FINAL TERM Topic Understanding Cybersecurity. BSA - BSMA
FINAL TERM Topic Understanding Cybersecurity. BSA - BSMA
• Malware: This is a broad term that encompasses various types of malicious software designed to
harm or exploit a system. This includes viruses, worms, Trojans, ransomware, spyware, and
adware.
• Phishing: This is a social engineering attack where attackers pose as legitimate entities (like a bank
or a reputable company) to trick individuals into revealing sensitive information such as login
credentials, credit card details, or personal information.
• Ransomware: This is a type of malware that encrypts a victim's files and demands a ransom in
exchange for the decryption key. Paying the ransom is not recommended, as it does not guarantee
the return of files and encourages criminal activities.
• Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS): In a DoS attack, a single
system floods a target system, service, or network with excessive, unnecessary traffic to make it
unavailable. DDoS attacks involve multiple systems working in tandem to achieve the same effect.
• Man-in-the-Middle (MitM): In this type of attack, an attacker intercepts or alters communications
between two parties without their knowledge. This can allow the attacker to eavesdrop on sensitive
information or even inject malicious content.
• SQL Injection: This is a technique where attackers inject malicious SQL code into a database
query, potentially allowing them to retrieve or modify data they shouldn't have access to.
• Cross-Site Scripting (XSS): This attack involves injecting malicious scripts into web pages
viewed by other users. It can lead to the theft of session cookies, personal information, or the
defacement of websites.
• Insider Threats: These are threats that come from within an organization. This could be a
disgruntled employee, contractor, or someone with authorized access who abuses their privileges.
• Zero-Day Exploits: These are vulnerabilities or weaknesses in software that are not yet known to
the vendor or public. Attackers can exploit these before a patch or fix is available.
• Social Engineering: This involves manipulating individuals into divulging confidential
information or performing actions that compromise security. This can include techniques like
pretexting, tailgating, or baiting.
• Credential Stuffing: Attackers use previously stolen usernames and passwords from one site and
try them on other sites, relying on the fact that many people reuse passwords.
• IoT (Internet of Things) Vulnerabilities: As more devices become connected to the internet, they
can be targeted for exploitation, especially if they have weak security measures.
• Fileless Malware: This type of malware operates in a system's memory, leaving no trace on the
hard drive. It's harder to detect using traditional antivirus solutions.
• Eavesdropping (Packet Sniffing): Attackers intercept network traffic to gain unauthorized access
to sensitive information.
➢ It's crucial for individuals and organizations to be aware of these threats and take measures to
protect their systems and data. This includes practices like regular software updates, strong
password policies, security awareness training, and the use of firewalls and antivirus programs.
Topics that can help you easily understand encryption and security protocols:
What is Encryption?
Definition and purpose of encryption.
Types of Encryptions:
Symmetric Encryption vs. Asymmetric Encryption.
Key Terms:
Plaintext, Ciphertext, Encryption Key, Decryption Key.
Encryption in Practice:
How encryption is used in messaging apps, online banking, and secure browsing.
Challenges in Encryption:
Quantum computing threats, backdoors, and key management.
Security Protocols:
What are Security Protocols?
Definition and purpose of security protocols.
Secure Communication:
How protocols ensure secure data transfer.
➢ These topics cover the basics of encryption and security protocols. Starting with these will
provide you with a solid foundation to build upon. As you become more comfortable with
these concepts, you can explore more advanced topics in the field of cybersecurity.
Security protocols and encryption are fundamental components of cybersecurity. They work
together to secure communications, protect data, and ensure the integrity of information. Let's delve
into each of them:
Security Protocols: Security protocols are sets of rules and procedures that govern how data is
exchanged in a network or system. They define the steps and methods for authentication,
authorization, and secure communication between parties.
Types:
Functions:
Authentication:
Security protocols verify the identity of parties involved in a communication, ensuring that they
are who they claim to be.
Authorization:
Once authenticated, protocols establish what actions or data a party is allowed to access or perform.
Integrity:
They ensure that data is not altered or tampered with during transmission.
Confidentiality:
They encrypt data to prevent unauthorized access or eavesdropping.
