[go: up one dir, main page]

0% found this document useful (0 votes)
23 views16 pages

Cybersecurity Basics Guide

Cybersecurity is the practice of protecting computer systems and data from digital attacks, involving various technologies and processes. Key topics include types of cyber attacks, network security basics, encryption, and the importance of authentication and authorization. The document also covers ethical hacking tools, cyber laws in India, and best practices for password security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views16 pages

Cybersecurity Basics Guide

Cybersecurity is the practice of protecting computer systems and data from digital attacks, involving various technologies and processes. Key topics include types of cyber attacks, network security basics, encryption, and the importance of authentication and authorization. The document also covers ethical hacking tools, cyber laws in India, and best practices for password security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Cybersecurity Basics - Beginner Guide

1. What is Cybersecurity?
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital

attacks. It involves a set of technologies, processes, and practices designed to safeguard data from

unauthorized access or damage.


2. Types of Cyber Attacks
- Phishing

- Malware

- Ransomware

- Denial of Service (DoS)

- SQL Injection

- Zero-day exploit

- Man-in-the-middle (MITM) attack


3. Network Security Basics
Network security involves measures to protect data during transmission. Techniques include using

firewalls, encryption, secure protocols (HTTPS), and intrusion detection systems (IDS).
4. Encryption & Cryptography (Basics)
Encryption converts plain text into unreadable text (cipher text). Cryptography is the science behind

encryption and ensures secure communication using keys.


5. Firewalls & Antivirus
Firewalls monitor incoming and outgoing traffic to block threats. Antivirus software detects and

removes malware from devices.


6. OWASP Top 10 (Intro)
OWASP provides the top 10 most critical security risks to web applications, including SQL Injection,

Cross-Site Scripting (XSS), and Broken Authentication.


7. Authentication & Authorization
Authentication verifies user identity (e.g., login). Authorization determines what an authenticated

user is allowed to do.


8. Malware Types
- Virus: Attaches to files

- Worm: Spreads without attachment

- Trojan: Disguised as legitimate software

- Ransomware: Locks data for ransom


9. Ethical Hacking Tools
Common tools:

- Kali Linux

- Nmap (network scanning)

- Wireshark (packet analysis)

- Burp Suite (web security testing)


10. Cyber Laws & Ethics (India)
The IT Act 2000 governs cyber laws in India. It penalizes cyber crimes like hacking, data theft, and

identity theft. Ethical hackers follow laws to improve security.


11. CIA Triad
- Confidentiality: Ensuring data is private

- Integrity: Ensuring data is unchanged

- Availability: Ensuring data is accessible when needed


12. Social Engineering Attacks
Manipulating people into revealing confidential info. Types:

- Phishing

- Baiting

- Pretexting

- Tailgating
13. Password Security
Best practices:

- Use strong, unique passwords

- Enable 2FA

- Avoid reusing passwords

- Use a password manager


14. Public Key vs Private Key
Public key: Shared openly

Private key: Kept secret

Used together in asymmetric encryption for secure communication (e.g., SSL/TLS).


15. Basics of Cloud Security
Cloud security includes protecting data stored on cloud platforms using encryption, secure APIs,

identity management, and compliance monitoring.

You might also like