CYBER Magazine QUOTED FROM THE JOURNAL HAKARA Cyber Security. MADE OF MAY 2023
OUR TEAM 2 REGULER B INTRODUCTION MAY 2023 Hasan - Alex - Bintang - Hasbi- Ikbal Rifa - Cahya - Rivky - Wandani 01
TABLE OF CONTENT 0 _ 2 0 _ 3 0 _ 4 0 _ 5 0 _ 6 0 _ 7 0 _ 8 TABLE OF CONTENT GET TO KNOW THE LATEST CYBERSECURITY THREATS SECURITY IN THE DIGITAL AGE NETWORK AND DATA PROTECTION OPERATING SYSTEM IN PREVENTING ATTACKS MOBILE DEVICES AND MOBILE APPLICATION E-COMMERCE AND ONLINE TRANSACTION 02
CYBER SECURITY GET TO KNOW THE LATEST CYBERSECURITY THREATS 1 RANSOMWARE ATTACKS Ransomware is a type of malware that encrypts data on the victim's device and demands a ransom payment so that the data can be returned. 2 PHISHING ATTACKS Phishing is an attack in which an attacker attempts to obtain sensitive information, such as passwords or financial data, by impersonating a trusted entity via e-mail. 3 ATTACK THROUGH INTERNET OF THINGS The Internet of Things (IoT) refers to a network of devices connected to the internet, such as smart home devices, security cameras or medical devices. 03 DDoS attacks Cryptojacking attack AI and Machine Learning Attacks Insider Threats Ransomware Attack CYBER MAGAZINE CYBER THREATS
SECURITY DIGITAL ERA Security in the digital era refers to efforts made to protect data, information, computer systems and digital infrastructure from threats and attacks that exist in the digital environment. 04 CYBER DIGITAL THE IMPORTANCE OF PRIVACY IN THE DIGITAL AGE CYBER MAGAZINE
NETWORK PROTECTION C Y B E R N E T W O R K 0 5 N E T W O R K S E C U R I T Y Network Security Refers to measures and technologies used to protect computer networks from threats and attacks. MOR E I N F O D A T A P R O T E C T I O N Data Protection involves measures taken to safeguard the confidentiality, integrity and availability of data stored and processed within a system or network. MORE INFO INFO SECURIT Y Information Technology Security is a broader term that includes aspects of network security, data protection. MORE I N F O C Y B E R M A G A ZIN E P R O P E R U S E A N D C O N F I G U R A T I O N
PREVENTING ATTACKS CYBER SYSTEM SYSTEM BASED SECURITY 01 Operating Systems to Prevent Cyber Attacks This topic will cover various security techniques and mechanisms in the operating system to prevent cyber attacks. 02 Microkernel and Security This topic will discuss about microkernel-based operating systems and how this design can help in protecting the system from attacks. 03 Containerization Technology This topic will focus on using containerization technologies, such as Docker or Kubernetes, in operating systems to prevent attacks. CYBER MAGAZINE 06
MOBILE DEVICES CYBER MOBILE Communicate instantly with other people anywhere in the world quickly and easily. Messenger Ipad iPad is a useful device for increasing productivity and efficiency in everyday work. CYBER MAGAZINE Twitter Twitter has various functions that make it a popular social media platform. 07 THE BENEFITS OF MOBILE DEVICES AND MOBILE APPLICATIONS
E-COMMERCE AND ONLINE TRANSACTION CYBER E-COMMERCE CYBER MAGAZINE 08 THREAT TO ELECTRONIC COMMERCE Electronic commerce involves the exchange of personal information between customers and businesses.
Always implement strong network security, in order to reduce the risk of cyber attacks. THANKS +123-456-7890 @hasaanw_ hasanwirayuda.github.io www.universitysubang.com