Safety in Cyberspace Technical Aspect of Cyber
1 / 1

Safety in Cyberspace Technical Aspect of Cyber

Author : trish-goza | Published Date : 2025-05-16

Description: Safety in Cyberspace Technical Aspect of Cyber Safety What is a cyberspace In simpler terms Cyberspace is the online world where digital activities happen over a network Cyberspace refers to the virtual environment created by

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Safety in Cyberspace Technical Aspect of Cyber" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Safety in Cyberspace Technical Aspect of Cyber:
Safety in Cyberspace Technical Aspect of Cyber Safety What is a cyberspace? In simpler terms: Cyberspace is the "online world" where digital activities happen over a network. Cyberspace refers to the virtual environment created by interconnected digital networks where information is stored, shared, and communicated. It includes: The internet (websites, emails, social media) Computer systems and networks (both public and private) All digital communications (like messaging apps, cloud storage, etc.) What do we do in cyberspace? Communication : Sending emails, Messaging, Video calls and online meetings Social Interaction Using social media, Sharing photos, videos, and updates, Participating in forums and chat groups Information Access: Browsing websites, Reading news and blogs, Researching using search engines Online Transactions : Internet banking, Shopping on e-commerce platforms, Paying bills and booking tickets Entertainment : Streaming videos (YouTube, Netflix), Listening to music, Playing online games Work and Learning : Remote working, Online classes, e-learning platforms, Accessing cloud-based tools like Google Drive Data Sharing and Storage: Uploading and downloading files, Using cloud storage Cybersecurity Activities: Protecting data with antivirus and firewalls, Using passwords and encryption, Monitoring systems for threats Threats in Cyberspace Cybersecurity Threats : Hacking, Malware, Phishing Privacy Risks: Data breaches, Tracking and surveillance Financial Risks: Online fraud, Identity theft, Scams like fake schemes, investment fraud, or lottery scams online. Psychological and Social Risks: Cyberbullying, Addiction, Misinformation Technical Risks: System crashes or data loss due to poorly protected systems, Software vulnerabilities that can be exploited by attackers, Unpatched devices left open to attack. Phishing Attacks Description: Deceptive emails, messages, or websites that trick users into providing sensitive information (e.g., login credentials, credit card numbers). Variants: Spear phishing, whaling, vishing, smishing. Malware Description: Malicious software designed to damage, disrupt, or gain unauthorized access to systems. Examples: Viruses, worms, trojans, ransomware, spyware, adware. Ransomware Description: A type of malware that encrypts files and demands payment for the decryption key. Impact: Loss of access to critical data; often targets hospitals, schools, and businesses. Denial-of-Service (DoS) Attacks Description: Overloading a system, server, or network with traffic to render it unavailable to users. Targets: Websites, online services, infrastructure. Password Attacks Description: Attempts to obtain or guess passwords. Techniques: Brute force, dictionary attacks, credential stuffing, keylogging. Insider Threats Description: Security risks originating from within the organization—employees, contractors, or partners. Types: Malicious insiders, negligent insiders. How to know if our security is compromised? Unusual Device Activity Device getting heated-up Slow Performance Account

Download Document

Here is the link to download the presentation.
"Safety in Cyberspace Technical Aspect of Cyber"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

10 December 2013 CYBERSPACE The Militarisation of Cyberspace: Cyber defence in the Polish MOD 10 December 2013 “Transforming Cyber While at War… HUMAN RIGHTS IN CYBERSPACE Cyber Center of Excellence Cyber Warfare and Importance of Cyber Awareness for   Parents This presentation has been created by the Center for Cyber Safety and Education Major General Hao Yeli Chinese People146s Liberation Army ret Achieve and Maintain Command Vision for US Cyber Command9ec4c12949a4f3 Cyber System-Centric Approach To Cyber Security and CIP