Understanding Cyber Security Essentials

Aug 25, 2024

Cyber Security Lecture Notes

Introduction to Cyber Security

  • Cybersecurity involves techniques that secure digital components, networks, data, and computer systems from unauthorized access.
  • Importance for both individuals and organizations to understand and implement cybersecurity measures.

Case Study: Anne's Experience

  • Background:
    • Anne frequently shops on www.shoppingcart.com, with her information stored for convenience.
  • Incident:
    • Received a fraudulent email claiming eligibility for a discount voucher.
    • Believed email was legitimate and entered account credentials.
    • Resulted in unauthorized access to her account and loss of money.

Types of Cyber Attacks

  1. Malware Attacks:

    • Types include Trojan, adware, spyware.
    • Can infect systems through suspicious downloads.
  2. Phishing Attacks:

    • Fraudulent emails that appear legitimate.
    • Aim to install malware or steal sensitive information (credit card info, login credentials).
  3. Man-in-the-Middle Attack:

    • Hacker intercepts communication between a user and a website, often via unsecured networks.
  4. Password Attacks:

    • Cracking passwords using common passwords or brute force methods.

Cyber Security Practices Implemented by Anne

  • Firewall:
    • Acts as a barrier between the computer and the internet, filtering traffic to safeguard the network.
  • Honeypots:
    • Dummy systems designed to lure attackers away from the real systems.
  • Unique Passwords:
    • Use of alphanumeric passwords to enhance security.
  • Antivirus Software:
    • Protects against malware and other threats.
  • Avoiding Unknown Emails:
    • Being cautious with unsolicited emails.

Cyber Attacks on Organizations

  • Advanced Persistent Threat (APT):
    • Long-term access to networks for continuous information theft.
  • Denial of Service (DoS) Attack:
    • Network flooded with traffic, preventing legitimate requests from being processed.
  • Distributed Denial of Service (DDoS) Attack:
    • Similar to DoS, but from multiple systems.
  • SQL Injection Attack:
    • Manipulation of database queries to access or alter database content.

Careers in Cyber Security

  • Ethical Hacker:
    • Identifies and resolves vulnerabilities in networks.
  • Security Architect:
    • Designs robust security structures.
  • Chief Information Security Officer (CISO):
    • Oversees enterprise security and information safety.

Conclusion

  • Anticipation of increased cyber attacks with the growth of global digital data.
  • Need for cybersecurity professionals to prevent these attacks.
  • Encouragement to pursue certifications in cybersecurity for a lucrative career opportunity.