Introduction To Cybersecurity

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

Introduction to

Cybersecurity
Learning Objectives

• To introduce the
concepts of
cybersecurity.
• To understand the
CIA concepts.
• To discuss the
principles of IT
security.

2
“Cybersecurity refers to a set of
techniques used to protect the
integrity of networks, programs
and data from attack, damage or
unauthorized access.”

What is Cybersecurity?
Security in a nutshell

Computer Security Network Security Internetwork Security


Generic name for the collection Measures to protect data during Measures to protect data during
of tools designed to protect data their transmission their transmission over a
and to prevent hackers collection of interconnected
For distributed systems and the networks
For shared systems such as time- use of networks and
sharing systems, systems communications facilities for For a collection of
accessed over a public telephone carrying data between terminal interconnected networks such as
network user and computer and between an Internet
computer and computer

4
What is a “secure” computer
system?

To decide whether a computer system is


“secure”, you must first decide what
“secure” means to you, then identify the
threats you care about.

5
Why study cybersecurity?
Our network connectivity is only growing.
Job opportunities are projected to grow substantially
Specialties within cyber security are increasing
This job can be hard to outsource
You get to be a hero sometimes
You have multiple viable educational paths
It’s a career of consistent change
You get to solve complex technical puzzles
6
Basic Components of Cybersecurity

Confidentiality is the protection of Confidentiality: Who is authorized to


personal information. Confidentiality use data?
means keeping a client’s information
between you and the client, and not Integrity: Is data good?
telling others including co-workers, Availability: Can access data whenever
friends, family, etc. need it?
Integrity, in the context of computer
systems, refers to methods of ensuring
that data is real, accurate and
safeguarded from unauthorized user
modification.
Availability, in the context of a
computer system, refers to the ability
of a user to access information or
resources in a specified location and in
the correct format.

7
Principles of Security

• Security is a process, not a product


//meaning, CCTV doesn’t mean you’re secured. A security is always a process

• Computer Security is not just about computer systems


• Security and convenience are inversely proportional
//The higher the security the inconvenient it gets
• Security succeeds or fails based on the weakest link
// No matter how secure your defense is, if there’s a person who has the will to do a crime it will happen.
• Hackers are generally technologists (as opposed to programmers, they build system)
• Utilize Multiple Layers of Defense
//Don’t focus on one layer of security, depends on level
• Focus your security energy on dealing with the most likely threat
• One aspect of security is obscurity

8
References

• Volonino, L, Robinson S. R., “PRINCIPLES AND PRACTICES OF


INFORMATION SECURITY”, Pearson/Prentice Hall, 2004
• Vacca, J. A., “MANAGING INFORMATION SECURITY (1st Edition)”,
Elsevier, 2010
• Stallings, W., “CRYPTOGRAPHY AND NETWORK SECURITY (5th
Edition)”, Pearson/Prentice Hall, 2011
• Paul, “What is Cybersecurity? – A Beginner’s Guide to Cybersecurity
World”, www.edureka.co, 2019
• Flavin, B., “Why Study Cyber Security? 8 Reasons to Remember”,
https://www.rasmussen.edu/degrees/technology/blog/why-study-cyber-securi
ty
/, 2019

You might also like