0% found this document useful (0 votes)
19 views22 pages

Introduction To Cybersecurity Week1 Part1

The document provides an introduction to cybersecurity, covering its definition, importance, history, and distinctions from information security. It highlights the significance of cybersecurity in protecting sensitive information, maintaining trust, and ensuring compliance with regulations, while also outlining career paths and certifications in the field. Additionally, it emphasizes the growing demand for cybersecurity professionals and the skills necessary to succeed in this rapidly evolving industry.

Uploaded by

Edmund Obinna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views22 pages

Introduction To Cybersecurity Week1 Part1

The document provides an introduction to cybersecurity, covering its definition, importance, history, and distinctions from information security. It highlights the significance of cybersecurity in protecting sensitive information, maintaining trust, and ensuring compliance with regulations, while also outlining career paths and certifications in the field. Additionally, it emphasizes the growing demand for cybersecurity professionals and the skills necessary to succeed in this rapidly evolving industry.

Uploaded by

Edmund Obinna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Introduction to

Cybersecurity
Course Curriculum
Introduction

Definition and importance of cybersecurity


History and evolution of cybersecurity
Cybersecurity vs. Information Security
Cybersecurity career paths and certifications
Top reasons to learn cybersecurity
Definition and Importance
of Cybersecurity
Cybersecurity
Overview
What is Cybersecurity?
Cybersecurity is the practice of protecting systems,
networks, and programs from digital attacks that aim to
access, change, or destroy sensitive information, extort
money, or disrupt normal operations.

Definition of Cybersecurity according to NIST


National Institute of Standards and Technology (NIST)
NIST https://csrc.nist.gov/glossary/term/cybersecurity

Safety is key in protecting personal


Goals of NIST
information, intellectual property,
Confidentiality
and data Integrity
Availability
Importance of MAINTAINS TRUST AND REPUTATION

A strong cybersecurity posture builds customer confidence and

Cybersecurity preserves trust. Data breaches or security failures can severely


damage an organization’s reputation, making it hard to regain
public confidence.

PROTECTION OF SENSITIVE INFORMATION


COMPLIANCE WITH REGULATORY
Cybersecurity safeguards personal, financial, and proprietary REQUIREMENTS
information from unauthorized access, ensuring privacy and
Cybersecurity ensures organizations meet legal and regulatory
data integrity. This protection is essential to prevent identity
standards (e.g., GDPR, HIPAA). Non-compliance can lead to hefty
theft, data breaches, and unauthorized data usage
fines, legal penalties, and other repercussions, especially for
businesses handling sensitive customer data.

PREVENTS FINANCIAL LOSS


SUPPORTS BUSINESS CONTINUITY
Cybersecurity protects organizations and individuals from costly
incidents like fraud, ransomware, and data breaches. It helps Cybersecurity measures protect organizations from disruptions
avoid direct financial damage, as well as recovery costs, legal caused by cyber incidents, ensuring steady business operations.
fees, and potential regulatory fines. This continuity is essential for maintaining productivity and
avoiding costly downtime, particularly in critical sectors.
History and evolution of
cybersecurity
Early Beginnings Rise of Personal
Computers
1970s 1980s

cybersecurity origins trace With more personal computers,


History back to ARPANET, where the early viruses like "Elk Cloner"
and "Brain" emerged, leading to
"Creeper" virus and its
counter, "Reaper," marked the the Computer Fraud and Abuse
first steps in cyber defense Act in 1986 to combat
cybercrime.

Internet Expansion and Advanced Threats and


Modern Cybersecurity
New Threats Cyber Warfare
1990 2000 2010s – Present

As the internet grew, so did Organized cybercrime and Today, cybersecurity focuses on
cyber threats, with attacks like nation-state attacks rose, proactive measures, zero-trust
the "Morris Worm" prompting exemplified by the Stuxnet architecture, and threat
the creation of firewalls, antivirus worm in 2010, highlighting the intelligence to defend against
software, and intrusion need for advanced security and sophisticated attacks across
detection systems. global cooperation. cloud, IoT, and AI environments
Security
Trends
Cybersecurity incidents and data
breaches are now a part of our
lives. The website Information is
Beautiful provides a visualization
of recent cyber events.
LINK Information is Beautiful

Another resource with information


on recent data breaches is the
Verizon Data Breach
Investigations Report (DBIR)

LINK Verizon Data Breach


Investigations Report (DBIR)
Cybersecurity vs.
Information Security
Cybersecurity and Information Security are related but distinct
fields within the broader domain of data protection.

