0% found this document useful (0 votes)
32 views7 pages

FINAL TERM Topic Understanding Cybersecurity. BSA - BSMA

Security protocols and encryption are fundamental components of cybersecurity. Security protocols define rules and procedures for secure communication and authentication between parties, while encryption converts readable data into unreadable ciphertext to protect data confidentiality and integrity. Common security protocols include TLS/SSL, IPsec, and SSH, while common encryption algorithms are AES, RSA, and ECC. Together, security protocols and encryption work to secure networks, devices, and data in today's interconnected world.

Uploaded by

ynoxtaiko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views7 pages

FINAL TERM Topic Understanding Cybersecurity. BSA - BSMA

Security protocols and encryption are fundamental components of cybersecurity. Security protocols define rules and procedures for secure communication and authentication between parties, while encryption converts readable data into unreadable ciphertext to protect data confidentiality and integrity. Common security protocols include TLS/SSL, IPsec, and SSH, while common encryption algorithms are AES, RSA, and ECC. Together, security protocols and encryption work to secure networks, devices, and data in today's interconnected world.

Uploaded by

ynoxtaiko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

FINAL TERM – TOPIC 1: UNDERSTANDING CYBERSECURITY

Types of Cyber Threats:


Cyber threats are malicious activities or events that aim to compromise the security of computer systems,
networks, and data. Here are some common types of cyber threats:

• Malware: This is a broad term that encompasses various types of malicious software designed to
harm or exploit a system. This includes viruses, worms, Trojans, ransomware, spyware, and
adware.
• Phishing: This is a social engineering attack where attackers pose as legitimate entities (like a bank
or a reputable company) to trick individuals into revealing sensitive information such as login
credentials, credit card details, or personal information.
• Ransomware: This is a type of malware that encrypts a victim's files and demands a ransom in
exchange for the decryption key. Paying the ransom is not recommended, as it does not guarantee
the return of files and encourages criminal activities.
• Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS): In a DoS attack, a single
system floods a target system, service, or network with excessive, unnecessary traffic to make it
unavailable. DDoS attacks involve multiple systems working in tandem to achieve the same effect.
• Man-in-the-Middle (MitM): In this type of attack, an attacker intercepts or alters communications
between two parties without their knowledge. This can allow the attacker to eavesdrop on sensitive
information or even inject malicious content.
• SQL Injection: This is a technique where attackers inject malicious SQL code into a database
query, potentially allowing them to retrieve or modify data they shouldn't have access to.
• Cross-Site Scripting (XSS): This attack involves injecting malicious scripts into web pages
viewed by other users. It can lead to the theft of session cookies, personal information, or the
defacement of websites.
• Insider Threats: These are threats that come from within an organization. This could be a
disgruntled employee, contractor, or someone with authorized access who abuses their privileges.
• Zero-Day Exploits: These are vulnerabilities or weaknesses in software that are not yet known to
the vendor or public. Attackers can exploit these before a patch or fix is available.
• Social Engineering: This involves manipulating individuals into divulging confidential
information or performing actions that compromise security. This can include techniques like
pretexting, tailgating, or baiting.
• Credential Stuffing: Attackers use previously stolen usernames and passwords from one site and
try them on other sites, relying on the fact that many people reuse passwords.
• IoT (Internet of Things) Vulnerabilities: As more devices become connected to the internet, they
can be targeted for exploitation, especially if they have weak security measures.
• Fileless Malware: This type of malware operates in a system's memory, leaving no trace on the
hard drive. It's harder to detect using traditional antivirus solutions.
• Eavesdropping (Packet Sniffing): Attackers intercept network traffic to gain unauthorized access
to sensitive information.

➢ It's crucial for individuals and organizations to be aware of these threats and take measures to
protect their systems and data. This includes practices like regular software updates, strong
password policies, security awareness training, and the use of firewalls and antivirus programs.
Topics that can help you easily understand encryption and security protocols:

What is Encryption?
Definition and purpose of encryption.

Types of Encryptions:
Symmetric Encryption vs. Asymmetric Encryption.

Key Terms:
Plaintext, Ciphertext, Encryption Key, Decryption Key.

How Encryption Works:


The process of converting plaintext to ciphertext and back.

Common Encryption Algorithms:


AES, RSA, ECC.

Key Length and Security:


How longer encryption keys provide better security.

Use Cases of Encryption:


Securing communication, protecting data at rest, digital signatures.

Transport Layer Security (TLS) and SSL:


How they secure internet communication.

Encryption in Practice:
How encryption is used in messaging apps, online banking, and secure browsing.

