SlideShare ist ein Scribd-Unternehmen logo
1 von 47
GENERAL INTRODUCTION
TO IT AND CYBER
SECURITY
LESSON 1
DIFFERENCE BETWEEN
INFORMATION SECURITY AND
CYBER SECURITY
• Cybersecurity deals specifically with
protecting your data from cyber
threats.
• Information Security it is all about
protecting your data from various
kinds of threats.
• So information security is a bit
more broad. It's broader than
cyber security.
• Cyber security is a bit more niche
because it focuses specifically on
protecting data from cyber
threats.
• Cyber law, cyber crime and Cyber
warfare
Basically, when you hear the word cyber attack
cybersecurity always.
But when you're protecting data from physical
threats from fire outbreaks, from flood, that's
more of information security.
The Trinity of IT Security -
CIA These are the
three
fundamental
pillars
of
cybersecurity.
But what exactly are they?
• Confidentiality: Ensuring that data is private
and accessed only by those with permission
to do so. Can be achieved with the use of
passwords, biometrics and encryption
• Integrity: Ensuring that data has not been
altered in any way. Can be achieved through
the use of checksums and access control.
• Availability: Ensuring that data is always
available for access and use. Can be achieved
through the use of backups, maintenance &
disaster recovery plans
• Disclosure data is accessed by
non-authorized users.
 Things like Trojans, brute force
attacks, even theft. Physical theft of
computers, memory cards, data
discs, and so on.
• Alteration data has been
compromised or tampered
with.
 Malware involved, viruses, SQL
injection attacks,
• Deniability where access to
data and resources are blocked.
 Denial-of-service attack,
ransomware, and so on.
Basic
Terminologies
 Blacklist - Used to refer to a list of
banned IP addresses, applications or
users.
 Whitelist - The exact opposite of a
blacklist
 Cat fishing - The process of creating a
fake online profile in order to trick
people into believing they are someone
else for financial gain.
Basic
Terminologies
 Authentication - The process of proving
an individual is who they claim to be.
 Data Mining - The activity of analyzing
and/or searching through data in order
to find items of relevance, significance
or value
Basic
Terminologies
 Threat - This generally refers to
anything that has the potential to cause
our data, systems and networks harm.
 Exploit - A clearly defined way to breach
the security of a system.
Basic
Terminologies
 Vulnerabilities - These are weaknesses
within a system or network that can be
exploited to cause us harm.
 Risk - This refers to the likelihood of
something bad happening. A risk
requires both a threat and a vulnerability
to exist.
Basic
Terminologies
 Zero Day - This is used to describe a
threat that is unknown to security
specialists and has not been addressed.
 Hack Value - This describes a target that
may attract an above average level of
attention from an attacker.
Basic
Terminologies
 Non-Repudiation - This is the concept
that once an action is carried out by a
party it cannot be denied by that same
party.
 Logic Bomb - A malicious code that is
only triggered when a set of conditions
are met.
Basic
Terminologies
 Obfuscation - A term used to describe
the tactic of making code unclear so that
humans or programs like an antivirus
cannot understand it.
 Honey Pot - A decoy or trap for hackers
 Spoof - The act of falsifying the identity
of the source of a communication or
interaction
COMPUTER
PROTOCOLS
 Protocol - is a set of rules that
determine how computers
communicate with each other.
 Protocol would also govern how an
internet document gets transmitted
to a computer screen.
COMPUTER
PROTOCOLS
 Protocol - will also determine
what part of the conversation
comes at which time and also
how the conversation ends.
TWO MOST POPULAR
PROTOCOLS
 HTTP (HyperText Transfer Protocol)
 HTTPS (HyperText Transfer Protocol
Secure)
TWO MOST POPULAR
PROTOCOLS
 HTTP (HyperText Transfer Protocol)
- determines how web browsers and
servers communicate. Uses port 80
HTTP (Stateless
System)
One thing about HTTP that separates it
from other protocols out there is that it is
referred to as a stateless system. Now, what
this means is that whenever your web
browser makes a request to a web server,
once that request has been satisfied, the
communication between your web browser
and the web server will be dropped; the
connection will no longer be maintained.
HTTP (Stateless
System)
• So it will only be reopened whenever
again you try to access another
website or maybe even another page
on the current website.
• So in such a scenario where
connections are dropped between
