SlideShare uma empresa Scribd logo
1 de 8
Day 1 Quiz Study Slides
 Cyber Security is the body of technologies,
 processes, and practices designed to
 protect networks, computers, programs,
 and data from attack, damage, or
 unauthorized access
   National Cyber Security Awareness campaign
    (stop.think.connect)

   Stop
     • Before using the internet consider the risks and learn to
       spot potential problems
   Think
     • Take a moment to be certain the path ahead is clear.
       Consider how your actions online could impact your safety,
       or your family’s
   Connect
     • Enjoy the Internet with greater confidence, knowing you’ve
       taken the right steps to safeguard yourself and your
       computer.
 Anybody      can be a threat to TVA’s
    computer security. Typically, these threats
    lie in three categories:

   Cyber Terrorism
   Hacktivism
   Scam Artists
 Cyber  Terrorism: The use of internet based
  attacks in terrorist activities
 Recent news of Chinese Terrorists
  suspected of hacking US government and
  business facilities
 Hacktivism: The use of computers and computer
  networks to promote political ends, chiefly free
  speech, human rights, and information ethics.
 Anonymous
   • Freedom fighters of the internet (digital robin
     hood)
   • Known for hacking many government websites
   • Janurary 25, 2013 Anonymous hacked the
     United States Commision website
 Scam   Artists can be anyone from a loosely
  organized group to one of your fellow
  employees.
 Scams typically intend to steal valuable
  information related to identification such as:
  social security numbers, credit card numbers,
  and passwords.
 So  why does TVA need to be worried?
 TVA controls many valuable resources and
  the power to the majority of the Tennessee
  Valley. Reasons to target TVA include:
  • Making a political statement
  • Terrorist attacks on nuclear facilities
  • Steal employee information

Mais conteúdo relacionado

Mais procurados

Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 

Mais procurados (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Hacking
Hacking Hacking
Hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Digital law
Digital lawDigital law
Digital law
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 

Destaque

Swami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwajSwami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwajArvind Bhardwaj
 
Vivekananda's ideas on education
Vivekananda's ideas on educationVivekananda's ideas on education
Vivekananda's ideas on educationedusparx
 
Swami Vivekananda History.ppt
Swami Vivekananda History.pptSwami Vivekananda History.ppt
Swami Vivekananda History.pptShama
 
Swami Vivekananda
Swami VivekanandaSwami Vivekananda
Swami Vivekanandaindrakumar
 
Swami vivekananda
Swami vivekananda Swami vivekananda
Swami vivekananda GTClub
 

Destaque (6)

Swami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwajSwami vivekanand presentation by arvind kumar bhardwaj
Swami vivekanand presentation by arvind kumar bhardwaj
 
Vivekananda's ideas on education
Vivekananda's ideas on educationVivekananda's ideas on education
Vivekananda's ideas on education
 
Swami vivekananda
Swami vivekanandaSwami vivekananda
Swami vivekananda
 
Swami Vivekananda History.ppt
Swami Vivekananda History.pptSwami Vivekananda History.ppt
Swami Vivekananda History.ppt
 
Swami Vivekananda
Swami VivekanandaSwami Vivekananda
Swami Vivekananda
 
Swami vivekananda
Swami vivekananda Swami vivekananda
Swami vivekananda
 

Semelhante a O'leary Cyber Secutiry

Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeakingAdarsh
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxAshwini831102
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 

Semelhante a O'leary Cyber Secutiry (20)

Brooks18
Brooks18Brooks18
Brooks18
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 

O'leary Cyber Secutiry

  • 1. Day 1 Quiz Study Slides
  • 2.  Cyber Security is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access
  • 3. National Cyber Security Awareness campaign (stop.think.connect)  Stop • Before using the internet consider the risks and learn to spot potential problems  Think • Take a moment to be certain the path ahead is clear. Consider how your actions online could impact your safety, or your family’s  Connect • Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.
  • 4.  Anybody can be a threat to TVA’s computer security. Typically, these threats lie in three categories:  Cyber Terrorism  Hacktivism  Scam Artists
  • 5.  Cyber Terrorism: The use of internet based attacks in terrorist activities  Recent news of Chinese Terrorists suspected of hacking US government and business facilities
  • 6.  Hacktivism: The use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics.  Anonymous • Freedom fighters of the internet (digital robin hood) • Known for hacking many government websites • Janurary 25, 2013 Anonymous hacked the United States Commision website
  • 7.  Scam Artists can be anyone from a loosely organized group to one of your fellow employees.  Scams typically intend to steal valuable information related to identification such as: social security numbers, credit card numbers, and passwords.
  • 8.  So why does TVA need to be worried?  TVA controls many valuable resources and the power to the majority of the Tennessee Valley. Reasons to target TVA include: • Making a political statement • Terrorist attacks on nuclear facilities • Steal employee information