Cybersecurity Class Notes
What is Cybersecurity?
Cybersecurity is the practice of protecting computer systems and
networks from theft, damage, or unauthorized 1 access to the data they
hold. It encompasses a wide range of technologies, processes, and
policies designed to safeguard digital information and infrastructure. It's
a constantly evolving field due to the ever-changing nature of cyber
threats.
Key Concepts:
Threat: A potential danger that can exploit a vulnerability to
breach security.
Vulnerability: A weakness in a system or application that can be
exploited by a threat.
Risk: The potential for loss or damage if a threat exploits a
vulnerability.
Attack: An attempt to exploit a vulnerability.
Data Breach: A security incident where sensitive data is accessed
or stolen.
Types of Cyber Threats:
Malware: Malicious software designed to damage or disable
computer systems. Examples: Viruses, worms, ransomware,
spyware.
Phishing: Deceptive attempts to obtain sensitive information (e.g.,
usernames, passwords) by masquerading as a trustworthy entity.
Denial-of-Service (DoS) Attacks: Overwhelming a system with
traffic to make it unavailable to legitimate users.
Man-in-the-Middle (MitM) Attacks: An attacker intercepts
communication between two parties, potentially eavesdropping or
manipulating data.
SQL Injection: An attack that exploits vulnerabilities in web
applications to inject malicious SQL code, potentially gaining
access to databases.
Cross-Site Scripting (XSS): An attack that injects malicious
scripts into websites, which can then be used to steal user data or
hijack user sessions.
Ransomware: Malware that encrypts a victim's files and demands
a ransom for their decryption.
Social Engineering: Manipulating individuals into divulging
confidential information or performing actions that compromise
security.
Key Principles of Cybersecurity:
Confidentiality: Ensuring that sensitive information is only
accessible to authorized individuals.
Integrity: Maintaining the accuracy and completeness of data.
Availability: Ensuring that systems and data are accessible to
authorized users when needed.
Key Cybersecurity Practices:
Strong Passwords: Using complex and unique passwords for each
account.
Multi-Factor Authentication (MFA): Adding an extra layer of
security beyond passwords.
Regular Software Updates: Patching vulnerabilities in software.
Firewalls: Controlling network traffic and blocking unauthorized
access.
Antivirus and Anti-malware Software: Detecting and removing
malicious software.
Data Backup and Recovery: Regularly backing up data to ensure
it can be recovered in the event of a data loss.
Security Awareness Training: Educating users about
cybersecurity threats and best practices.
Vulnerability Scanning and Penetration Testing: Proactively
identifying vulnerabilities in systems.
Incident Response Planning: Developing a plan for responding to
security incidents.
Cybersecurity Frameworks:
NIST Cybersecurity Framework: A set of standards, guidelines,
and best practices for managing cybersecurity risk.
ISO 27001: An international standard for information security
management systems.
Cybersecurity Roles:
Security Analyst: Monitors security systems, investigates security
incidents, and implements security controls.
Security Engineer: Designs, implements, and maintains security
systems and infrastructure.
Security Architect: Develops security architectures and strategies
for organizations.
Chief Information Security Officer (CISO): Oversees the
organization's cybersecurity program.
Penetration Tester (Ethical Hacker): Attempts to find
vulnerabilities in systems to improve security.
Emerging Cybersecurity Threats:
Internet of Things (IoT) Security: Securing the growing number
of connected devices.
Cloud Security: Protecting data and applications in cloud
environments.
Artificial Intelligence (AI) and Machine Learning (ML) in
Cybersecurity: Using AI and ML to detect and respond to cyber
threats.
Mobile Security: Securing mobile devices and applications.
Further Study:
Cybersecurity is a constantly evolving field. Further study should
include exploring specific areas of interest, such as network security,
application security, data security, or cloud security. Pursuing
certifications like CompTIA Security+, Certified Ethical Hacker (CEH),
or Certified Information Systems Security Professional (CISSP) can
enhance career prospects. Staying up-to-date with the latest threats and
vulnerabilities is crucial in this field. Hands-on experience through labs
and projects is invaluable.