top of page
iMac

WHAT IS CYBERSECURITY?

Cybersecurity is the defense of computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. 

It is present in our daily internet usage across technological devices that can store personal information.

​

​

​

Person Analyzing Data
Image by FLY:D
Urban Clouds

HIGH DATA USAGE

Cybersecurity Ventures predicts humans will store 200 zettabytes of data across personal devices, connected appliances, public infrastructures and data centers by 2025, and all that data represents a tempting target for thieves.

Online Meeting

  Why It's  Important

REMOTE WORK

More Americans are working from home, which means more people are logging into devices remotely and using cloud storage and services. They’re also sharing – and generating – more data in the process. Each login and share is yet another point of vulnerability.

Blue Light

LOOPHOLES

There could be 25.4 billion IoT devices in use by 2030. As more everyday devices and appliances connect to home networks and store user or customer data on the cloud, the number of potential security blind spots goes up.

How did these 3 Change cybersecurity?

article-2262831-16F5AF9B000005DC-61_306x423.jpg

High Schooler Jonathan James was 15 when he hacked the computers of the US Department of Defense and NASA installing a ‘backdoor’ on its servers. This allowed him to intercept thousands of internal emails from different government organisations including ones containing usernames and passwords for various military computers. 

Jonathan James

Computer Scientist

kxjj3k-kxjj46spy.0625.la01.jpg.webp

Boeing Engineer Greg Chung stole over 2 Billion aerospace documents and gave them to China in an attempt to supply them with military and spacecraft intel. It was a big threat to the US and homeland security's monitoring on foreign countries a number one priority.

Greg Chung

Boeing Engineer

ray-tomlinson-0e51be09-c37c-44aa-b69a-42c7fcdeb31-resize-750.jpeg

Ray Tomlinson and Bob Thomas created the computer program "Creeper" as an experimental computer program. Creeper was a worm — a type of computer virus that replicates itself and spreads to other systems. This led to the first antivirus in history being made which was called the reaper

Ray Tomlinson

Programmer

Key Points That She Mentioned
  • Cybersecurity is the art of protecting our devices from unauthorized access.

    Attacks can involve the following

  • Phishing

  • Malware

  • DDOS Attacks

  • Password Attacks

    You can protect yourself by doing the following

  • Defining clear boundaries

  • Using network security control devices

  • Carrying out security testing

​

​

​

COUNTERCLAIMS

​

"The Government is spying on us for fun"

Online surveillance  helps to detect threats such as terrorism, crime, child pornography, tax evasion and fraud.

"My iPhone is secure enough. I don't need to worry about my account management"

Even the smallest amount of malware can encrypt your whole system within seconds, so it's important to be aware of your device security.

"Cyber Security is not important compared to politics and climate change"

Cyber Security is a global issue that keeps our data and networks safe and secure from vulnerable threats, can you imagine if your cell phone provider didn't have a firewall for your texts?

How we should address cyber security moving forward
  • protecting cyber critical infrastructure protecting privacy and sensitive data

0_ZnNHGO20RCbUGatL.gif
  • establishing and implementing a comprehensive cybersecurity strategy 

​

  • continue securing federal systems and information

  • performing effective oversight of security networks

​

  • protecting privacy and sensitive data

Works Cited

WORKS CITED

Sarah Hospelhorn Based in Brooklyn, et al. “8 Events That Changed Cybersecurity Forever.” Varonis, https://www.varonis.com/blog/events-that-changed-cybersecurity. 

“What Is Cybersecurity?” Cisco, Cisco, 28 May 2022, https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html. 

“7 Types of Cyber Security Threats.” University of North Dakota Online, 2 Oct. 2020, https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/. 

“Cybersecurity.” Cybersecurity | Homeland Security, https://www.dhs.gov/topics/cybersecurity. 

“Cyber Crime.” FBI, FBI, 3 May 2016, https://www.fbi.gov/investigate/cyber. 

“Cyber Security in 2 Minutes - YouTube. https://www.youtube.com/watch?v=Q2W_nNdReXM. 

© 2022 by Jayson Kiggundu

bottom of page