CS Fundamentals - 4-Week First - Technical - Session
CS Fundamentals - 4-Week First - Technical - Session
Cybersecurity
Fundamentals
Agenda
Cybersecurity Fundamentals
1. Security Basics and Cybersecurity Introduction
• 1.1 Hardware Security Configuration
• 1.2 Authentication vs. Authorization Comparison
• 1.3 Common Threats Identification
• 1.4 Password Management
• 1.5 Data Encryption
• 1.6 Software Patching
• Definition of Cybersecurity
• Secure Boot:
Ensures only trusted software loads during startup
• BIOS/UEFI Security:
Password protection, firmware updates
• Physical Security:
Locks, tamper-evident seals, surveillance
Authentication vs. Authorization
• Authentication:
Verifying the identity of a user
(e.g., passwords, biometrics)
• Authorization:
Determining user permissions and access levels
Comparison:
• Malware:
Viruses, Worms, Trojans
• Phishing:
Deceptive emails or websites
• Ransomware:
Encrypts data and demands payment for
the decryption key
• Social Engineering:
Manipulating individuals into divulging
confidential information
Password Management
Best Practices:
Definition:
Updating software to fix vulnerabilities
Importance:
Preventing exploitation of known vulnerabilities
Best Practices:
• Regularly apply patches
• Use automated patch management tools
• Test patches before deployment
Incident Response Simulation Exercises
Purpose:
Preparing for real-world cyber incidents
Benefits:
• Improved readiness
• Identification of weaknesses
• Enhanced teamwork and communication
Components:
• Planning:
Developing incident response plans
• Simulation:
Conducting tabletop exercises
• Analysis:
Reviewing performance and improving response strategies
Knowledge check
Thank you!