πŸ›‘οΈ

Cyber Security Overview

Jul 9, 2025

Overview

This lecture provides a comprehensive introduction to cyber security, covering fundamental concepts, types of attacks, essential security measures, key job roles, major certifications, and commonly asked interview questions in the field.

Introduction to Cyber Security

  • Cyber security protects digital systems, networks, and data from unauthorized access and attacks.
  • It is essential for governments, corporations, small businesses, and individuals.
  • Security breaches can result in financial loss, reputational damage, and legal consequences.

Types of Cyber Attacks

  • Malware attacks: Malicious software like viruses, trojans, spyware, and ransomware.
  • Phishing attacks: Fraudulent emails or sites to steal sensitive data.
  • Man-in-the-middle attacks: Intercepting communication between users and systems.
  • Password attacks: Brute force, dictionary attacks, keyloggers, and shoulder surfing.
  • Denial of Service (DoS/DDoS): Overloading systems to deny service to legitimate users.
  • SQL injection: Manipulating database queries to access or change data.
  • Social engineering: Manipulating people to reveal confidential info.

Security Controls and Protection Measures

  • Use firewalls to filter network traffic.
  • Install and update antivirus software regularly.
  • Use unique, complex passwords and change them periodically.
  • Avoid public Wi-Fi for sensitive operations.
  • Employ multi-factor authentication for added security.
  • Be cautious with suspicious emails and downloads.
  • Regularly update and patch operating systems and applications.
  • Utilize VPNs for secure, encrypted connections.

Cyber Security Career Pathways

  • Roles include security analyst, ethical hacker (penetration tester), security architect, CISO (Chief Information Security Officer), malware analyst, and computer forensic analyst.
  • Skills required: knowledge of operating systems, programming, networking, cryptography, and security laws.
  • Certifications enhance career prospects: CEH (Certified Ethical Hacker), CISSP, CISM, CISA, CompTIA Security+, CCNA, CCSP.

Fundamentals of Ethical Hacking

  • Ethical hackers identify vulnerabilities legally to protect systems.
  • The ethical hacking process: Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks, Reporting.
  • Types of hackers: Black Hat (malicious), White Hat (ethical), Gray Hat, Script Kiddies, Nation/State-sponsored, Hacktivists.

Key Concepts & Technical Terms

  • CIA Triad: Confidentiality, Integrity, Availability.
  • Firewall: Hardware/software that controls incoming/outgoing network traffic.
  • IDS/IPS: Systems that detect (and/or prevent) network intrusions.
  • Honeypot: Decoy system to attract and analyze attackers.
  • Botnet: Network of compromised devices controlled for attacks.
  • Encryption/Cryptography: Securing data by transforming it into unreadable formats.

Major Certifications

  • CISSP: Advanced, management-focused security certification (requires 5 years’ experience).
  • CEH: Validates skills in ethical hacking and penetration testing.
  • CISM, CISA, CRISC, CCSP: Focus on management, audit, risk control, and cloud security, respectively.

Interview Preparation

  • Prepare to explain concepts like OSI model, firewalls, VPN, DNS, password attacks, and major types of malware.
  • Be able to discuss security testing types: black/white/gray box, vulnerability scanning, penetration testing, and audit procedures.
  • Understand and apply the CIA triad and principles of risk management and compliance.

Key Terms & Definitions

  • Malware β€” Malicious software designed to harm or exploit systems.
  • Phishing β€” Fraudulent communication intended to steal sensitive information.
  • DDoS β€” Distributed denial of service, overwhelming a system with traffic.
  • Penetration test β€” Simulated attack to find vulnerabilities.
  • IDS/IPS β€” Intrusion Detection/Prevention System, monitors and reacts to threats.

Action Items / Next Steps

  • Review key security concepts and common attack types.
  • Study for foundational certifications (e.g., CEH, Security+).
  • Practice configuring firewalls, IDS/IPS, and conducting vulnerability scans.
  • Prepare for technical and scenario-based interview questions.