[go: up one dir, main page]

0% found this document useful (0 votes)
62 views4 pages

Introduction To Cybersecurity Notes

Uploaded by

llll
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views4 pages

Introduction To Cybersecurity Notes

Uploaded by

llll
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INTRODUCTION TO CYBERSECURITY

Organisational Data:

-Traditional Data:
- Transactional Data (Buying & Selling)
- Intellectual Property (Patents & Trademarks)
- Financial Data (Income Statements)

- IoT and Big Data:


- Network that consists of physical objects such as sensors, software
and other equipment. They have the ability to capture and share data.

THE CUBE (McCumber Cube):


This security model has three dimensions:

1. Foundational Principles for protecting information systems:


- Confidentiality: methods to ensure confidentiality include data
encryption, identity proofing and 2fA.
- Integrity: methods to ensure integrity include using a hash functions
and checksums.
- Availability: methods to ensure availability include maintaining the
equipment, hardware repairs and keeping the OS and software up-to
date.

2. Protection of information:
- Processing refers to data that is being used to perform operations
such as updating record in database.
- Storage refers to data that is being stored in a memory or a
permanent storage device.
- Transmission refers to data travelling between information systems.

3. Security measures used to protect data:


- Awareness, training and education are the measures put in place by
an organisation to ensure users are knowledgeable.
- Technology refers to the software and hardware-based solutions
designed to protect information systems such as firewalls.
- Policy and procedure refer to the administrative controls that provide
foundation of how an organisation implements information assurance.

Consequences of security breach:


- Reputational Damage
- Vandalism
- Theft
- Loss of revenue
- Damaged Intellectual Property

Types Of Attackers:
- Amateurs also known as script kiddies, who use tools found on the
internet to perform attacks.
- Hackers:
- White hat attackers are those who break into networks, identify
weaknesses and try to improvise security.
- Gray hat attackers are those who find vulnerabilities in systems and
report to owner or publish so that others can exploit it.
- Black hat attackers are those who take advantage of vulnerabilities
for illegal purposes and financial gain.
- Organised hackers are those who belong to an organisation of
hackers.

ATTACKS, CONCEPTS AND TECHNIQUES

Types of malwares:
- Spyware is designed to track and spy on you. It monitors online activity.
This is done by modifying security settings on your device.
- Adware is designed to automatically deliver advertisements to you.
- Backdoor is used to gain unauthorized access by bypassing the normal
authentication process to access a system.
- Ransomware is designed to hold a computer system or data in the
system until ransom is received.
- Scareware is used to trick users into taking specific actions.
- Rootkit is designed to modify the OS to create a backdoor, which
attackers can use to access computers remotely.
- Virus is a computer program that replicates itself when executed and
attaches itself to other executable files by inserting its own code.
- Trojan Horse is a malware that carries out malicious operations by
masking its true intent.
- Worms is another malware that replicates itself to move from one
computer to another.

You might also like