Cybersecurity Basics - Beginner Guide
1. What is Cybersecurity?
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital
attacks. It involves a set of technologies, processes, and practices designed to safeguard data from
unauthorized access or damage.
2. Types of Cyber Attacks
- Phishing
- Malware
- Ransomware
- Denial of Service (DoS)
- SQL Injection
- Zero-day exploit
- Man-in-the-middle (MITM) attack
3. Network Security Basics
Network security involves measures to protect data during transmission. Techniques include using
firewalls, encryption, secure protocols (HTTPS), and intrusion detection systems (IDS).
4. Encryption & Cryptography (Basics)
Encryption converts plain text into unreadable text (cipher text). Cryptography is the science behind
encryption and ensures secure communication using keys.
5. Firewalls & Antivirus
Firewalls monitor incoming and outgoing traffic to block threats. Antivirus software detects and
removes malware from devices.
6. OWASP Top 10 (Intro)
OWASP provides the top 10 most critical security risks to web applications, including SQL Injection,
Cross-Site Scripting (XSS), and Broken Authentication.
7. Authentication & Authorization
Authentication verifies user identity (e.g., login). Authorization determines what an authenticated
user is allowed to do.
8. Malware Types
- Virus: Attaches to files
- Worm: Spreads without attachment
- Trojan: Disguised as legitimate software
- Ransomware: Locks data for ransom
9. Ethical Hacking Tools
Common tools:
- Kali Linux
- Nmap (network scanning)
- Wireshark (packet analysis)
- Burp Suite (web security testing)
10. Cyber Laws & Ethics (India)
The IT Act 2000 governs cyber laws in India. It penalizes cyber crimes like hacking, data theft, and
identity theft. Ethical hackers follow laws to improve security.
11. CIA Triad
- Confidentiality: Ensuring data is private
- Integrity: Ensuring data is unchanged
- Availability: Ensuring data is accessible when needed
12. Social Engineering Attacks
Manipulating people into revealing confidential info. Types:
- Phishing
- Baiting
- Pretexting
- Tailgating
13. Password Security
Best practices:
- Use strong, unique passwords
- Enable 2FA
- Avoid reusing passwords
- Use a password manager
14. Public Key vs Private Key
Public key: Shared openly
Private key: Kept secret
Used together in asymmetric encryption for secure communication (e.g., SSL/TLS).
15. Basics of Cloud Security
Cloud security includes protecting data stored on cloud platforms using encryption, secure APIs,
identity management, and compliance monitoring.