the person making the request or the
system accepting the request, that's
TWO MOST POPULAR
PROTOCOLS
 HTTPS (HyperText Transfer Protocol
Secure) - The secure version of HTTP
that uses encryption. Commonly
used on websites where there is an
exchange of sensitive data like
passwords and credit card details.
Uses port 443
HTTPS (S stands for
Secured)
• So the one thing that separates
HTTPS from HTTP is that with HTTPS,
you have something called
encryption, which means that all the
information and text that you see on
that website will be protected and
secured from several criminals or
hackers.
PIECE OF ADVICE FROM THE
EXPERTS
• Whenever you are on a site where
sensitive information would be
exchanged, maybe credit card
information or PIN numbers or things
like that, HTTPS should be the major
protocol in operation and not HTTP.
PIECE OF ADVICE FROM THE
EXPERTS
• Whenever you're trying to buy
something online and you are on
a store or an e-Commerce store,
if they don't have HTTPS, that
would be a very bad idea to shop
in such a website.
SSL AND SSH
 SSL (stands for the Secure Sockets
Layer) and it's used by HTTPS to
provide encryption.
 SSH (stands for Secure Shell) and it's
used specifically by programmers
and network administrators.
One thing you should know is that they
are technically not protocols. SSL and
SSH are not technically protocols, but
they are always used by security
protocols like the HTTPS, SFTP and
some other ones out there for them to
fully operate.
…You should know
More PROTOCOLS
 FTP (stands for the File
Transfer Protocol) and it
governs how files are
transmitted from one
computer to another.
More PROTOCOLS
 SFTP (is simply the secured
form of the file transfer
protocol) So this will provide
encryption and make it more
secure against cyber criminals
and hackers.
IMAP AND SMTP
 IMAP is simply the Internet
Access Message Protocol, and
of course, it controls how
internet messages are sent.
IMAP AND SMTP
 SMTP stands for the Simple
Mail Transfer Protocol, and
this governs how emails are
sent and received.
What are Cookies?
• A cookie is a text file which
is placed on your computer
whenever you visit a
website.
• This cookie allows the
website to keep track of your
visit details and store your
preferences.
• The main objective here is to increase the
speed with which you visit that same
website again.
• At the same time, they are very
useful for advertisers who can
match the ads to your interests
after they see your browsing
history.
• Usually, cookies and temporary files may
affect your privacy since they disclose your
online habits, but it is possible to modify
your web browser preferences and set a
limit.
COOKIES FUNCTIONS
TCP/IP
 TCP (Transmission Control
Protocol): Divides a message
or file into smaller packets
that are transmitted over the
internet and then reassembled
at the destination point.
EXAMPLE
 So imagine you wanted to send a
very big device, or some sort of
machinery to a friend of yours who
lives across the country.
 Now, sending the device as one
piece might be difficult. So, what
you can do is to split up the device
into smaller pieces.
EXAMPLE
 You could pick out the parts one
by one, separate the bolts, the
nuts, things like that, and then
send them in smaller packages.
 That's basically what TCP does.
TCP/IP
 IP (stands for the Internet
Protocol): that it is responsible
for the address of each packet
that is sent so that they are
sent to the right destination.
WHAT WILL HAPPEN?
 TCP will split up the data into
smaller packets. IP would make
sure that all those packets are
sent to the right destination.
 And then when all those packets
have arrived at the destination,
TCP takes over again, and then
reassembles all the smaller
FOUR MAJOR LAYERS
 Data Link Layer
 Internet Layer
 Transport Layer
 Application Layer
FOUR MAJOR LAYERS
 Data Link Layer consists of
protocols that operate on a link
that connects hosts on a network
e.g Ethernet
• An example of a protocol that would
exist here, would be the Ethernet
protocol.
FOUR MAJOR LAYERS
 Internet Layer connects
independent networks together
e.g IP
 Transport Layer Handles
communication between hosts,
and this is where you would find
the TCP protocol itself. e.g TCP
FOUR MAJOR LAYERS
 Application Layer Standardizes
data exchange for applications e.g
HTTP, FTP
SUMMARY
• So overall, TCP and IP is very, very
popular. They are used for several kinds
of communications. They're used mostly
on the internet, used for emails.
• Whenever you're sending emails, you're
playing video games as well, you are
using TCP/IP.
• These are all examples of where the TCP
and IP
NEXT LESSON
HACKERS – WHO ARE
THEY?

