This document provides an introduction to cyber security. It defines cyber security as protecting computer systems and networks from threats. It discusses how Alice's personal and payment details stored on an online shopping website were compromised when she clicked a phishing link and entered her login credentials. The document outlines security goals like authentication, authorization, confidentiality and techniques to protect against threats such as firewalls, strong passwords, antivirus software and two-factor authentication. It also defines networking devices, addressing schemes, DNS, VPNs, viruses, and types of hackers and their roles. Finally, it mentions some job profiles in cyber security.
3. What is cyber security?
• Cybersecurity is the protection of computer systems and networks from
information disclosure, theft of or damage to their hardware, software, or
electronic data.
6. Example
1. Alice is a regular
customer of
www.shoponline.com
2. All her personal details along with
card details are stored on the
websites server
7. 3. Alice receives an
email which claims
she has received an
exciting discount
4. To avail discount,
Alice clicks on the link
and enters the login
credentials for
www.shoponline.com
8. Alice receives a
message stating a
huge $$$$$ amount
of money is deducted
from her account
How do you think this
happened??
10. Alice could save the data if she would have done the
following:
1. Use of Firewalls
2. Use of Honeypots
3. Unique alphanumerical passwords
4. Ignore mails from unknown sources
5. Use of antivirus software
6. Use of two-factor authentication
12. Networking Devices
1. Router
A router is a networking device that
forwards data packets between
computer networks. Routers perform
the traffic directing functions on the
Internet.
13. 2. Switch
It is a small hardware device that links
multiple PCs, printers, assess points,
phones, lights and servers together
within one local area network, wide
area network and different network
topology.
14. Addressing
IP address - An IP address is a unique address that identifies a device on the internet or a local network.
MAC address - MAC address is a unique number which is used to track a device in a network.
PORT address - Port addresses are particularly used to differentiate the data packets for various
applications so that the pc knows which application should process the packet. For example, port 80 is used for
http packets, port 21 for File transfer protocol ( FTP).
15. DNS
DNS stands for Domain Name System. The main function of
DNS is to translate domain names into IP Addresses, which
computers can understand.
16. VPN
• A virtual private network, or VPN, is an encrypted connection
over the Internet from a device to a network.
• The encrypted connection helps ensure that sensitive data is
safely transmitted.
• It prevents unauthorized people from eavesdropping on the
traffic and allows the user to conduct work remotely.
17. Virus
A computer virus is a
malicious piece of computer
code designed to spread
from device to device.
18. Hacking
A security hacker is someone who explores methods for breaching defenses and exploiting
weaknesses in a computer system or network.
White Hat hackers, sometimes
called “ethical hackers,” are
those with good intentions.
These hackers are typically
hired by organizations to do
exactly what Black Hat
hackers do — look for
vulnerabilities in a system.
Gray hat hackers
enact a blend of
both black hat and
white hat activities.
Gray hat hackers
often look for
vulnerabilities in a
system without the
owner's permission
or knowledge.
Black Hat hackers
are criminals who break into
computer networks with
malicious intent. They may
also release malware that
destroys files, holds
computers hostage, or
steals passwords, credit
card numbers, and other
personal information.