Cyber Sec Lecture Note
Cyber Sec Lecture Note
Cyber attacks can lead to data breaches, financial losses, and even identity
theft. Protecting against these attacks helps ensure our safety and privacy.
Integrity: Keeps data accurate and unaltered. This means that data should
not be changed in unauthorized ways. For instance, your medical records
should remain correct and unchanged unless authorized by a professional.
1. Malware
Malware is any software that is made to harm or exploit a device. Common
types of malware include:
Viruses: Programs that attach to files and spread to other files or devices
when opened.
3. Insider Threats
Insider threats come from people within an organization, such as
employees or contractors, who misuse their access to data. This can be
intentional (malicious) or accidental, like an employee accidentally sharing
private data with the wrong person.
2. Describe the CIA Triad in cyber security. For each element (Confidentiality,
Integrity, and Availability), provide a simple example that illustrates its
importance.
3. List and briefly explain three common types of malware. For each type,
describe how it might affect a computer or network.
Week 2:
Example: T@ke$ecure2024!
You need two or more verification methods (e.g., password + code sent
to your phone).
Example: Logging into your email with a password and a one-time code.
2. Firewalls
What is a Firewall?
It decides which data can enter or leave your system based on rules.
3. Encryption
What is Encryption?
Example: Sending a coded message that only the receiver can decode.
Even if hackers steal encrypted data, they can’t read it without the
decryption key.
WHOIS Lookup:
https://viewdns.info/
https://whois.com/whois/
Social Media:
Using hacking skills to find and fix security problems, not to harm.
Week 2 Summary
Cyber security is built on strong passwords, firewalls, encryption, and safe
browsing habits.
WEEK 2 ASSIGMENT