Cyber Security Lesson 1
Cyber Security Lesson 1
LESSON 1
Define the term ‘cyber security’
• The term cyber security applies in a variety of contexts, from business to mobile computing, and
can be divided into a few common categories.
• Network security
• Application security
• Information security
• Operational security
• Disaster recovery and business continuity
• End-user education
Cyber security
• Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
• Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
Cyber security
• Information security protects the integrity and privacy of data, both in storage and in
transit.
• Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures that
determine how and where data may be stored or shared all fall under this umbrella.
Cyber security
• There are many risks, some more serious than others. Among these dangers are
malware erasing your entire system, an attacker breaking into your system and altering
files, an attacker using your computer to attack others, or an attacker stealing your
credit card information and making unauthorized purchases.
• There is no guarantee that even with the best precautions some of these things won't
happen to you, but there are steps you can take to minimize the chances.
Hacker, attacker, or intruder
These terms are applied to the people who seek to exploit weaknesses in software and
computer systems for their own gain. Although their intentions are sometimes benign
and motivated by curiosity, their actions are typically in violation of the intended use of
the systems they are exploiting.
The results can range from mere mischief (creating a virus with no intentionally negative
impact) to malicious activity (stealing or altering information).
Malicious code
• Malicious code (also called malware) is unwanted files or programs that can cause harm to a computer or
compromise data stored on a computer. Various classifications of malicious code include viruses, worms,
and Trojan horses.
• Malicious code may have the following characteristics:
• It might require you to actually do something before it infects your computer. This action could be
opening an email attachment or going to a particular webpage.
• Some forms of malware propagate without user intervention and typically start by exploiting a software
vulnerability. Once the victim computer has been infected, the malware will attempt to find and infect
other computers. This malware can also propagate via email, websites, or network-based software.
• Some malware claims to be one thing, while in fact doing something different behind the scenes. For
example, a program that claims it will speed up your computer may actually be sending confidential
information to a remote intruder.
Vulnerabilities
• The three types are computer-assisted crimes, crimes where the computer itself
is a target, and crimes where the computer is incidental to the crime rather than
directly related to it.
• Cybercriminals usually try to profit off of their crimes using a variety of tactics,
including:
Types of Cyber Attacks
• The main motive behind the cybercrime is to disrupt regular business activity and
critical infrastructure.
• Cybercriminals also commonly manipulate stolen data to benefit financially,
cause financial loss, damage a reputation, achieve military objectives, and
propagate religious or political beliefs. Some don’t even need a motive and might
hack for fun or simply to showcase their skills.
So who are these cybercriminals?
• State-Sponsored Hackers
They penetrate government networks, gain top-secret information, and damage
information systems; paid by a hostile government
• Hacktivists
Promote political agendas by secretly defacing and disabling websites
What can you do to improve your cybersecurity?