O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Assessment 2-WPS Office.pptx

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Próximos SlideShares
Daytuy ti Pa Quiz Mi Apo.pptx
Daytuy ti Pa Quiz Mi Apo.pptx
Carregando em…3
×

Confira estes a seguir

1 de 6 Anúncio
Anúncio

Mais Conteúdo rRelacionado

Mais recentes (20)

Anúncio

Assessment 2-WPS Office.pptx

  1. 1. Assessment 2 Understanding Cyber Security Incidents
  2. 2. What is cyber security threat? A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack vectors.
  3. 3. What are the sources of cyber security threat? Cyber threats come from numerous threat actors including:
  4. 4. Hostile Nation-States National cyber warfare programs provide emerging cyber threats ranging from propaganda, website defacement, espionage, disruption of key infrastructure to loss of life. Terrorist Groups Terrorist groups are increasingly using cyber attacks to damage national interests. They are less developed in cyber attacks and have a lower propensity to pursue cyber means than nation-states. It is likely that terrorist groups will present substantial cyber threats as more technically competent generations join their ranks.Hostile
  5. 5. Hacktivists Hacktivists activities range across political ideals and issues. Most hacktivist groups are concerned with spreading propaganda rather than damaging infrastructure or disrupting services. Their goal is to support their political agenda rather than cause maximum damage to an organization. Hackers Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data. Hackers may break into information systems for a challenge or bragging rights. In the past, this required a high level of skill. Today, automated attack scripts and protocols can be downloaded from the Internet, making sophisticated attacks simple.Hacktivists
  6. 6. In your own experience (s) what do you do to be safe from cyber security threats? On my phone i have anti- virus and im updating my phone when there are new update. I also using two factor or multifactor authentication and using strong passwords.

×