AJS555-Week4-Guthrie

pptx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

555

Subject

Computer Science

Date

Jan 9, 2024

Type

pptx

Pages

16

Uploaded by MasterEchidnaPerson661

Report
Prevention and Mitigation Analysis Ries Guthrie University of Phoenix AJS/555 Dr. Frank Mineo December 11, 2023
Agenda Information Security Cyber Security Computer Security Mobile Security Plan Cyberwarfare Cyberterrorism 2
Information, Cyber, and Computer Security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Information Security Protects all forms of information Protects against unauthorized access, disclosure modification, and disruptions Provides integrity, confidentiality, and availability Example Data security, incidence response, vulnerability management
Cyber Security Protects computer systems, networks, and data Protects against cyber crimes and cyber frauds Provides integrity, confidentiality, and availability Example Network security, cloud security, critical infrastructure security
Computer Security Protects computer systems and data Protects against unauthorized access and use Provides integrity, confidentiality, and availability Example Alarms, doors and locks, firewalls, security software
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
How are they different? Information Security Protects digital assets Protects physical assets Cyber Security Protects digital assets 7 Computer Security Protects physical assets
Mobile Security Plan 8
Mobile Security Plan 9 Protects mobile devices from data leaks, malicious threats, and other potential dangerous Includes different approaches, design, and applications
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Establishing an Effective Mobile Security Plan 10 Develop an effective policy Penetrating testing / Vulnerability assessment Update and patch software regularly Provide education and training
Cyberwarfare vs. Cyberterroris m
Cyberwarfare A set of actions to disrupt, damage, or destroy the enemy’s computer system(s) Example: Ransomware, phishing, distributed denial-of-services attack 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyberterrorism A premeditated attack on information systems, programs, and data A cyber attack that generates fear in the public Example: Viruses, hacking, defacing 13
The Differences Cyberwarfare Cyberterrorism 14 Conducted by state bodies as part of their national military strategy Aimed at disrupting critical infrastructure of other countries or to gain intelligence Carried out using highly skilled, advanced techniques Conducted by non-state actors as a part of a political agenda Aimed at inflicting harm on a specific target Carried out using basic cyber techniques
References 9/3/20XX Presentation Title 15 Choudary, A. (2019, January 23). What is Computer Security? Introduction to Computer Security . Edureka; Edureka. https://www.edureka.co/blog/what-is-computer-security/ Columbia Engineering. (2020, July 13). The Beginner’s Guide to Cybersecurity . Columbia Engineering Boot Camps. https://bootcamp.cvn.columbia.edu/blog/the-beginners-guide-to-cybersecurity/ Gtmars, V. (2023, June 19). Digital Combat: A Guide to Cyber Warfare and CyberTerrorism | HackerNoon . Hackernoon.com. https://hackernoon.com/digital-combat-a-guide-to-cyber-warfare-and-cyberterrorism
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References 9/3/20XX Presentation Title 16 Gupta, H. (2020, October 16). Developing an Effective Mobile Security Strategy . 7T, Inc. | Dallas. https://7t.co/blog/developing-effective-mobile-security-strategy/ Kidd, C. (2022, November 21). What’s InfoSec? Information Security Explained . Splunk-Blogs. https://www.splunk.com/en_us/blog/learn/infosec-information-security.html RealWorldCyberSecurity. (2020, April 27). Defining Cybersecurity . The Startup. https://medium.com/swlh/defining-cybersecurity-44cf1b1d6ae0