0% found this document useful (0 votes)
48 views

Lec 01

The document discusses cyber security including its objectives, assessments, recommended books and strategies for the course. It defines cyber security as protecting networks, computers, programs and data from attacks or unauthorized access. It also discusses the importance of cyber security and the difference between information security and cyber security.

Uploaded by

Misbah Irum
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Lec 01

The document discusses cyber security including its objectives, assessments, recommended books and strategies for the course. It defines cyber security as protecting networks, computers, programs and data from attacks or unauthorized access. It also discusses the importance of cyber security and the difference between information security and cyber security.

Uploaded by

Misbah Irum
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Cyber Security

Ms. Nabeela Bibi


Course Objectives
Course Assessments
Books
● Stallings, W. (2022). Cryptography and network security: principles and practice.
Pearson. ISBN: 9789332585225.
● Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of
Knowledge in a Conventional Classroom
Your Best Strategy
● Come to every lectures
● Read every lecture after going home and prepare it well.
● Do not wait till last minute to prepare for exam or work on projects
● Enjoy the fun!
Lectures need your help!
● Ask questions

● Make suggestions!

● Read something interesting and relevant to this course? Announce it in class!


Reader’s Guide
● The art of war teaches us to rely not on the likelihood of the enemy's not coming, but
on our own readiness to receive him; not on the chance of his not attacking, but rather
on the fact that we have made our position unassailable. —The Art of War, Sun Tzu
What is Cyber Security?
Cyber security is the body of technologies, processes, and
practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized
access.

● The term cyber security refers to techniques and


practices designed to protect digital data.

● The data that is stored, transmitted or used on an


information system.
What is Cyber Security?
● Cyber security is the protection of Internet-connected systems, including hardware,
software, and data from cyber attacks.
● It is made up of two words one is cyber and other is security.
○ Cyber is related to the technology which contains systems, network and
programs or data.
○ Whereas security related to the protection which includes systems security,
network security and application and information security.
Why Cyber Security is important?
● Cyber attacks can be extremely expensive for businesses to endure.
● In addition to financial damage suffered by the business, a data breach can also inflict untold
reputational damage.
● Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using
more sophisticated ways to initiate cyber attacks.
● Regulations such as GDPR are forcing organizations into taking better care of the personal
data they hold.
Because of the above reasons, cyber security has become an important part of the business and
the focus now is on developing appropriate response plans that minimize the damage in the event
of a cyber attack.
Difference between Information Security and Cyber
Security?
Parameters CYBER SECURITY INFORMATION SECURITY

It is all about protecting information from unauthorized users,


It is the practice of protecting the data from outside
Basic Definition access, and data modification or removal in order to provide
the resource on the internet.
confidentiality, integrity, and availability.

It is about the ability to protect the use of


Protect It deals with the protection of data from any form of threat.
cyberspace from cyber attacks.

Cybersecurity to protect anything in the cyber


Scope Information security is for information irrespective of the realm.
realm.

Information security deals with the protection of data from any


Threat Cybersecurity deals with the danger in cyberspace.
form of threat.

Cybersecurity strikes against Cyber crimes, cyber Information security strikes against unauthorized access,
Attacks
frauds, and law enforcement. disclosure modification, and disruption.
Information security professionals are the foundation of
data security and security professionals associated with it
Cyber security professionals deal with the prevention of
Professionals are responsible for policies, processes, and organizational
active threats or Advanced Persistent threats (APT).
roles and responsibilities that assure confidentiality,
integrity, and availability.
It deals with threats that may or may not exist in the cyber
It deals with information Assets and integrity,
Deals with realm such as protecting your social media account, personal
confidentiality, and availability.
information, etc.
Addresses a wider range of threats, including physical
Primarily deals with digital threats, such as hacking,
Threats theft, espionage, and human error
malware, and phishing

Protects the confidentiality, integrity, and availability of all


Protects against unauthorized access, use, disclosure, types of information, regardless of the medium in which it
Goal
disruption, modification, or destruction of digital information is stored

Requires knowledge of risk management, compliance,


Requires specialized knowledge of computer systems and
legal and regulatory issues, as well as technical
Skills required networks, as well as programming and software development
knowledge
skills

Emphasizes the protection of information assets, which


includes data but also other information such as
Emphasizes protecting the data itself, regardless of where it
Focus on data intellectual property, trade secrets, and confidential
is stored or how it is transmitted
customer information

Deals with a wide range of threats, including physical


Threat Deals with constantly evolving threats, such as new forms of security breaches, insider threats, and social engineering
landscape malware and emerging cybercrime techniques attacks
Thank you!

You might also like