies and digital environments. 11-4-21 18 PROBLEM-SOLVING SKILLS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 19. As the name implies, cybersecurity is a technology-focused field: you will be likely be tasked with responsibilities such as troubleshooting, maintaining, and updating information security systems; implementing continuous network monitoring; and providing real-time security solutions. Being technologically savvy is essential in order to perform the daily activities of a cybersecurity professional. Technical aptitude helps assess a candidate's: Ability to reason with logic 11-4-21 19 TECHNICAL APTITUDE MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 20. Cybersecurity isn't just limited to computers: you'll need to be comfortable working on a variety of operating systems, computer systems, mobile devices, cloud networks, and wireless networks - and keep up to date on advances in the field for all of them. 11-4-21 20 KNOWLEDGE OF SECURITY ACROSS VARIOUS PLATFORMS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 21. Being able to defend an organization against cyber breaches requires you to be highly vigilant and detail-oriented, in order to effectively detect vulnerabilities and risks. You'll like be responsible for continuous network monitoring and will need to be able to quickly identify concerns and come up with real-time security solutions to address them. 11-4-21 21 ATTENTION TO DETAIL MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 22. • Physical Security • Network Security • Executable Security 11-4-21 22 DIFFERENT TYPES OF COMPUTER SECURITY THERE ARE THREE DIFFERENT TYPES OF COMPUTER SECURITY. THEY ARE AS FOLLOWS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 23. This type of computer security is one of the simplest and easiest to interpret. Anyone who has access to the computer can access it. Always we need to make sure not to share our passwords in-order to safeguard our system from data thefts. 11-4-21 23 DIFFERENT TYPES OF COMPUTER SECURITY PHYSICAL SECURITY Our computers should not be left unattended, as others can access all our files. Physical security is one of the basic securities that one must consider. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 24. Firewall is one of the most important computer security. 11-4-21 24 DIFFERENT TYPES OF COMPUTER SECURITY NETWORK SECURITY This firewall helps the network security by stopping any of the unauthorized networks that would attempt to access your computer. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 25. Anti-virus security is known as executable security. This type of security is quite complex as it requires a team to code the anti- virus. Anti-virus is a must, to block the virus from attacking the system. 11-4-21 25 DIFFERENT TYPES OF COMPUTER SECURITY EXECUTABLE SECURITY These anti-virus securities are called executable security as they are executable files that need to be run on the computer, to be installed. With this, our computers would be more reliable. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 26. IMPORTANCE OF COMPUTER SECURITY Computer security is one of the most important aspects, as it keeps all our data safe. Prevention helps to stop hackers (unauthorized users) from accessing our computers. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 27. IMPORTANCE OF COMPUTER SECURITY Today most of the transactions that we perform from shopping to banking are by accessing the websites (through a network). The main intention of a hacker is to attack the system and get all the data stored in the system. Once the hacker can access different computers, they can cause damage by formatting the hard drive. Also, it would be easy for the hacker to attack other computers through your computer as they can hide their actual information. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 28. 28 SOME OF THE OBJECTIVES FOR COMPUTER SECURITY IN ANY ORGANIZATION ARE • Confidentiality – This means that information should be accessed only by authorized users. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 29. 29 SOME OF THE OBJECTIVES FOR COMPUTER SECURITY IN ANY ORGANIZATION ARE • Integrity – Here information should be added, modified, or deleted only by an authorized user which means we need to protect information being modified. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 30. 30 SOME OF THE OBJECTIVES FOR COMPUTER SECURITY IN ANY ORGANIZATION ARE • Availability – This means that the information should be available only to authorized people on demand. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 31. 31 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Secure passwords – Always we should keep in mind to create passwords that have at least 15 characters which include capital letters, special characters, and numbers. • Anti-virus – Make sure to install and update the anti-virus regularly to prevent malware. Examples are Norton and McAfee. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 32. 32 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Two-way authentication – Here there would be two layers of authentication making it difficult for the hackers to get access to your accounts. • Firewalls – Firewalls do not allow unauthorized users from accessing the network connected to the internet. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 33. 33 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Anti-phishing tactics – Attackers normally try to send an email with a malicious link or ask us to provide our data or send us any attached files. By doing this (by clicking on the malicious link, sending our personal data, or clicking on any attachments) we fall into their trap and they would succeed to hack our computers. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 34. 34 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Encryption – This is a method of converting plain text to secret text. Many applications follow this – Banking transactions, Computer passwords, etc. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 35. People need to be smart and need to pay attention to the security of their personal computers. Few points that we need to keep in mind. 35 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 36. 1. Do not click on anything you are not sure to be safe. 2. Do not open any attachments that show up in emails from an unknown person. 36 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 3. Do not hand over your personal identification or debit card details, credit card details to strangers. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 37. 4. Do not use unsecured public Wi-Fi networks as we don’t know if someone is looking at our data 5. Always keep data back up safe elsewhere. 37 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 6. Make sure to keep changing the passwords often and follow the standards while choosing a password. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 38. 7. Install a good Anti-virus on your computer and keep it up to date. 8. Always enable the firewall 38 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 9. Install the security software that helps to recognize the website that you be aware of. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 39. 10. Do not use USBs or hard disks in other machines that you don’t trust. 11. Make sure all the software is up to date. 39 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 12. Lock your computers when you are not around. 13. Do not run the programs that are unknown to you. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 40. 14. Keep an eye on installed software and remove unnecessary software. 40 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 15. Use a pop-up blocker. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 41. When the network is secure, hackers fail to hack it and they in-turn target the users of that network. This is called Social Engineering. 11-4-21 41 SOCIAL ENGINEERING AND CYBER ATTACKS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 42. In recent days these types of hackers have increased subsequently. 11-4-21 42 SOCIAL ENGINEERING AND CYBER ATTACKS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 43. Following are different techniques used in social engineering attacks – 11-4-21 43 SOCIAL ENGINEERING AND CYBER ATTACKS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 44. 11-4-21 44 SOCIAL ENGINEERING AND CYBER ATTACKS VISHING PHISHING SMISHING WHALING MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 45. 11-4-21 45 SOCIAL ENGINEERING AND CYBER ATTACKS • Phishing – This is one of the oldest methods used. In this method, the Attacker sends an email expecting to get the information from the user back. • Vishing – Here attackers attack in the form of voice phishing. They would contact you over the phone and pretend to be from a bank or any other company. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 46. 11-4-21 46 SOCIAL ENGINEERING AND CYBER ATTACKS • Smishing – Here attackers use SMS phishing and the person will receive a text message which looks like it is from the bank, asking for all the personal details. • Whaling – In this form of phishing, the attackers attack the CEO or high-level person from the organization to get all the financial information. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 47. • Computer Hacking and Computer Security • Ethical hacking and Unethical hacking • What penetration tester do • Top Skills Required for Cybersecurity Jobs 11-4-21 47 WRAP-UP MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 48. • Different types of Computer Security • The importance of Computer Security • Objectives for computer security in any organization • Securing your Computer from Unauthorized Access • Best practices for Computer Security and Cyber Security • Social Engineering and Cyber Attacks 11-4-21 48 WRAP-UP MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 49. 11-4-21 49 Online References https://www.classmate4u.com/computer-security-and-cyber-security/ THANK YOU! • Mark John P. Lado • Franklin C. Lasdoce PREPARED BY: MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL