(This video chapter begins at 18:19 and ends at 19:18. Click on the blue dot at the 18:19 timestamp to play the video for this module.)
Wrapping Up
Although this presentation is coming to a close, we hope that your journey to Cyber Security is just beginning. Please take a moment to review and update your Action Plan. This will be a key tool to guide your progress in the days, weeks, months, and years to come. We wish you the best of luck on the rest of your travels!
Our focus quote for this module:
“People ask me all the time, ‘What keeps you up at night?’ And I say, ‘Spicy Mexican food, weapons of mass destruction, and cyber-attacks.” – Dutch Ruppersberger
Words from the Wise
- Janet Reno: Everybody should want to make sure that we have the cyber tools necessary to investigate cyber-crimes, and to be prepared to defend against them and to bring people to justice who commit it.
- Kevin Mitnick: Somebody could send you an office document or a PDF file, and as soon as you open it, it’s a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
- Frank Abagnale: The police can’t protect consumers. People need to be more aware and educated about identity theft. You need to be a little bit wiser, a little bit smarter and there’s nothing wrong with being skeptical. We live in a time when if you make it easy for someone to steal from you, someone will
Lessons Learned
- How to recognize cyber security threats
- How to prevent the threats from happening to your network
- How to take action against a cyber criminal who commits an act against your network
Congratulations!
You’ve completed our Cyber Security Professional Development Course.