What is cyber security and why it matters

The CIA triad: the foundational principles

Threats, motives, and types of cyber crime

Who’s on the other side: types of hackers

Common attack types

Business scenario and a quick quiz

Answer: This is computer as the target. The systems themselves were attacked and infected by malware, causing service disruptions.

Short history of cyber crime

How cyber security works: essential controls

  • Anti-phishing measures — toolbars, email filtering, and user awareness to block fraudulent sites and messages.
  • Cryptography — encrypt sensitive data in transit and at rest; choose appropriate protocols based on the value and sensitivity of the data.
  • Secure DNS — protect domain name resolution to prevent traffic hijacking or redirection to malicious servers.

Who is a cyber security expert and what do they do?

Domains within cyber security

Courses and certifications worth considering

Key takeaways

Next steps

TIME BUSINESS NEWS

JS Bin