You are on page 1of 11

UNIVERSITI TEKNOLOGI MARA CAMPUS PUNCAK PERDANA

BACHELOR OF INFORMATION SCIENCE (HONS)

FACULTY OF INFORMATION MANAGEMENT

FOUNDATION OF INFORMATION COMMUNICATION TECHNOLOGY (IMC401)

GROUP ASSIGNMENT:

NEWSLETTER (CYBERSECURITY)

PREPARED BY:

SITI KHADIJAH BINTI MUHAMMAD (2022675376)

NUR AZLINA BINTI MUHAMMAD (2022616034)

NOR SHARLINIE ADILA BINTI SHAMSUDDIN (2022464446)

NUR SYABILLA QUWAIMA BINTI MOHD SHAHRIL (2022881992)

PREPARED FOR:

MISS AIDA ROZIHAN BINTI MOHAMAD ASRI

SUBMISSION DATE: 19 DECEMBER 2022


IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

THE IMPORTTANCE OF CYBER SECURITY

OUR GROUP MEMBER:


CONTENT:

SITI KHADIJAH
1. What is Cyber
BINTI MUHAMMAD Security?
(2022675376) 2. Facets of Cyber
Security
3. Types of Cyber
Security Threats
NUR AZLINA BINTI 4. Importance of
MUHAMAMAD
(2022616034)
Cyber Security
5. Benefits of Cyber
Security
6. Challenges of Cyber
Security
NOR SHARLINIE
ADILA BINTI
SHAMSUDDIN
(2022464446)

NUR SYABILLA
QUWAIMA BINTI
MOHD SHAHRIL
(2022881992)

2
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

What is Cyber Security?

INTRODUCTION

Just like you protect your home


by locking your door when you [Facets of
leave, you should also protect
your organization’s network and Cyber Security]
computers with watertight
The best cyber security
cyber security solution. solutions will be all-
encompassing and include:
• Application security
• Cloud security
• Data Security
• Endpoint security
WHAT IS CYBER • Identity
SECURITY? management
• Infrastructure and
database security
• Mobile Security
• Network security
Cyber security refers to • Operational security
protecting systems connected It should also include
to the internet from threats disaster recovery or
business continuity
in cyberspace, some of them
planning, which outlines
business-critical. It involves how an organization will
protecting an organization’s recover from any cyber
software, data and hardware attacks in the future as well
as preventative methods,
and helps prevent
such as educating
cybercriminals from gaining employees.
access to devices their
networks.

3
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

The Important of cyber security

Data Cyber
Eliminating
protection attack
Threats
We deplay tools Cyber security
Cyber security from robust sollutions your
provide firewalls and existing security
comprehensive infrastucture and
digital protection best in class anti the implement
to bussiness. malware powerful solution
solutions. of cyber attack.

Protects all Enables


categories of
data from theft
Credibility
and damage Cybers attack often
make online
This includes sensitive platforms, like
data, personally websites, unpleasant
identifiable or inaccessible. That
information (PII), could result in a bad
protected health reputation, which
information (PHI), might be difficult to
personal information,
intellectual property, undo. Cyber security
data, and is, hence, important
governmental and for the protection of
industry information your platform from
systems. such risks.

4
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

Benefits of Cyber Security

Safety
•With cyber security, companies have peace of mind that
unauthorized access to their network or data is protected.
Both end users, organizations and their employees benefit.

Protect Personal Information


•In this age of a digitally-driven world, one of the most
valuable commodities is personal information. If a virus is
able to collect personal information about your employees
or customers, it is quite likely that it will be sold or used
to steal their money.

Support Your IT Professional


•Typically, a good security system equips your organization
and employees with the best tools, techniques and
assistance in combating cyber attacks and criminals.

Protects and Enhances


Productivity
Viruses infecting your systems and
network will result in functioning
resulting in the almost impossibility of
further working. In effect, this will
cause downtime in work for your staff
and wastage additionally bringing the
entire company to a halt.

Prevents crashing of websites


If you're a small business, you're probably
hosting your own website. If your system is
infected, there's a good risk your website
will be forced to go down. This means that
not only will you incur losses due to missed
transactions, but you will also run the risk
of losing trust from your clients and some
viruses may cause long-term damages to your
systems.

5
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

TYPES OF CYBER SECURITY THREATS

MALWARE
Malware refers to software designed to break into or damage a computer
system without the express permission of the owner. this term is often used
by computer professionals as an umbrella for forms of software code that
are capable of harming the computer without the user's knowledge or
without interfering with the user's privacy. this software is considered as
dangerous software. This is because this software contains computer
viruses, computer worms, trojan horses and other unwanted computer
malware. This malware is also known as computer pollution.

PHISHING
A technique to try to obtain sensitive data, such as bank account
numbers, through fraudulent requests in emails or on websites,
where the perpetrator poses as a legitimate business or reputable
person.

