SlideShare a Scribd company logo
Module #1:
Module #1:
Introduction to Cyber Security
Introduction to Cyber Security
Estimated time for Module 1 is 3 minutes
What is Cyber Security?
What is Cyber Security?
Cyber or Computer Security is the
protection of computing systems and
the data that these systems store or access.
These systems include:
PC’s
Laptops
SmartPhones
Mobile Devices
Printers
Why is Computer Security
Why is Computer Security
Important?
Important?
Computer Security allows the City of Albuquerque to
carry out its mission by:
• Enabling staff to carry out their jobs,
• Decreases the threat of current and future vulnerabilities
• Supporting critical business processes
• Protecting personal and sensitive information
Why do I need to know about
Why do I need to know about
Cyber Security?
Cyber Security?
It is estimated that 10% of security safeguards are technical in
nature. Firewalls and Intrusion Detection devices are a few
devices that can help prevent approximately 10% of security
threats.
The additional 90% of safeguards rely on each of us. By
understanding and adhering to these safeguards, we can
reduce or eliminate most cyber security threats.
Example: Locking your car doors is the 10%. Making sure
nothing of value is left on the seat, windows are rolled up and
parking in a safe area account for the remaining 90%.
The CIA of Cyber Security
The CIA of Cyber Security
There are many reasons why you should protect
the information you use on your computer.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy
(information integrity)
Availability: Making sure that your information is available when
you need it (by making back-up copies and, if
appropriate, storing the back-up copies off-site)
What does this mean to me?
What does this mean to me?
This means that everyone who uses a computer
or mobile device needs to understand how to
keep their computer, device and data secure.
Information Technology Security is
Everyone’s responsibility
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #1: Computer Security allows us to:
The Answer is E, All of the above
Computer Security allow us to:
A. Enable staff to carry out their jobs,
B. Decrease the threat of current and future vulnerabilities
C. Support critical business processes
D. Protect personal and sensitive information
E. All of the above
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
Question #2: The Integrity of information means:
A. Ensuring that your information remains confidential and only
those who should access that information, can
B. Knowing that no one has been able to change your information,
so you can depend on its accuracy.
C. Making sure that your information is available when you need it
(by making back-up copies and, if appropriate, storing the back-
up copies off-site)
Questions Module 1:
Questions Module 1:
Introduction to Cyber Security
Introduction to Cyber Security
The answer is B. Knowing that your information has not
been changed.
Confidential: Ensuring that your information remains confidential
and only those who should access that information, can
Integrity: Knowing that no one has been able to change your
information, so you can depend on its accuracy.
Availability: Making sure that your information is available when you
need it (by making back-up copies and, if appropriate, storing
the back-up copies off-site)
This concludes Module 1: Introduction
This concludes Module 1: Introduction
to Cyber Security
to Cyber Security
Continue on to module 2: Sensitive Data
Module 2 will provide information on Personal
Identifiable Information or PII and best practices in
protecting this data from theft.

More Related Content

Similar to Module1_Intro to Security_Final.ppt power point (20)

PPTX
gagan internship.pptx
MamthaMam1
 
PPTX
Importance of Cyber_Security_(Shivling).pptx
Shivaduparte
 
PPTX
Cyber
pooja kumari
 
PPTX
Cyber Security and data Security for all.pptx
RajagopalKeshavan
 
PDF
Cyber security
Shivam Yadav
 
PDF
cyber security.pdf
Arivukkarasu Dhanapal
 
PDF
Course Slides for CS_6035_01_Security Mindset (1)
leoyang0406
 
DOCX
Instructor_manual_for_principles_of_information_security_7th_edition.
lecthupper
 
PPTX
Cysecc.pptx
jondon17
 
PPTX
Introduction to intelligence cybersecurity_2
arazaque2675
 
PDF
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
PPTX
Network Security Basics in networking to learn
amansinght675
 