Scope and Focus


Overlap and Differences
Cybersecurity focuses on protecting systems, networks, and
Both domains share common goals (protecting data and
data from cyber threats like hacking, malware, and ransomware
ensuring data integrity and confidentiality) and often employ
attacks.
similar technologies, such as encryption and access control.
While
Information Security encompasses a broader scope, protecting While
all forms of information (digital, physical, printed) from
unauthorized access, disclosure, alteration, and destruction, Cybersecurity is a subset of information security focused on
regardless of the threat source. digital protections, while information security encompasses all
types of information, including physical records and
operational security.
Primary Goal
Cybersecurity aims to secure digital assets in cyberspace,
focusing on confidentiality, integrity, and availability (CIA) of
data specifically against cyber threats
While
Aims to secure all types of information assets, emphasizing CIA
across both digital and physical data assets
Security Principles
Understand the security concepts of information assurance.

NIST https://csrc.nist.gov/glossary/term/cybersecurity
CIA Triad - Confidentiality, Integrity, Availability

Understand the security concepts of Confidentiality: We must protect the data that needs protection and
information assurance. prevent access to unauthorized individuals.

Confidentiality
Integrity Integrity: We must ensure the data has not been altered in an
Availability unauthorized manner
Authentication
Non-Repudiation Availability: we must make sure data is accessible to authorized users
Privacy when and where it is needed, and in the form and format that is required
Authentication vs Authorization

Authentication - The act of identifying or verifying the eligibility of a


Understand the security concepts of
station, originator, or individual to access specific categories of
information assurance.
information.
Confidentiality
Integrity
Authorization - The right or permission that is granted to a system entity to
Availability
access a system resource
Authentication
Authorization
Non-Repudiation
Privacy
Non-repudiation, Data Privacy and Data Security

Non-repudiation - The inability to deny taking an action such as creating


Understand the security concepts of information, approving information, and sending or receiving a message.
information assurance. In simple terms, non-repudiation in information security is the ability to
Confidentiality prevent a denial in an electronic message or transaction
Integrity
Availability
Data Privacy - Defines how data is collected, stored & and distributed.
Authentication
Authorization Data Security: Tools, processes & controls used to safeguard data
Non-Repudiation
Privacy
Cybersecurity career paths and
certifications
76% of organizations of all types and sizes
are and have been struggling to find
quality cybersecurity talent: According to a
recent survey in Security Magazine
Three things to
have in mind.
To build a career in cybersecurity or technology takes
three things

EXPERIENCE

EDUCATION

CERTIFICATIONS

Technical Skills
Functional Knowledge
Personal abilities

Resources
ISACA - Link: https://www.isc2.org/
(ISC)2 - Link: https://www.isc2.org/
Cyberseek - Link: https://www.isc2.org/
Different
Career
Path
Becoming a Cybersecurity Engineer
ACQUIRE RELEVANT GAIN HANDS-ON EXPERIENCE
CERTIFICATIONS

Earn industry-recognized certifications like Seek out internships, entry-level roles, or


CompTIA Security+, Certified Ethical Hacker participate in cybersecurity competitions to
(CEH), or Certified Information Systems build a portfolio of practical experience
Security Professional (CISSP) to and problem-solving abilities.
demonstrate your specialized skills.

CONTINUOUSLY UPSKILL NETWORK AND BUILD CONNECTIONS

Stay up-to-date with the latest cybersecurity Expand your professional network by connecting
trends, tools, and best practices through with experienced cybersecurity engineers, joining
online courses, industry blogs, and industry associations, and leveraging social
attending conferences and webinars. platforms like LinkedIn.
Top reasons to learn
cybersecurity
Top 10 Reasons to Learn
Cybersecurity
1. To build a career in cybersecurity or technology takes three things.

2. Gain in-demand, future-proof skills in a rapidly expanding field.

3. Enjoy lucrative career opportunities with competitive salaries.

4. Develop analytical and problem-solving abilities that are highly valued

5. Make a meaningful impact by defending systems and preventing breaches

6. Collaborate with cross-functional teams and leverage cutting-edge technologies.

7. Continuously learn and adapt as the cybersecurity landscape evolves

8. Benefit from job security and growth potential in a thriving industry

9. Contribute to the greater good by protecting individuals and organizations

10. Enjoy the excitement and challenge of constantly outmaneuvering cyber threats
Do you have any
questions?

You might also like