Challenges in Encryption:
Quantum computing threats, backdoors, and key management.

Security Protocols:
What are Security Protocols?
Definition and purpose of security protocols.

Common Security Protocols:


TLS/SSL, IPsec, SSH, VPN, SASL.

Authentication and Authorization:


How protocols verify identities and grant access.

Secure Communication:
How protocols ensure secure data transfer.

Virtual Private Networks (VPNs):


How they create secure connections over public networks.

Internet Protocol Security (IPsec):


How it secures internet communication at the IP level.

Secure Shell (SSH):


Its role in secure remote access.

Transport Layer Security (TLS) Handshake:


The process of establishing a secure connection.
Securing Email (SMTP with TLS):
How email protocols can be secured.

Security Standards and Certifications:


ISO 27001, NIST, PCI-DSS, and their role in ensuring security.

➢ These topics cover the basics of encryption and security protocols. Starting with these will
provide you with a solid foundation to build upon. As you become more comfortable with
these concepts, you can explore more advanced topics in the field of cybersecurity.

Security protocols and encryption are fundamental components of cybersecurity. They work
together to secure communications, protect data, and ensure the integrity of information. Let's delve
into each of them:

Security Protocols: Security protocols are sets of rules and procedures that govern how data is
exchanged in a network or system. They define the steps and methods for authentication,
authorization, and secure communication between parties.

Types:

Transport Layer Security (TLS) / Secure Sockets Layer (SSL):


TLS and its predecessor SSL are cryptographic protocols that provide secure communication over
a network, typically the internet. They encrypt data in transit and ensure that it is delivered securely
between a client (like a web browser) and a server.

Internet Protocol Security (IPsec):


IPsec is a suite of protocols used to secure internet communication at the IP layer. It can encrypt
and authenticate data packets, providing secure VPN connections.

Secure Shell (SSH):


SSH is a protocol used for secure remote access to computers and servers over an unsecured
network. It provides encrypted communication sessions.

Simple Authentication and Security Layer (SASL):


SASL is a framework for adding authentication support to connection-based protocols. It is used in
various services like email (SMTP), directory services (LDAP), and more.

Virtual Private Network (VPN):


A VPN is not a single protocol but a technology that uses various protocols to create secure and
encrypted connections over an unsecured network, typically the internet.

Functions:

Authentication:
Security protocols verify the identity of parties involved in a communication, ensuring that they
are who they claim to be.

Authorization:
Once authenticated, protocols establish what actions or data a party is allowed to access or perform.

Integrity:
They ensure that data is not altered or tampered with during transmission.

Confidentiality:
They encrypt data to prevent unauthorized access or eavesdropping.
Encryption: Encryption is the process of converting plaintext (readable data) into ciphertext
(unreadable data) using an algorithm (encryption key) and a specific method (encryption
algorithm). The ciphertext can only be decrypted back to its original form with the corresponding
decryption key.

Types:

Symmetric Encryption:
In symmetric encryption, the same key is used for both encryption and decryption. It's fast but
requires secure distribution of the key.

Asymmetric Encryption:
Also known as public-key cryptography, it uses a pair of keys: a public key for encryption and a
private key for decryption. It's slower but eliminates the need for secure key distribution.

Common Algorithms:

AES (Advanced Encryption Standard):

A widely used symmetric encryption algorithm known for its speed and security. It comes in
different key lengths (AES-128, AES-192, AES-256).

RSA (Rivest-Shamir-Adleman):
A widely used asymmetric encryption algorithm. It's based on the mathematical properties of large
prime numbers.

Elliptic Curve Cryptography (ECC):


Another form of asymmetric encryption that is computationally efficient and offers strong security
with smaller key sizes compared to RSA.

Uses:

Data Protection:
Encryption is used to protect sensitive data at rest (stored on devices or servers) and in transit
(during communication).

Secure Communication:
It ensures that only authorized parties can access and understand the information being exchanged.

Digital Signatures:
Encryption is used in digital signatures to verify the authenticity of a message or document.

Secure Storage:
It's used to safeguard data on devices, such as laptops, smartphones, and USB drives.

➢ Both security protocols and encryption are crucial tools in the field of cybersecurity. They work
together to create a secure environment for data and communications in an increasingly
interconnected world.
Implementing basic security measures is crucial for protecting your personal information, devices,
and online accounts. Here are some fundamental steps you can take to enhance your cybersecurity:
Strong Passwords:
Use complex passwords that include a mix of uppercase and lowercase letters, numbers, and special
characters. Avoid using easily guessable information like birthdays or common words. Consider using a
passphrase or a password manager to generate and store secure passwords.