PPTX
Cyber-security Vs Information Security.pptx
amnamahfooz615
 
PPTX
Introduction Of Cyber Security in 2024.pptx
shivjohncena789
 
PDF
The Importance of Cyber Security.pptx (1).pdf
apurvar399
 
PDF
The Importance of Cyber Security.pptx.pdf
apurvar399
 
PDF
A Systematic Literature Review On The Cyber Security
Amy Cernava
 
PPTX
Computer Security
AkNirojan
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PPTX
Information Security and Indian IT Act 2000
Dr. Prashant Vats
 
gagan internship.pptx
MamthaMam1
 
Importance of Cyber_Security_(Shivling).pptx
Shivaduparte
 
Cyber Security and data Security for all.pptx
RajagopalKeshavan
 
Cyber security
Shivam Yadav
 
cyber security.pdf
Arivukkarasu Dhanapal
 
Course Slides for CS_6035_01_Security Mindset (1)
leoyang0406
 
Instructor_manual_for_principles_of_information_security_7th_edition.
lecthupper
 
Cysecc.pptx
jondon17
 
Introduction to intelligence cybersecurity_2
arazaque2675
 
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
Network Security Basics in networking to learn
amansinght675
 
Cyber-security Vs Information Security.pptx
amnamahfooz615
 
Introduction Of Cyber Security in 2024.pptx
shivjohncena789
 
The Importance of Cyber Security.pptx (1).pdf
apurvar399
 
The Importance of Cyber Security.pptx.pdf
apurvar399
 
A Systematic Literature Review On The Cyber Security
Amy Cernava
 
Computer Security
AkNirojan
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
Information Security and Indian IT Act 2000
Dr. Prashant Vats
 

Recently uploaded (20)

PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Learn Computer Forensics, Second Edition
AnuraShantha7
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Learn Computer Forensics, Second Edition
AnuraShantha7
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Ad

Module1_Intro to Security_Final.ppt power point

  • 1. Module #1: Module #1: Introduction to Cyber Security Introduction to Cyber Security Estimated time for Module 1 is 3 minutes
  • 2. What is Cyber Security? What is Cyber Security? Cyber or Computer Security is the protection of computing systems and the data that these systems store or access. These systems include: PC’s Laptops SmartPhones Mobile Devices Printers
  • 3. Why is Computer Security Why is Computer Security Important? Important? Computer Security allows the City of Albuquerque to carry out its mission by: • Enabling staff to carry out their jobs, • Decreases the threat of current and future vulnerabilities • Supporting critical business processes • Protecting personal and sensitive information
  • 4. Why do I need to know about Why do I need to know about Cyber Security? Cyber Security? It is estimated that 10% of security safeguards are technical in nature. Firewalls and Intrusion Detection devices are a few devices that can help prevent approximately 10% of security threats. The additional 90% of safeguards rely on each of us. By understanding and adhering to these safeguards, we can reduce or eliminate most cyber security threats. Example: Locking your car doors is the 10%. Making sure nothing of value is left on the seat, windows are rolled up and parking in a safe area account for the remaining 90%.
  • 5. The CIA of Cyber Security The CIA of Cyber Security There are many reasons why you should protect the information you use on your computer. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy (information integrity) Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 6. What does this mean to me? What does this mean to me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is Everyone’s responsibility
  • 7. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 8. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #1: Computer Security allows us to: The Answer is E, All of the above Computer Security allow us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes D. Protect personal and sensitive information E. All of the above
  • 9. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security Question #2: The Integrity of information means: A. Ensuring that your information remains confidential and only those who should access that information, can B. Knowing that no one has been able to change your information, so you can depend on its accuracy. C. Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back- up copies off-site)
  • 10. Questions Module 1: Questions Module 1: Introduction to Cyber Security Introduction to Cyber Security The answer is B. Knowing that your information has not been changed. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy. Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)
  • 11. This concludes Module 1: Introduction This concludes Module 1: Introduction to Cyber Security to Cyber Security Continue on to module 2: Sensitive Data Module 2 will provide information on Personal Identifiable Information or PII and best practices in protecting this data from theft.