Professional Documents
Culture Documents
Cyber Security Session 1
Cyber Security Session 1
Cyber Security Session 1
Have you ever wondered how the internet came to be? It's a story that starts way
back in the midst of the Cold War (1940s-1990s) when tensions between the United
States and the Soviet Union were high. Back then, the U.S. Department of Defense
envisioned a communication network that could survive even if parts of it were
damaged or destroyed.
But with great connectivity came great responsibility (and unfortunately, some
challenges). As the internet became more interconnected and information readily
available, malicious actors saw an opportunity. This is where the story of
cybersecurity begins.
Cybercrime started to emerge in the early days of the internet. Think of it as the
dark side of the digital world, where people try to steal information, disrupt systems,
or cause damage.
Some of the first major cyberattacks shook things up and showed the need for
strong security measures. Let's take a look at a couple of examples:
The Morris Worm (1988): This self-replicating worm, like a mischievous digital creature,
exploited weaknesses in internet routing protocols and caused widespread disruptions.
The ILOVEYOU virus (2000): This email-borne worm disguised itself as a love letter, tricking
users into opening an attachment that infected their computers and stole personal information.
Cybersecurity is all about safeguarding information systems, networks, and data. It's
like putting up a digital shield to defend against unauthorized access, use,
disclosure, disruption, modification, or destruction of our valuable information.
Safety: Deals with the protection of life and assets against fire, natural
disasters, and accidents.
Security: Addresses vandalism, theft, and attacks by individuals.
1. Physical security: protect people, physical assets and the workplace from
various attacks.
But for information we have:
2. Computer Security- COMPUSEC:
Protection of information processed and stored in the computer.
3. Network security: protection of information in networking devices and
connections.
4. Communication security COMSEC: protection of information in communication
media.
Basic definitions:
An attack:
It is an act or event that exploit a vulnerability.
An attack is accomplished by a threat agent
Review Questions: -
Differentiate between: Safety and Security.
Define the Communication Security.
What’s Cyber security?
What’s the definition of vulnerability?
Define an attack.