You are on page 1of 3

Hacking

Malware

Phishing

Spam

Spyware

Trojans

Viruses

In the last 10 years over a billion personal data records were stolen or leaked

The big problem is the old infrastructure.

A game of cat and mouse

In 1079 the first Warm

1984 cyberspace

1986 the first computer virus - The Brain in Pakistan

1991 The first antivirus Norton Antivirus

Technology impacts everyone

Security is critical for technology

C.I.A.

Confidentiality who has access to my data

Integrity ho can modify my data

Availability access to data

Technology today is almost all based on softer

The coders are controlling the security of the program they are making/ building.

The lack of security concept for programing in schools is a big problem.

The key question is what your softer can not do

Or showed not do

What you have done to make sure that your product does just it supposed to do.

-----------------------------------------
What has star wars in common with cybersecurity?

Star wars was released in 1977, do you know that the internet security infrastructure of today was
design. In 1977, before the internet as we know existed.

Encrypted channel like VPN (Virtual private network), provides security

Knowledge skills all that matters.

-------------------------------------

Ethical hacking

We all should learn minimal skills of hacking.

Cherry keyboard (music keyboard)

Machine, computer and robots they all work on a protocol. That is a set of regulations designed by
humans. That means that technical you are fooling a human brain, not a computer.

Cyber cure technologies

Cure your technology

One golden rule in hacking is that one cannot attack another persons who have the same knowledge
as you.

You should learn basic knowledge in school. It is important to learn how to hack yourself to manage
better your vulnerabilities.

Social media, if Facebook was a country, it would be the third largest country in the word after china
and India. 1.5 billion Users

Easy access to personal information through social media platforms.

We have to secure ourselves.

The cloud a single entry point can be accessed from almost anywhere

The access of the cloud can be abused in different ways like:

Theft or destruction of data


DoS attacks (denial of service)
Hijacking of cloud service traffic and redirecting it to other sources of malicious
content

The encryption

On the internet nothing is free we either pay with money or with our data.

Solution to increase security for:

Mobile devices

Cloud computer certifications and third party audits/ cloud infrastructure security / network
security (secure network architecture, secure access points and transmission protection)
Personal/business information on social media protect your passwords, secure your answers,
strengthen your settings, and be less friendly (about 15% Facebook users never checked their
privacy settings )

Authentication and identity management

Like text message, digital signature

You might also like