Module G - Cybersecurity
Module G - Cybersecurity
SECURITY BY
DEPARTMENT OF BIOLOGICAL SCIENCES
MODULE G
OK
LESSON OUTLINE
01 02 03
INTRODUCTION TO CATEGORIES OF TYPES OF CYBER
CYBERSECURITY CYBER CRIME CRIME
04 05 06
TYPES OF SECURITY ADVANTAGE OF SAFETY TIPS TO
TOOLS CYBER SECURITY CYBER CRIME
Cybersecurity is as simple
as A B C:
Always Be Careful!
01
INTRODUCTION
TO CYBER
SECURITY
WHAT IS CYBERSECURITY?
✓ Cybersecurity is the practice of
protecting computer systems,
networks, and programs from digital
attacks, damage, or unauthorized
access.
© IT GOVERNANCE
OK 02
CATEGORIES OF
CYBER CRIME
CATEGORIES
COMPUTER AS THE COMPUTER AS THE
TARGET WEAPON
● Computer is used to ● Computer is used to
attack another commit real-world
computer. crime.
● E.g. hacking, viruses, ● E.g. credit card
worms, DoS attacks frauds
03
THINK BEFORE
YOU CLICK
TYPES OF
CYBER CRIME
HACKING
Hacking refers to the unauthorized access,
manipulation, or exploitation of computer
systems, networks, or data usually in a large
organization such as the government.
© SIMPLEARN.COM
PHISHING
Phishing is a digital version of fishing where
cybercriminals are attempting to lure people
into revealing sensitive information, such as
passwords or credit card numbers.
© FRONTIER BLOG
DENIAL OF SERVICE
A Denial of Service (DoS) attack is a digital
traffic jam that disrupts the normal
functioning of a computer system, network, or
website.
© NAMESHIELD
SPAM EMAIL
Spam emails are unsolicited and often
irrelevant messages sent in bulk to a large
number of recipients.
© GMASS
MALWARES
Malware, a.k.a malicious software, is a
broad term that encompasses various
types of harmful software designed to
disrupt, damage, or gain unauthorized
access to computer systems.
© RAPPLER
04
TYPES OF
SECURITY
TOOLS
TYPES OF SECURITY TOOLS
Firewalls Antivirus Software Virtual Private
Networks (VPNs)
It monitors and controls It detects, prevents,
incoming and outgoing
and removes malicious It encrypts your
network traffic,
software (malware) to internet connection,
deciding which data
keep your system enhancing privacy and
packets can enter or
security, especially
leave based on healthy. when you're using public
predetermined security
Wi-Fi.
rules.
© MAVERICK-AI
NOTABLE USES OF AI NOWADAYS
© WORLD YMCA
NOTABLE USES OF AI NOWADAYS
© INDIA TODAY
NOTABLE USES OF AI NOWADAYS
© EUROPEAN PARLIAMENT
ARTIFICIAL INTELLIGENCE
© WEKA
CHALLENGES OF
ARTIFICIAL INTELLIGENCE
1. Ethical concerns
2. Bias in algorithms
3. Job displacement
4. Lack of transparency
5. Data privacy and security
6. Regulatory challenges
7. Explainability and interpretability
8. AI in warfare
THANKS!
What part of the topic did you
least understand? ☺