SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Cybersecurity
from A to Z_
What every SME needs to know
º
An antivirus is a type of software
that detects, prevents and
mitigates malware infections on
different computing devices, such as
computers or smartphones.
Antivirus_
A backdoor is a mechanism that allows
access to a computer and its data
bypassing security mechanisms.
Backdoor_
A backup refers to the copying and
archiving of computer data to a
secondary site for protection in case of
technical failure or another disaster.
Backups may have two purposes: recover
data after its loss or recover data from an
earlier time.
Backup_
A cookie is a small amount of data
generated by a website and stored
by your browser on your device.
Its purpose is to distinguish which user
has visited the website in order to
show tailored information.
Cookies_
A data breach is a leak of
confidential information from
a company or internet service.
Data breach_
A distributed denial of service (DDoS) is
a type of cyber attack that aims to
leave an internet service inaccessible
by consuming all its resources because
of simultaneous access from
numerous different locations.
DDoS attack_
Disaster Recovery (DR) is an area of
security aimed at restoring the normal
functioning of an organization.
DR involves a set of policies and
procedures to enable the organization to
maintain or rapidly resume critical
functions following a disaster.
Disaster
Recovery_
º
Encryption is the conversion of a
message or text whose content is to
be protected into another type of
non-recognizable text by using an
algorithm and one or more passwords.
Encryption_
An exploit is a code, a piece of data or a
script that allows attackers to take
advantage of a security failure or
vulnerability in order to cause unexpected
behaviour to occur.
Such behaviour frequently includes gaining
control of a computer system, allowing
privilege escalation or denials of service.
Exploit_
A network security system that
monitors incoming and outgoing
traffic and decides whether to
allow or block specific network
traffic based on predetermined
security rules.
Firewall_
The secure web browsing protocol.
It is used for authentication of visited
websites, to protect the privacy and
integrity of the exchanged data.
HTTPS_
Identity and Access Management (IAM) is
a service that enables enterprises to
manage users and user permissions.
It is the security discipline that enables
the right individuals to access the right
resources at the right times for the right
reasons.
IAM_
A program or hardware device that
covertly monitors each keystroke
typed into a device’s keyboard.
Keyloggers are commonly used by
attackers to steal vital information such
as personal details, credit card data, login
credentials, etc.
Keylogger_
Short for malicious software, it is any
type of software with malicious
behaviour.
Malware is commonly used to disrupt
computer or mobile operations, gather
sensitive data, gain access to private
computer systems…
Malware_
Managed security services are
device management services
that a company outsources to
a third party.
Managed
security_
º
A type of attack in which fraudulent
communications are used to deceive
the user and obtain sensitive
information (passwords, personal
data, credit card details).
The attacker pretends to be a
trustworthy entity or person to obtain
that information.
Phishing_
A type of malware for data kidnapping.
The attack consists of hijacking the data
of an organization or individual and then
demanding payment in exchange for
recovering that information.
Ransomware_
A computer networking protocol
for securing connections
between a server and a client.
The SSL ensures that all data
transmitted between the server
and clients remain private.
SSL (Secure
Socket Layer)_
A malicious software that seems
legitimate and harmless but performs
some illicit activity when run.
It may be used to locate passwords
information or simply destroy the user's
stored software and data.
Trojan_
A method of confirming a user’s
claimed identity using a combination
of two different methods.
For example, a password and a
fingerprint or a PIN code and a
message sent to your phone. It is an
extra layer of security.
Two-factor
authentication_
Cybersecurity from A to Z

Contenu connexe

Tendances

Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 

Tendances (20)

Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Mobile security
Mobile securityMobile security
Mobile security
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Information security
Information securityInformation security
Information security
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Data security
Data securityData security
Data security
 
Dos attack
Dos attackDos attack
Dos attack
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
security IDS
security IDSsecurity IDS
security IDS
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 

Similaire à Cybersecurity from A to Z

Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 

Similaire à Cybersecurity from A to Z (20)

IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Computer security and
Computer security andComputer security and
Computer security and
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Cybersecurity from A to Z

  • 1. Cybersecurity from A to Z_ What every SME needs to know
  • 2. º An antivirus is a type of software that detects, prevents and mitigates malware infections on different computing devices, such as computers or smartphones. Antivirus_
  • 3. A backdoor is a mechanism that allows access to a computer and its data bypassing security mechanisms. Backdoor_
  • 4. A backup refers to the copying and archiving of computer data to a secondary site for protection in case of technical failure or another disaster. Backups may have two purposes: recover data after its loss or recover data from an earlier time. Backup_
  • 5. A cookie is a small amount of data generated by a website and stored by your browser on your device. Its purpose is to distinguish which user has visited the website in order to show tailored information. Cookies_
  • 6. A data breach is a leak of confidential information from a company or internet service. Data breach_
  • 7. A distributed denial of service (DDoS) is a type of cyber attack that aims to leave an internet service inaccessible by consuming all its resources because of simultaneous access from numerous different locations. DDoS attack_
  • 8. Disaster Recovery (DR) is an area of security aimed at restoring the normal functioning of an organization. DR involves a set of policies and procedures to enable the organization to maintain or rapidly resume critical functions following a disaster. Disaster Recovery_
  • 9. º Encryption is the conversion of a message or text whose content is to be protected into another type of non-recognizable text by using an algorithm and one or more passwords. Encryption_
  • 10. An exploit is a code, a piece of data or a script that allows attackers to take advantage of a security failure or vulnerability in order to cause unexpected behaviour to occur. Such behaviour frequently includes gaining control of a computer system, allowing privilege escalation or denials of service. Exploit_
  • 11. A network security system that monitors incoming and outgoing traffic and decides whether to allow or block specific network traffic based on predetermined security rules. Firewall_
  • 12. The secure web browsing protocol. It is used for authentication of visited websites, to protect the privacy and integrity of the exchanged data. HTTPS_
  • 13. Identity and Access Management (IAM) is a service that enables enterprises to manage users and user permissions. It is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM_
  • 14. A program or hardware device that covertly monitors each keystroke typed into a device’s keyboard. Keyloggers are commonly used by attackers to steal vital information such as personal details, credit card data, login credentials, etc. Keylogger_
  • 15. Short for malicious software, it is any type of software with malicious behaviour. Malware is commonly used to disrupt computer or mobile operations, gather sensitive data, gain access to private computer systems… Malware_
  • 16. Managed security services are device management services that a company outsources to a third party. Managed security_
  • 17. º A type of attack in which fraudulent communications are used to deceive the user and obtain sensitive information (passwords, personal data, credit card details). The attacker pretends to be a trustworthy entity or person to obtain that information. Phishing_
  • 18. A type of malware for data kidnapping. The attack consists of hijacking the data of an organization or individual and then demanding payment in exchange for recovering that information. Ransomware_
  • 19. A computer networking protocol for securing connections between a server and a client. The SSL ensures that all data transmitted between the server and clients remain private. SSL (Secure Socket Layer)_
  • 20. A malicious software that seems legitimate and harmless but performs some illicit activity when run. It may be used to locate passwords information or simply destroy the user's stored software and data. Trojan_
  • 21. A method of confirming a user’s claimed identity using a combination of two different methods. For example, a password and a fingerprint or a PIN code and a message sent to your phone. It is an extra layer of security. Two-factor authentication_