Focuses in protecting computers, networks, program and data from unintended or authorized access, change or destruction.
Cybersecurity
is the environment in which communication over computer networks occurs
Cyberspace
3 Features of Security
is a crime that involves computer, the network that may been used in the commission of a crime or it may be the target
Cybercrime
It includes cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel..
CybercrimePrevention Act of 2012,
officially recorded as Republic Act No. 10175
Types of Malwares
SECURITY TOOLS
identifying intrusions and detecting threats from both outside and within the organization.
Network Security Monitoring
process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot
Encryption
Web Vulnerability Scanning
Penetration Testing
7 Best Cyber Security Penetration Testing Tools
Packet Sniffers And Password Auditing
Security Devices
surveillance systemcapable of capturing images andvideosthat can be compressed, stored or sent over communication networks
Video Surveillance
Records and stores recorded footages
Video Recording Devices
Intrusion
detection system (IDS)
Intrusion prevention systems
Access Control Devices
Firewalls
Unified Threat Management
Also known as anti-malware, it is a computer program used to prevent, detect and remove malware
Antivirus
In securing one’s systems,
actions must be taken in three
areas
involves those actions taken to discover failures in prevention (realizing that 100% prevention is never possible);
detection