Professional Documents
Culture Documents
Lesson 2 - Cybersecurity Overview
Lesson 2 - Cybersecurity Overview
What is Cybersecurity?
Cybersecurity is the branch of security that focuses on protecting computers, networks, data, and
systems from unauthorized access, modification, or destruction. Cybersecurity became very
important nowadays since it is approximated that 1 million potential cyberattack occur every
day. The need to develop cyber defense to protect our systems has never been more important
because cyberthreats have become increasingly more innovative.
Cybersecurity Fundamentals
The CIA Triad
- Confidentiality: preventing access of data to unauthorized parties and ensuring that the
identity of authorized parties is kept private and anonymous. Countermeasures to
confidentiality are:
o Data encryption
o 2FA
o Biometric verification
o Security tokens
- Integrity: this refers to the ability to protect the data that is being transferred across the
system from being captured, modified, or deleted by unauthorized parties.
Countermeasures to integrity are:
o Data backups
o File permission
o Uninterrupted power supply
o Cryptographic checksums
- Availability: the ability to ensure that authorized users can access the system and its
services whenever needed. Countermeasures to availability:
o Back up data to external drives.
o Implementing firewalls
o Having backup power supplies
o Data redundancy
o Network monitoring
Cyber Attacks
A cyber attack is a threat that have been carried out in one of 2 categories:
- Passive: not detected because the attacker doesn’t manipulate the data.
- Active: can be detected because the attacker can steal someone’s identity, manipulate
data, delete data, or insert data.
Cyber attacks are caused by one of 2 parties:
- Insider: initiated from inside the organization.
- Outsider: initiated from outside the organization.
Cybercrime
Cybercrime is the act of gaining access to a computer or other devices that are either standalone
or part of a network and use it as a tool or a target for criminal activity.
Cyber security risks that cause cybercrime arise from different types of actions:
- Inadvertent action: usually done by insiders by accident which means that they didn’t
have any malicious intent.
- Deliberate action: done by insiders and outsiders and this time they do have malicious
intent and a will to harm.
- Inaction: done by insiders because they failed to defend the system during a certain data
breach or attack on the system due to lack of appropriate skills, knowledge, guidance, or
availability of the suitable person to take action.
To be able to understand cyber criminals, first of all you need to understand their motives behind
initiating a cyberattack:
- Political motivations
- Economical motivations
- Socio-cultural motivations
Cybersecurity Tips
- Using a firewall
- Get a good antivirus
- Use anti-spyware solutions
- Update tools automatically
- Use a password manager
- Backup your system and sensitive information
- Encrypt your online traffic using multiple tools
- Stay up-to-date in cybersecurity tools