Professional Documents
Culture Documents
GROUP ASSIGNMENT:
NEWSLETTER (CYBERSECURITY)
PREPARED BY:
PREPARED FOR:
SITI KHADIJAH
1. What is Cyber
BINTI MUHAMMAD Security?
(2022675376) 2. Facets of Cyber
Security
3. Types of Cyber
Security Threats
NUR AZLINA BINTI 4. Importance of
MUHAMAMAD
(2022616034)
Cyber Security
5. Benefits of Cyber
Security
6. Challenges of Cyber
Security
NOR SHARLINIE
ADILA BINTI
SHAMSUDDIN
(2022464446)
NUR SYABILLA
QUWAIMA BINTI
MOHD SHAHRIL
(2022881992)
2
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
INTRODUCTION
3
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
Data Cyber
Eliminating
protection attack
Threats
We deplay tools Cyber security
Cyber security from robust sollutions your
provide firewalls and existing security
comprehensive infrastucture and
digital protection best in class anti the implement
to bussiness. malware powerful solution
solutions. of cyber attack.
4
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
Safety
•With cyber security, companies have peace of mind that
unauthorized access to their network or data is protected.
Both end users, organizations and their employees benefit.
5
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
MALWARE
Malware refers to software designed to break into or damage a computer
system without the express permission of the owner. this term is often used
by computer professionals as an umbrella for forms of software code that
are capable of harming the computer without the user's knowledge or
without interfering with the user's privacy. this software is considered as
dangerous software. This is because this software contains computer
viruses, computer worms, trojan horses and other unwanted computer
malware. This malware is also known as computer pollution.
PHISHING
A technique to try to obtain sensitive data, such as bank account
numbers, through fraudulent requests in emails or on websites,
where the perpetrator poses as a legitimate business or reputable
person.
MALVERTISING
Malvertising — or malicious advertising — is a relatively new
cyberattack technique that injects malicious code within digital ads.
Difficult to detect by both internet users and publishers, these
infected ads are usually served to consumers through legitimate
advertising networks. Because ads are displayed to all website
visitors, virtually every page viewer is at risk of infection.
PASSWORD ATTACK
Password attacks are one of the most common forms of
corporate and personal data breach. A password attack is
simply when a hacker trying to steal your password.
6
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
5147 5020
1021
91 57
As we can see the number of cases from 2017 are very high which is
5,147 cases then it got lower by the 2 next year then the number cases
got a little bit higher which is 1,201 cases on 2020 and it reach to 5,020
cases by the year of 2021.
7
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
8
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
USE STRONG
USE ANTIVIRUS PASSWORD
SOFTWARE
Ensure your
Security solutions like passwords are
Kaspersky Total not easily
Security will detect and guessable.
removes threats.
DO NOT OPEN
EMAIL UPDATE YOUR
ATTACHMENT SOFTWARE AND
FROM UNKNOWN OPERATING
SENDER SYSTEM
9
IMC401 FOUNDATION OF INFORMATION AND COMMUNICATION TECHNOLOGY
REFERENCES
1. Cyber Security: Definition, Importance and Benefits of Cyber Security (December 9, 2020).
Retrieved on 8 December 2022 from
https://www.logpoint.com/en/blog/what-is-cyber-
security/#:~:text=With%20cyber%20security%2C%20companies%20have,it's%20also%20mitiga
tion%20and%20response
3. The Community Cyber Security Maturity Model by Gregory B. White (November 15, 2011).
Published by IEEE. Retrieved on 11 December 2022 from
https://ieeexplore.ieee.org/document/6107866
4. Sharing Cyber Intelligence and Collaboration by Ali Melih Kanca (December 2, 2021). Published
by IEEE. Retrieved on 11 December 2022 from
https://ieeexplore.ieee.org/document/9654328
5. The Effects of Cyber-security Risks on Added Value of Consulting Services for IT-security
Management Systems in Holding Companies by Ilya I. Livshitz, Pawel A. Lontsikh, Natalya P.
Lontsikh (September 7, 2020). Published by IEEE. Retrieved on 11 December 2022 from
https://ieeexplore.ieee.org/document/9322883
6. Cyber Security Situational Awareness among Parents by Nazilah Ahmad, Umi Asma’ Mokhtar,
Wan Fariza Paizi Fauzi, Zulaiha Ali Othman (November 13, 2018). Published by IEEE. Retrieved
on 12 December 2022 from
https://ieeexplore.ieee.org/document/8626830
7. Security Operation Centre: Situation Awareness, Threat Intelligence and Cybercrime by Cyril
Onwubiko (June 19, 2017). Published by IEEE. Retrieved on 12 December 2022 from
https://ieeexplore.ieee.org/document/8074844
10
8. Four Reasons Why Cybersecurity is Important by Bunchana Technologies. Retrieved on 12
December 2022 from
https://www.buchanan.com/why-cybersecurity-important/
9. What Are The Top 5 Emerging Cybersecurity Challenges? (October 18, 2022). Retrieved on 12
December 2022 from
https://www.thesagenext.com/blog/emerging-cybersecurity-challenges
11