0% found this document useful (0 votes)
42 views

Présentation

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It protects sensitive data, intellectual property, and financial information. The benefits of cyber security include data protection, prevention of financial fraud, and improved customer confidence. However, cyber security faces challenges such as a lack of user awareness, increasing complexity as new technologies emerge, and difficulty keeping up with the fast pace of change online.

Uploaded by

ART Metiers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Présentation

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It protects sensitive data, intellectual property, and financial information. The benefits of cyber security include data protection, prevention of financial fraud, and improved customer confidence. However, cyber security faces challenges such as a lack of user awareness, increasing complexity as new technologies emerge, and difficulty keeping up with the fast pace of change online.

Uploaded by

ART Metiers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

By :

Sabah Lemlih
Imane ihizan 
1) definition of 2) Needs of 3) types of cyber
cyber security  cyber security  security

4) benifits of 5)
6) challenges
cyber security facts( statistics)

6) conclusion 
WHAT IS CYBER SECURITY
•Cyber security is the practice of
defending computers, servers, mobile
devices, electronic systems, networks, and
data from malicious attacks. It's also
known as information technology security
or electronic information security. The
term applies in a variety of contexts, from
business to mobile computing, and can be
divided into a few common categories.
Why there is a need of cyber
security?
•Cybersecurity is crucial because it safeguards all types
of data against theft and loss. Sensitive data, protected
health information (PHI), personally identifiable
information (PII), intellectual property, personal
information, data, and government and business
information systems are all included.
Data protection from unauthorised access, loss or deletion.

What are Preventing financial fraud and embezzlement.

the Protection of intellectual property.

 benefits of Prevention of cyber espionage.


using cyber Prevention of fraud through financial transactions like wire
security? transfers etc.

Improves customer confidence.


How do cyber
security works?
•This type of security uses hardware and software to
protect any data that's sent through your computer and
other devices to the network. Network security serves to
protect the IT infrastructure and guard against
information being intercepted and changed or stolen by
cybercriminals.
Types of cyber threats:
3 categories
• There are many types of cyber threats
that can attack your devices and
networks, but  they generally fall into
three categories: attacks on
confidentiality, integrity, and availability.
• Attacks on confidentiality. These attacks can be
designed to steal personally identifiable information
(PII) like your Social Security number, along  with your
bank account, or credit card information. Following
these attacks,  your information can be sold or traded
on the dark web for others to purchase and use.
• Attacks on integrity. These attacks consist of personal
or enterprise sabotage  and are often called leaks. A
cybercriminal will access and release
sensitive information for the purposes of exposing the
data and influencing the  public to lose trust in a
person or an organization.
• Attacks on availability. The aim of this type of
cyberattack is to block users from accessing their own
data until they pay a fee or ransom. Typically, a 
cybercriminal will infiltrate a network and formerly
authorized parties from accessing important data,
demanding that a ransom be paid. 
FACTS
(STATISTICS)
•  Graph showing witch users are affected to
attacts:
• graphics showing types ofk informations that is most stolen :

••
• methods using by hackers:
Challenges :
● Lack of awareness and culture of cyber security at individual or
organizational level.

● complexity: artificial intelligence and machine learning are


becoming increasingly important as protection tools.

●sustainable cybersecurity: the internet is generating unprecedented


increase in the number of devices sharing users data and info.

●The speed of cyber technology always beats the progress of


government sector.
Conclusion:

You might also like