0% found this document useful (0 votes)
25 views14 pages

The Evolution of Cybersecurity

Uploaded by

Mara Sanguesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views14 pages

The Evolution of Cybersecurity

Uploaded by

Mara Sanguesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

01/15

THE EVOLUTION
OF CYBERSECURITY
IT323CYBSEC
02/15

Initial Concepts: In the early days of computing, security


was largely about protecting physical access to
computers. The concept of cybersecurity was more
about ensuring physical security and managing access.

Emergence of Threats: As networking began to take


shape, notably with the development of ARPANET (the
precursor to the internet), the first computer worms and
viruses began to emerge. The 1980s saw the creation of
the first viruses like the "Elk Cloner" and "Brain" virus.

First Security Tools: Tools like antivirus software started


to be developed to combat these early threats. The
need for security solutions began to be recognized
more broadly.
03/15

Rapid Expansion
Malware Evolution
Introduction of Firewalls
04/15

Complex Attacks

Emergence security
Strategies

Focus on Awareness
and Training
05/15
Studio Shodwe

www.reallygreatsite.com
01 02 03
10/15

Standards and best


practices are Frameworks are sets
Regulations are sets of
generally agreed- of standards and best
standards that
upon rules for practices that
organizations must organizations can use
maintaining security, follow, generally due
generally within an to ensure their
to legal obligation, overall security.
organization. and define the
Standards may These are optional,
responsibilities but good practice for
come as individual
organizations have. organizations to
recommendations,
or as part of a follow.
framework.
07/15

Cybercrime is, any


crime that makes use
of or targets a
computer.
08/15

Digital Forensics is the process


of gathering the evidence of a
cybercrime in a way that the
evidence can be used in a court
of law.
09/15

The Computer Fraud and Abuse Act (CFAA) is a


US law that is used to prosecute cybercrime. At
its core, the act makes it illegal to intentionally
access a computer without authorization, or to
access a computer in a way that exceeds
authorization that has been granted.
10/15

HIPAA
The Health Insurance Portability and
Accountability Act (HIPAA) is a federal law
designed to modernize various aspects of
healthcare and insurance. More importantly for
cybersecurity, it introduced regulations and
standards requiring entities that handle
Protected Health Information (PHI) to ensure its
security and privacy.
10/15

GLBA
The Gramm-Leach-Bliley Act
(GLBA) is a federal law governing
financial institutions, requiring
them to protect sensitive
customer information and
disclose how they share that
information.
PCI DSS 10/15

The Payment Card Industry


Data Security Standard (PCI
DSS, or PCI for short) is a
regulation developed by
credit card companies and
governing merchants that
handle credit card data.
12/15

Frameworks are not generally


a one-size-fits-all solution to
cybersecurity. Instead, they are
a starting point for
organizations to customize to
their needs and threats.
THANK
15/15

YOU!

You might also like