Encryption: Encryption is the process of converting plaintext (readable data) into ciphertext
(unreadable data) using an algorithm (encryption key) and a specific method (encryption
algorithm). The ciphertext can only be decrypted back to its original form with the corresponding
decryption key.
Types:
Symmetric Encryption:
In symmetric encryption, the same key is used for both encryption and decryption. It's fast but
requires secure distribution of the key.
Asymmetric Encryption:
Also known as public-key cryptography, it uses a pair of keys: a public key for encryption and a
private key for decryption. It's slower but eliminates the need for secure key distribution.
Common Algorithms:
A widely used symmetric encryption algorithm known for its speed and security. It comes in
different key lengths (AES-128, AES-192, AES-256).
RSA (Rivest-Shamir-Adleman):
A widely used asymmetric encryption algorithm. It's based on the mathematical properties of large
prime numbers.
Uses:
Data Protection:
Encryption is used to protect sensitive data at rest (stored on devices or servers) and in transit
(during communication).
Secure Communication:
It ensures that only authorized parties can access and understand the information being exchanged.
Digital Signatures:
Encryption is used in digital signatures to verify the authenticity of a message or document.
Secure Storage:
It's used to safeguard data on devices, such as laptops, smartphones, and USB drives.
➢ Both security protocols and encryption are crucial tools in the field of cybersecurity. They work
together to create a secure environment for data and communications in an increasingly
interconnected world.
Implementing basic security measures is crucial for protecting your personal information, devices,
and online accounts. Here are some fundamental steps you can take to enhance your cybersecurity:
Strong Passwords:
Use complex passwords that include a mix of uppercase and lowercase letters, numbers, and special
characters. Avoid using easily guessable information like birthdays or common words. Consider using a
passphrase or a password manager to generate and store secure passwords.
Firewalls:
Use a firewall to monitor and control incoming and outgoing traffic on your network. This helps block
unauthorized access and potential threats.
Antivirus/Anti-Malware Software:
Install reputable antivirus or anti-malware software and keep it updated. It helps detect and remove
malicious software from your devices.
Email Security:
Be cautious with email attachments and links, especially if they're from unknown sources. Avoid clicking
on suspicious links or downloading attachments from emails that look suspicious.
Phishing Awareness:
Be vigilant for phishing attempts. Avoid providing sensitive information in response to unsolicited emails,
and verify the legitimacy of requests before taking any action.
Data Backups:
Regularly back up your important data to an external hard drive or a secure cloud service. This ensures you
can recover your information in case of a cyber incident.
Secure Browsing:
Use HTTPS-enabled websites, especially for sensitive transactions like online banking or shopping. Avoid
entering personal information on unsecured sites.
Privacy Settings:
Review and adjust the privacy settings on your devices, social media accounts, and other online services.
Limit the amount of personal information that is publicly accessible.
Physical Security:
Keep your devices physically secure. Lock your computer when not in use, and avoid leaving devices
unattended in public places.
Basic security measures and practices are essential for safeguarding your digital assets and personal
information. Here is a concise list of fundamental security measures and practices:
Strong Passwords:
Use complex, unique passwords for each account, consisting of a mix of letters, numbers, and
special characters.
Firewall:
Use a firewall to monitor and control incoming and outgoing traffic on your network, helping to
block unauthorized access.
Antivirus/Anti-Malware Software:
Install reputable antivirus or anti-malware software and keep it updated to detect and remove
malicious software.
Email Security:
Exercise caution with email attachments and links, especially from unknown sources. Avoid
clicking on suspicious links or downloading attachments.
Phishing Awareness:
Be vigilant for phishing attempts. Do not provide sensitive information in response to unsolicited
emails.
Data Backups:
Regularly back up important data to an external drive or secure cloud service to ensure recovery in
case of data loss.
Secure Browsing:
Use HTTPS-enabled websites, especially for sensitive transactions. Avoid entering personal
information on unsecured sites.
Privacy Settings:
Review and adjust privacy settings on devices, social media accounts, and online services to limit
publicly accessible information.
Physical Security:
Keep devices physically secure, lock computers when not in use, and avoid leaving devices
unattended in public places.
Access Control:
Limit access to sensitive information and systems to authorized users only. Use role-based access
controls where applicable.
Network Segmentation:
Divide your network into segments to limit the spread of threats in case of a breach.