A Report On Introduction To Security, Cyberspace, Cybercrime and Cybersecurity
A Report On Introduction To Security, Cyberspace, Cybercrime and Cybersecurity
SECURITY, CYBERSPACE,
CYBERCRIME AND CYBERSECURITY
BY
U2/16/CSC/0091
OVERVIEW
• Brainstorming
• Definition Security
• Security Features
• Concept of Cyberspace
• Concept of Cybercrime
• Concept of Cybersecurity
• The way forward
INTRODUCTION
• What is Security?
Security according to two boys of 10 years old
BRAINSTORMING
• What is Security?
Security According to Junior High School ICT teacher
DEFINITION SECURITY
DEFINITION SECURITY
No organization can be considered "secure" for any time beyond the last
verification of adherence to its security policy.
If your manager asks, "Are we secure?"
you should answer, "Let me check."
If he or she asks, "Will we be secure tomorrow?
" you should answer, "I don't know."
Such honesty will not be popular, but this mind-set will produce greater success for
the organization in the long run.
SECURITY FEATURES
• Security has three features
SECURITY FEATURES
Confidentiality
• Confidentiality is roughly equivalent to privacy. Measures undertaken to
ensure confidentiality are designed to prevent sensitive information from
reaching the wrong people, while making sure that the right people can in
fact get it:
• Confidentiality Assurance that information is shared only among authorized
persons or organizations.
SECURITY FEATURES
Integrity
• Assurance that the information is authentic and complete.
• In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle
SECURITY FEATURES
Availability
• Assurance that the systems responsible for delivering, storing and processing information are
accessible when needed, by those who need them.
• Availability of information refers to ensuring that authorized parties are able to access the
information when needed
CONCEPT OF CYBERSPACE
CONCEPT OF CYBERSPACE
• Cyberspace
Cyberspace is "the environment in which communication over computer networks occurs
• Cyber Crime
Computer crime, or cybercrime, is any crime that involves a computer and a network.
The computer may have been used in the commission of a crime, or it may be the target
CONCEPT OF CYBERCRIME
CONCEPT OF CYBERCRIME
• Phishing
Phishing is a cybercrime in which scammers send a malicious email to individual(s) or mass
users of any organization by impersonating a known individual or a business partner or a
service provider.
CONCEPT OF CYBERCRIME
• Hacktivism
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated
reason. Individuals who perform hacktivism are known as hacktivists.
A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and
bring attention to a political or social cause. For example, hacktivists might leave a highly visible message on
the homepage of a website that gets a lot of traffic or embodies a point-of-view that is being opposed.
Hacktivists also often use denial-of-service (DoS) attacks to disrupt traffic to a particular site.
CONCEPT OF CYBERCRIME
Based in the realities of the world, Are MAC and LINUX computer SECURED
more than Windows Computers?
THE WAY FORWARD