0% found this document useful (0 votes)
39 views5 pages

Cybersecurity Concepts and Practices Guide

Tellnme what

Uploaded by

miwos92295
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views5 pages

Cybersecurity Concepts and Practices Guide

Tellnme what

Uploaded by

miwos92295
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cybersecurity Notes

**1. CIA Triad**

The CIA Triad consists of:

1. Confidentiality: Ensures data is accessible only to authorized individuals,

protecting sensitive information from unauthorized access.

2. Integrity: Ensures the accuracy and reliability of data by preventing

unauthorized alterations.

3. Availability: Ensures that systems, data, and services are accessible when

needed.

**2. Cybercrime vs. Traditional Crime**

Cybercrime: Offenses committed using the internet or digital systems (e.g.,

hacking, phishing).

Traditional Crime: Offenses in the physical world (e.g., theft, assault).

Difference: Cybercrimes leverage technology, often have a global reach, and

can be executed remotely.

**3. Cybersecurity Ethics**

Involves moral principles guiding actions in cybersecurity.

Significance: Prevents misuse of technology, ensures privacy, and builds trust.

**4. Vulnerability vs. Exploit**

Vulnerability: Weakness in a system that can be exploited.

Exploit: The act of taking advantage of a vulnerability.

**5. Social Engineering**


Psychological manipulation of individuals to obtain confidential information

(e.g., phishing).

**6. Ransomware**

Malicious software that encrypts data, demanding payment for decryption.

How it works: Infects via phishing emails or malicious downloads, locks files,

and displays ransom instructions.

**7. Zero-Day Exploit**

A vulnerability exploited before the developer releases a patch.

Implications: High risk as there's no immediate defense.

**Application of Concepts**

1. CIA Triad in Protecting a Customer Database

- Confidentiality: Encrypt sensitive data and use access controls.

- Integrity: Implement checksums and audit trails.

- Availability: Use backups and redundancy systems.

2. Ethics in Cybersecurity for Educational Organizations

- Ensure privacy of student data.

- Develop tools transparently and without malicious intent.

3. Risk Assessment in Cybersecurity

- Steps: Identify threats, assess vulnerabilities, evaluate impact, and prioritize

actions.

4. Encryption for Sensitive Data


- In Transit: Use SSL/TLS protocols.

- At Rest: Encrypt databases and storage systems.

5. Access Control Mechanisms

- Use role-based access control (RBAC) and multi-factor authentication (MFA).

6. Incident Response Planning

- Steps: Preparation, detection, containment, eradication, recovery, and lessons

learned.

7. Cybersecurity Awareness Training

- Educate employees on phishing, strong passwords, and secure practices.

8. Vulnerability Scanning & Penetration Testing

- Scanning: Identifies weaknesses.

- Testing: Simulates attacks to evaluate system defenses.

9. SIEM Systems

- Aggregate and analyze logs to detect and respond to threats.

10. Principle of Least Privilege

- Restrict user access to only what's essential for their role.

**Analysis Topics**

1. Interconnected Devices and Cybersecurity

- Impact: Increases attack surfaces; necessitates stronger defenses.


2. Ethics of Government Surveillance

- Balances security with privacy concerns.

3. AI in Cybersecurity

- Defense: Detects anomalies and automates responses.

- Threat: Can be used for advanced phishing or automation of attacks.

4. Economic Impact of Cybercrime

- Costs include data breaches, operational downtime, and loss of trust.

5. Effectiveness of Regulations

- Assessing frameworks like GDPR and their impact on reducing threats.

6. Securing IoT Devices

- Challenges include lack of updates, weak credentials, and diverse platforms.

7. International Cooperation

- Sharing intelligence and harmonizing laws to combat global cybercrime.

8. Emerging Technologies

- Blockchain: Enhances transparency but can be misused.

- Quantum Computing: May break traditional encryption but introduce

quantum-safe methods.

9. Psychological Factors in Human Error

- Stress, fatigue, and lack of training contribute to mistakes like clicking

phishing links.
10. Evolving Cyber Threats

- Requires adaptive strategies, real-time monitoring, and proactive defenses.

You might also like