Multi-Factor Authentication (MFA):


Enable MFA whenever possible. This adds an extra layer of security by requiring you to verify your identity
through a second method (e.g., a one-time code sent to your phone) in addition to your password.

Regular Software Updates:


Keep your operating system, applications, and software up to date. Updates often include security patches
that address known vulnerabilities.

Firewalls:
Use a firewall to monitor and control incoming and outgoing traffic on your network. This helps block
unauthorized access and potential threats.

Antivirus/Anti-Malware Software:
Install reputable antivirus or anti-malware software and keep it updated. It helps detect and remove
malicious software from your devices.

Email Security:
Be cautious with email attachments and links, especially if they're from unknown sources. Avoid clicking
on suspicious links or downloading attachments from emails that look suspicious.

Phishing Awareness:
Be vigilant for phishing attempts. Avoid providing sensitive information in response to unsolicited emails,
and verify the legitimacy of requests before taking any action.

Secure Wi-Fi Network:


Change default router login credentials, use a strong Wi-Fi password, and consider hiding your network's
SSID (name). Use encryption (WPA2 or higher) to protect your wireless communications.

Data Backups:
Regularly back up your important data to an external hard drive or a secure cloud service. This ensures you
can recover your information in case of a cyber incident.
Secure Browsing:
Use HTTPS-enabled websites, especially for sensitive transactions like online banking or shopping. Avoid
entering personal information on unsecured sites.

Privacy Settings:
Review and adjust the privacy settings on your devices, social media accounts, and other online services.
Limit the amount of personal information that is publicly accessible.

Physical Security:
Keep your devices physically secure. Lock your computer when not in use, and avoid leaving devices
unattended in public places.

Education and Training:


Stay informed about common cyber threats and best practices. Regularly educate yourself and your family
about cybersecurity.

Incident Response Plan:


Have a plan in place for what to do in case of a security incident. This includes steps for reporting and
mitigating potential breaches.

Regular Security Audits:


Periodically review your security settings, update passwords, and check for any unusual activities or signs
of compromise.
➢ Remember, cybersecurity is an ongoing process. Staying vigilant and proactive about your security
measures can significantly reduce the risk of falling victim to cyber threats.

Basic security measures and practices are essential for safeguarding your digital assets and personal
information. Here is a concise list of fundamental security measures and practices:

Strong Passwords:
Use complex, unique passwords for each account, consisting of a mix of letters, numbers, and
special characters.

Multi-Factor Authentication (MFA):


Enable MFA whenever possible to add an extra layer of security by requiring a second form of
authentication.

Regular Software Updates:


Keep your operating system, applications, and software up to date to patch known vulnerabilities.

Firewall:
Use a firewall to monitor and control incoming and outgoing traffic on your network, helping to
block unauthorized access.
Antivirus/Anti-Malware Software:
Install reputable antivirus or anti-malware software and keep it updated to detect and remove
malicious software.

Email Security:
Exercise caution with email attachments and links, especially from unknown sources. Avoid
clicking on suspicious links or downloading attachments.

Phishing Awareness:
Be vigilant for phishing attempts. Do not provide sensitive information in response to unsolicited
emails.

Secure Wi-Fi Network:


Change default router login credentials, use a strong Wi-Fi password, and enable encryption (WPA2
or higher).

Data Backups:
Regularly back up important data to an external drive or secure cloud service to ensure recovery in
case of data loss.

Secure Browsing:
Use HTTPS-enabled websites, especially for sensitive transactions. Avoid entering personal
information on unsecured sites.

Privacy Settings:
Review and adjust privacy settings on devices, social media accounts, and online services to limit
publicly accessible information.

Physical Security:
Keep devices physically secure, lock computers when not in use, and avoid leaving devices
unattended in public places.

Education and Training:


Stay informed about common cyber threats and best practices, and educate yourself and your family
about cybersecurity.

Incident Response Plan:


Have a plan in place for responding to security incidents, including steps for reporting and
mitigating potential breaches.

Regular Security Audits:


Periodically review security settings, update passwords, and check for any signs of compromise or
unusual activities.

Access Control:
Limit access to sensitive information and systems to authorized users only. Use role-based access
controls where applicable.

Network Segmentation:
Divide your network into segments to limit the spread of threats in case of a breach.

Security Software Configuration:


Configure security software settings to provide optimal protection and ensure they are actively
scanning for threats.

➢ Remember, cybersecurity is a continuous effort. Regularly reviewing and updating your


security measures will help protect you from evolving threats in the digital landscape

You might also like