0% found this document useful (0 votes)
19 views14 pages

CS Fundamentals - 4-Week First - Technical - Session

Uploaded by

victormwirigi34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views14 pages

CS Fundamentals - 4-Week First - Technical - Session

Uploaded by

victormwirigi34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

IBM SkillsBuild & SkillUp Online Presents

Cybersecurity
Fundamentals
Agenda
Cybersecurity Fundamentals
1. Security Basics and Cybersecurity Introduction
• 1.1 Hardware Security Configuration
• 1.2 Authentication vs. Authorization Comparison
• 1.3 Common Threats Identification
• 1.4 Password Management
• 1.5 Data Encryption
• 1.6 Software Patching

2. Incident Response Simulation Exercises


Introduction to Cybersecurity

• Definition of Cybersecurity

• Importance of Cybersecurity in the Digital Age

• Overview of Cybersecurity Fundamentals


Security Basics
CIA Triad:

Types of Security: Confidentiality


• Physical
• Network
• Application
• Information

Basic Security Principles: Integrity Availability


• Least Privilege
• Defense in Depth
Hardware Security Configuration

• Secure Boot:
Ensures only trusted software loads during startup

• BIOS/UEFI Security:
Password protection, firmware updates

• Hardware Security Modules (HSMs):


Secure generation and storage of cryptographic keys

• Physical Security:
Locks, tamper-evident seals, surveillance
Authentication vs. Authorization

• Authentication:
Verifying the identity of a user
(e.g., passwords, biometrics)

• Authorization:
Determining user permissions and access levels

Comparison:

• Authentication: "Who are you?"


• Authorization: "What are you allowed to do?"
Common Threats Identification

• Malware:
Viruses, Worms, Trojans

• Phishing:
Deceptive emails or websites

• Ransomware:
Encrypts data and demands payment for
the decryption key

• Social Engineering:
Manipulating individuals into divulging
confidential information
Password Management

Importance of Strong Passwords

Best Practices:

• Use of Password Managers


• Enabling Multi-Factor Authentication (MFA)
• Regular Password Updates
• Common Mistakes to Avoid
Data Encryption

What is Encryption? Importance of Encryption:


• Converting data into a • Protecting data at rest
secure format and in transit

Types of Encryption: Tools and Techniques:


• Symmetric vs. Asymmetric • SSL/TLS, PGP, BitLocker
Encryption
Software Patching

Definition:
Updating software to fix vulnerabilities

Importance:
Preventing exploitation of known vulnerabilities

Best Practices:
• Regularly apply patches
• Use automated patch management tools
• Test patches before deployment
Incident Response Simulation Exercises

Purpose:
Preparing for real-world cyber incidents
Benefits:
• Improved readiness
• Identification of weaknesses
• Enhanced teamwork and communication

Components:
• Planning:
Developing incident response plans
• Simulation:
Conducting tabletop exercises
• Analysis:
Reviewing performance and improving response strategies
Knowledge check
Thank you!

For further queries, email us at


[email protected]

You might also like