Cyber Security
Cyber Security
Cyber Security
Introduction to Information
Technology and Cyber Security
Content
✓ Overview of IT fundamentals
✓ Essential components of Information Technology
✓ Core Components of IT Infrastructure and IT System
Architecture
✓ Challenges and Future trends in IT
✓ Importance of cybersecurity in modern IT environments
✓ Importance in Protecting data and system
✓ Growing prevalence of Cyber threats
✓ Role in Ensuring Policy and confidentiality
✓ Basic concepts and terminology in cybersecurity
✓ Cyber Security Concepts
✓ Importance of protecting digital information
✓ Cyber Security Threats , Measures and Terminology
Overview of IT fundamentals
✓ Definition of Cybersecurity:
✓ Purpose of Cybersecurity:
attacks.
Essential components of Information
Technology
People: The most important part as they make end users
more productive
Hardware:
Includes personal computers, servers, routers, and other physical
devices essential for IT operations.
Software:
Comprises applications used by an organization, web servers, and
operating systems that facilitate business functions.
Networking:
Ensures smooth network operations and communication between
different IT components.
Challenges in Information Technology
❖ Workload
01 02 03 04 05 06 07 08
01 02
Data Protection Data Assets
01 Fundamental 02 03
Builds Trust Branding
Right
Incorporating
Data protection Effective data data protection
is a fundamental protection into your
right that is measures help branding
safeguarded by to establish and strategy
law. build trust with enhances your
customers. organization's
reputation.
04 Prevention of 05
Fraud Cost-Effective
Confidentiality:
Confidentiality is a core component of security policies, ensuring
that sensitive information is protected from unauthorized access.
• Abuse • Threat
The improper use of a system or A potential cause of an unwanted
resource that can lead to harm or incident that may result in harm
damage. to a system or organization.
04 01
03 02
• Attack •Vulnerability
An intentional act that aims to A weakness in a system that can be
cause damage or disruption to as exploited by threats to gain
System or network. unauthorized access or cause harm.
Protecting Digital Information
Importance of protecting Digital Information
Types of Malware
❑ Ransomware : A type of malware that prevents or limits users
from accessing their system
❑ Fileless Malware : Malicious code that works directly within a
computer's memory instead of the hard drive
❑ Mobile Malware : Malicious software specifically designed to
target mobile devices
❑ Wiper Malware : Deletes or destroys an organization's access to
files and data.
❑ Hybrid Malware : Combination of two or more different types of
attacks
❑ Cryptojacking : Type of cybercrime that involves the unauthorized
use of people's devices
MITM and Real-life Instances
A man-in-the-middle (MITM) MITM attacks can involve There are numerous real-
awareness.
Denial of Service and SQL Injection
01 02 03 04
documentation
vulnerability
computer network.
Cybersecurity Terminology
➢ Hacker, Black Hat : A computer hacker who violates laws
➢ Man in the Middle Attack : Cyberattack where the attacker secretly relays
victim.
while Cyber Security protects them from threats. As digital reliance grows,