MALVERTISING
Malvertising — or malicious advertising — is a relatively new
cyberattack technique that injects malicious code within digital ads.
Difficult to detect by both internet users and publishers, these
infected ads are usually served to consumers through legitimate
advertising networks. Because ads are displayed to all website
visitors, virtually every page viewer is at risk of infection.

PASSWORD ATTACK
Password attacks are one of the most common forms of
corporate and personal data breach. A password attack is
simply when a hacker trying to steal your password.

6
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

STATISTIC ON CYBER SECURITY THREAT


CASES FROM 2017 TO 2021

THE GRAPH BELOW IS SHOWING THE CASES


NUMBER OF PHISHING IN MALAYSIA FROM
2017 TO 2021.

PHISHINIG CASES IN MALAYSIA FROM 2017 TO 2021


PHISHING CASES

5147 5020

1021
91 57

2017 2018 2019 2020 2021

As we can see the number of cases from 2017 are very high which is
5,147 cases then it got lower by the 2 next year then the number cases
got a little bit higher which is 1,201 cases on 2020 and it reach to 5,020
cases by the year of 2021.

7
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

CYBER SECURITY CHALLENGES

Continuous growth in technology which presents


It cybercriminals with an ever-growing list of potential
opportunities of exploitation. Cybercriminals
always constantly develop new methods of conducting
cyberattacks.
evolving

The more data, the more attractive a target a company


The becomes. Especially when that data is sensitive
information. Not only does this put the people whose
Amount of data is stored by the organization at risk of having
their information stolen but it also puts the
Data organization itself at risk of lawsuits.

Employees at a company need to understand what


actions are risky. Such as opening links from
The Need for unknown emails or accidently bringing malware on
Training and their smartphones. This requires time off their normal
tasks for training and the company to budget for that
Education training.

There is currently a shortage in the field of cyber


Insufficient of security. Some estimates indicate that there are as
many as 2 Million cyber security jobs around the
Cybersecurity
world that are nor filled. This challenge is somewhat
Professional overcome by machine by learning and other
technological advances.

8
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

CYBER SECURITY TIPS

USE STRONG
USE ANTIVIRUS PASSWORD
SOFTWARE
Ensure your
Security solutions like passwords are
Kaspersky Total not easily
Security will detect and guessable.
removes threats.

DO NOT OPEN
EMAIL UPDATE YOUR
ATTACHMENT SOFTWARE AND
FROM UNKNOWN OPERATING
SENDER SYSTEM

These could be This means you benefit


from the latest security
infected with malware.
patches.

9
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY

REFERENCES
1. Cyber Security: Definition, Importance and Benefits of Cyber Security (December 9, 2020).
Retrieved on 8 December 2022 from
https://www.logpoint.com/en/blog/what-is-cyber-
security/#:~:text=With%20cyber%20security%2C%20companies%20have,it's%20also%20mitiga
tion%20and%20response

2. What is Cyber Security?. Retrieved on 9 December 2022 from


https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security

3. The Community Cyber Security Maturity Model by Gregory B. White (November 15, 2011).
Published by IEEE. Retrieved on 11 December 2022 from
https://ieeexplore.ieee.org/document/6107866

4. Sharing Cyber Intelligence and Collaboration by Ali Melih Kanca (December 2, 2021). Published
by IEEE. Retrieved on 11 December 2022 from
https://ieeexplore.ieee.org/document/9654328

5. The Effects of Cyber-security Risks on Added Value of Consulting Services for IT-security
Management Systems in Holding Companies by Ilya I. Livshitz, Pawel A. Lontsikh, Natalya P.
Lontsikh (September 7, 2020). Published by IEEE. Retrieved on 11 December 2022 from
https://ieeexplore.ieee.org/document/9322883

6. Cyber Security Situational Awareness among Parents by Nazilah Ahmad, Umi Asma’ Mokhtar,
Wan Fariza Paizi Fauzi, Zulaiha Ali Othman (November 13, 2018). Published by IEEE. Retrieved
on 12 December 2022 from
https://ieeexplore.ieee.org/document/8626830

7. Security Operation Centre: Situation Awareness, Threat Intelligence and Cybercrime by Cyril
Onwubiko (June 19, 2017). Published by IEEE. Retrieved on 12 December 2022 from
https://ieeexplore.ieee.org/document/8074844

10
8. Four Reasons Why Cybersecurity is Important by Bunchana Technologies. Retrieved on 12
December 2022 from
https://www.buchanan.com/why-cybersecurity-important/

9. What Are The Top 5 Emerging Cybersecurity Challenges? (October 18, 2022). Retrieved on 12
December 2022 from
https://www.thesagenext.com/blog/emerging-cybersecurity-challenges

10. 8 Habits to Stay Cyber-Safe. Retrieved on 13 December 2022 from


https://health.ucdavis.edu/itsecurity/8-habits-stay-cyber-safe.html

11

You might also like