CYBERSECURITY
PRESENTATION
CYBERSECUIRTY
INTRODUCTION: CYBERSECURITY IS WHAT PROTECTS OURS SYSTEMS, NETWORKS, AND PROGRAMS FROM BEING DIGITALLY ATTACKED. MANY OF THESE ATTACKS ARE TO FIND OUT PEOPLES PRIVATE INFORMATION OR TO EXTORT MONEY.
10 FACTS ABOUT CYBERSECURITY.
wHAT CAN YOU DO TO PREVENT IT?
- Be cautious when using free Wi-Fi
- Dont leave any information behind on public/shared devices
- Manage privacy settings
- Audit your apps and privacy settings before allowing data
- Always keep private information secure
- Keep your personal information private
- Use caution when it comes to email phishing and texts
- Update your software
- Create very strong passwords for all accounts
- Use 2 step verification
There are many things you can do to prevent cybersecurity.
WATCH A CYBER ATTACK OCCUR- cLICK THE LINK BELOW
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html?socialshare=cloud-security-attack
What are a few signs that hackers use?
What can occur when your identity gets stolen?
How can you tell if an email or text is legit?
Deals that are not believableA big sense of urgency Being obvious trying to obtain personal information Poor grammar Using generic greetings
If your identity gets stolen many different things may things may be affected such as: Your finances Credit Mental well-being All of this can cause a large amount of stress in someones life.
There are many different ways you can be cautious such as: Always check email addresses Beware of fake links Never provide personal information If you are paying a bill- go to the direct company website
CYBERSECURITY
'Having your personal information stolen can be very stressful'
Contextualize Your Topic with a Subtitle
types of cybersecurity threats
be very careful when it comes to....
- Phishing- Most likely occurs in fraudulent emails. They will look like they are coming from a legitemate source, when they in fact are scams. Hackers are aiming to steal your credit card information. This is the most common type of cyber attack.
- Ransome- They will attempt to gain access of your files and make you make a payment to recover them.
- Social engineering- This type of attack will try to make you click on a link and trick you to also download malware.
- Malware- This is a type of software that will try to damage your computer and gain access to it as well.
Never click on random links from random emails! This is very important.
(Ang, 2021)
Interactive question
Interactive question
Cybersecurity analyst
What does a cybersecurity analyst do?
"Monitor network traffic for security incidents and events.
Investigate incidents and respond to events in real time.
Write detailed incident response reports.
Install and operate firewalls, encryption programs, and other security software.
Fix vulnerabilities.
Develop and promote best practices for information security.
Conduct threat research.
Perform periodic risk assessments and penetration tests." (Staff, 2023)
Contextualize Your Topic with a Subtitle
References What is cybersecurity? (2023, November 9). Cisco. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~types-of-threats Staff, C. (2023, November 29). What does a cybersecurity analyst do? 2023 job Guide. Coursera. https://www.coursera.org/articles/cybersecurity-analyst-job-guide Ang, C. (2021, June 16). The Most Significant Cyber Attacks from 2006-2020, by Country. Visual Capitalist. https://www.visualcapitalist.com/cyber-attacks-worldwide-2006-2020/
Digital Technology Presentation
Ashley Nadeau
Created on December 10, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Tech Presentation Mobile
View
Geniaflix Presentation
View
Vintage Mosaic Presentation
View
Shadow Presentation
View
Newspaper Presentation
View
Zen Presentation
View
Audio tutorial
Explore all templates
Transcript
CYBERSECURITY
PRESENTATION
CYBERSECUIRTY
INTRODUCTION: CYBERSECURITY IS WHAT PROTECTS OURS SYSTEMS, NETWORKS, AND PROGRAMS FROM BEING DIGITALLY ATTACKED. MANY OF THESE ATTACKS ARE TO FIND OUT PEOPLES PRIVATE INFORMATION OR TO EXTORT MONEY.
10 FACTS ABOUT CYBERSECURITY.
wHAT CAN YOU DO TO PREVENT IT?
There are many things you can do to prevent cybersecurity.
WATCH A CYBER ATTACK OCCUR- cLICK THE LINK BELOW
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html?socialshare=cloud-security-attack
What are a few signs that hackers use?
What can occur when your identity gets stolen?
How can you tell if an email or text is legit?
Deals that are not believableA big sense of urgency Being obvious trying to obtain personal information Poor grammar Using generic greetings
If your identity gets stolen many different things may things may be affected such as: Your finances Credit Mental well-being All of this can cause a large amount of stress in someones life.
There are many different ways you can be cautious such as: Always check email addresses Beware of fake links Never provide personal information If you are paying a bill- go to the direct company website
CYBERSECURITY
'Having your personal information stolen can be very stressful'
Contextualize Your Topic with a Subtitle
types of cybersecurity threats
be very careful when it comes to....
Never click on random links from random emails! This is very important.
(Ang, 2021)
Interactive question
Interactive question
Cybersecurity analyst
What does a cybersecurity analyst do?
"Monitor network traffic for security incidents and events. Investigate incidents and respond to events in real time. Write detailed incident response reports. Install and operate firewalls, encryption programs, and other security software. Fix vulnerabilities. Develop and promote best practices for information security. Conduct threat research. Perform periodic risk assessments and penetration tests." (Staff, 2023)
Contextualize Your Topic with a Subtitle
References What is cybersecurity? (2023, November 9). Cisco. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~types-of-threats Staff, C. (2023, November 29). What does a cybersecurity analyst do? 2023 job Guide. Coursera. https://www.coursera.org/articles/cybersecurity-analyst-job-guide Ang, C. (2021, June 16). The Most Significant Cyber Attacks from 2006-2020, by Country. Visual Capitalist. https://www.visualcapitalist.com/cyber-attacks-worldwide-2006-2020/