The Need for Cybersecurity:
Personal Data
Introduction to personal data
What is Cybersecurity
Your online and offline identity
Your data
Where is your data?
Your computing devices
Personal data as a Target
They want your money
They want your identity
Organizational Data
Types of Organizational data
Confidentiality, Integrity, and Availability
Security Breach example 1
Security breach example 2
Attackers and cybersecurity professionals
Types of attackers
Internal and external threats
Cyberwarfare
What is cyberwarfare?
The purpose of cyberwarfare
Summary