Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

CYBER

SECURITY
INDIGENOUS
REFERENCES
BOOKS INTERNET
INDIGENOUS REFERENCES:

“Cyber Security is one’s sense of privacy in


cyberworld or in online platforms.”
- Ms. Isturis, Grade 11 Research and Daily Life Teacher
INDIGENOUS REFERENCES:

“Cyber Security is the practice of


protecting computer systems or
networks against cyber crime or
digital attacks.”
- Raymond Garcia, Older Brother
BOOKS:
“Fears over cybersecurity
increasingly compromise our
notions of privacy and have
allowed surveillance and
Internet filtering to become
more common and accepted
at work, home, and at the
governmental level.”
- Cyber Security: What
Everyone Needs to Know, Peter W. Singer,
Allan Friedman (2014)
BOOKS:
“Cyber Security is an issue
that can impact us at the
personal level as users of the
Internet and at the national
defense level as an
advanced persistent threat.”
- Cyber Warfare Second
Edition Techniques, Tactics and Tools
for Security Practitioners, Jason
Andress, Steve Winterfeld (2014)
BOOKS:
“Dark Territory explores the origins of cyber warfare in the
United States, such as then President Ronald Reagan
making the first presidential computer-security directive
and the later development of the National Security
Agency. Cyber war is only going to become more
pressing issue worldwide, so understanding this history is
essential. Though much of the ways governments
approach cybersecurity is mysterious, an analysis of past
efforts can show some of the goals and assumptions
made by governments worldwide.”

- Dark Territory: The Secret History of Cyber War, Fred Kaplan


(March, 2016)
INTERNET:
Cyber Security
o It is the act of protecting computers, servers
and other technological devices and
electronic systems, networks and data from
malevolent or dangerous attacks.

o also known as information technology security


or electronic information security.
INTERNET:
Categories:
o Network Security is the practice of securing a
computer network from intruders.
o Application security focuses on keeping
software and devices free of threats.
o Information security protects the integrity and
privacy of data, both in storage and in transit.
INTERNET:
Categories:
o Operational security includes the processes
and decisions for handling and protecting
data assets.
o Disaster recovery and business continuity
define how an organization responds to a
cyber-security incident or any other event
that causes the loss of operations or data.
INTERNET:
Categories:
o End-user education addresses the most
unpredictable cyber-security factor: people.
Teaching users to delete suspicious email
attachments, not plug in unidentified USB
drives, and various other important lessons is
vital for the security of any organization.
INTERNET:
Cyber Security

o the protection of internet-connected


systems, including hardware, software
and data, from cyberattacks.
INTERNET:
Cyber Security
o refers to the body of technologies, processes,
and practices designed to protect networks,
devices, programs, and data from attack,
damage, or unauthorized access. Cyber
security may also be referred to as information
technology security
INTERNET: References:
o Kaspersky: What is Cyber-Security? (2019). Retrieved from
https://www.kaspersky.com/resource-center/definitions/what-
is-cyber-security
o Rouse, M., Gillis, A., Clark, C., Rouse, M., & Rouse, M. (n.d.).
What is Cybersecurity (Cyber Security)? Everything You Need
to Know. Retrieved from
https://searchsecurity.techtarget.com/definition/cybersecurity
o What is Cyber Security? Definition, Best Practices & More.
(2019, July 15). Retrieved from
https://digitalguardian.com/blog/what-cyber-security.
Submitted To:
Mrs. Arce

Submitted By:
#13 Libanan #26 Brito
#1 Abundo #31 Gallego
#2 Arriola #36 Ligaya
#10 Garcia #41 Marasigan
#18 Monzon

You might also like