Professional Documents
Culture Documents
Malware
Phishing
Spam
Spyware
Trojans
Viruses
In the last 10 years over a billion personal data records were stolen or leaked
1984 cyberspace
C.I.A.
The coders are controlling the security of the program they are making/ building.
Or showed not do
What you have done to make sure that your product does just it supposed to do.
-----------------------------------------
What has star wars in common with cybersecurity?
Star wars was released in 1977, do you know that the internet security infrastructure of today was
design. In 1977, before the internet as we know existed.
-------------------------------------
Ethical hacking
Machine, computer and robots they all work on a protocol. That is a set of regulations designed by
humans. That means that technical you are fooling a human brain, not a computer.
One golden rule in hacking is that one cannot attack another persons who have the same knowledge
as you.
You should learn basic knowledge in school. It is important to learn how to hack yourself to manage
better your vulnerabilities.
Social media, if Facebook was a country, it would be the third largest country in the word after china
and India. 1.5 billion Users
The cloud a single entry point can be accessed from almost anywhere
The encryption
On the internet nothing is free we either pay with money or with our data.
Mobile devices
Cloud computer certifications and third party audits/ cloud infrastructure security / network
security (secure network architecture, secure access points and transmission protection)
Personal/business information on social media protect your passwords, secure your answers,
strengthen your settings, and be less friendly (about 15% Facebook users never checked their
privacy settings )