Weitere ähnliche Inhalte

Ähnlich wie Lesson 1. General Introduction to IT and Cyber Security.pptx

Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???trendy updates
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetgabriela-technoteacher
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 

Ähnlich wie Lesson 1. General Introduction to IT and Cyber Security.pptx (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Network security
Network securityNetwork security
Network security
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Firewall
FirewallFirewall
Firewall
 
Modules1
Modules1Modules1
Modules1
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Lesson 1. General Introduction to IT and Cyber Security.pptx

  • 1. GENERAL INTRODUCTION TO IT AND CYBER SECURITY LESSON 1
  • 2. DIFFERENCE BETWEEN INFORMATION SECURITY AND CYBER SECURITY • Cybersecurity deals specifically with protecting your data from cyber threats. • Information Security it is all about protecting your data from various kinds of threats.
  • 3. • So information security is a bit more broad. It's broader than cyber security. • Cyber security is a bit more niche because it focuses specifically on protecting data from cyber threats.
  • 4. • Cyber law, cyber crime and Cyber warfare Basically, when you hear the word cyber attack cybersecurity always. But when you're protecting data from physical threats from fire outbreaks, from flood, that's more of information security.
  • 5. The Trinity of IT Security - CIA These are the three fundamental pillars of cybersecurity.
  • 6. But what exactly are they? • Confidentiality: Ensuring that data is private and accessed only by those with permission to do so. Can be achieved with the use of passwords, biometrics and encryption • Integrity: Ensuring that data has not been altered in any way. Can be achieved through the use of checksums and access control.
  • 7. • Availability: Ensuring that data is always available for access and use. Can be achieved through the use of backups, maintenance & disaster recovery plans
  • 8.
  • 9. • Disclosure data is accessed by non-authorized users.  Things like Trojans, brute force attacks, even theft. Physical theft of computers, memory cards, data discs, and so on.
  • 10. • Alteration data has been compromised or tampered with.  Malware involved, viruses, SQL injection attacks,
  • 11. • Deniability where access to data and resources are blocked.  Denial-of-service attack, ransomware, and so on.
  • 12. Basic Terminologies  Blacklist - Used to refer to a list of banned IP addresses, applications or users.  Whitelist - The exact opposite of a blacklist  Cat fishing - The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.
  • 13. Basic Terminologies  Authentication - The process of proving an individual is who they claim to be.  Data Mining - The activity of analyzing and/or searching through data in order to find items of relevance, significance or value
  • 14. Basic Terminologies  Threat - This generally refers to anything that has the potential to cause our data, systems and networks harm.  Exploit - A clearly defined way to breach the security of a system.
  • 15. Basic Terminologies  Vulnerabilities - These are weaknesses within a system or network that can be exploited to cause us harm.  Risk - This refers to the likelihood of something bad happening. A risk requires both a threat and a vulnerability to exist.
  • 16. Basic Terminologies  Zero Day - This is used to describe a threat that is unknown to security specialists and has not been addressed.  Hack Value - This describes a target that may attract an above average level of attention from an attacker.
  • 17. Basic Terminologies  Non-Repudiation - This is the concept that once an action is carried out by a party it cannot be denied by that same party.  Logic Bomb - A malicious code that is only triggered when a set of conditions are met.
  • 18. Basic Terminologies  Obfuscation - A term used to describe the tactic of making code unclear so that humans or programs like an antivirus cannot understand it.  Honey Pot - A decoy or trap for hackers  Spoof - The act of falsifying the identity of the source of a communication or interaction
  • 19. COMPUTER PROTOCOLS  Protocol - is a set of rules that determine how computers communicate with each other.  Protocol would also govern how an internet document gets transmitted to a computer screen.
  • 20. COMPUTER PROTOCOLS  Protocol - will also determine what part of the conversation comes at which time and also how the conversation ends.
  • 21. TWO MOST POPULAR PROTOCOLS  HTTP (HyperText Transfer Protocol)  HTTPS (HyperText Transfer Protocol Secure)
  • 22. TWO MOST POPULAR PROTOCOLS  HTTP (HyperText Transfer Protocol) - determines how web browsers and servers communicate. Uses port 80
  • 23. HTTP (Stateless System) One thing about HTTP that separates it from other protocols out there is that it is referred to as a stateless system. Now, what this means is that whenever your web browser makes a request to a web server, once that request has been satisfied, the communication between your web browser and the web server will be dropped; the connection will no longer be maintained.
  • 24. HTTP (Stateless System) • So it will only be reopened whenever again you try to access another website or maybe even another page on the current website. • So in such a scenario where connections are dropped between the person making the request or the system accepting the request, that's
  • 25. TWO MOST POPULAR PROTOCOLS  HTTPS (HyperText Transfer Protocol Secure) - The secure version of HTTP that uses encryption. Commonly used on websites where there is an exchange of sensitive data like passwords and credit card details. Uses port 443
  • 26. HTTPS (S stands for Secured) • So the one thing that separates HTTPS from HTTP is that with HTTPS, you have something called encryption, which means that all the information and text that you see on that website will be protected and secured from several criminals or hackers.
  • 27. PIECE OF ADVICE FROM THE EXPERTS • Whenever you are on a site where sensitive information would be exchanged, maybe credit card information or PIN numbers or things like that, HTTPS should be the major protocol in operation and not HTTP.
  • 28. PIECE OF ADVICE FROM THE EXPERTS • Whenever you're trying to buy something online and you are on a store or an e-Commerce store, if they don't have HTTPS, that would be a very bad idea to shop in such a website.
  • 29. SSL AND SSH  SSL (stands for the Secure Sockets Layer) and it's used by HTTPS to provide encryption.  SSH (stands for Secure Shell) and it's used specifically by programmers and network administrators.
  • 30. One thing you should know is that they are technically not protocols. SSL and SSH are not technically protocols, but they are always used by security protocols like the HTTPS, SFTP and some other ones out there for them to fully operate. …You should know
  • 31. More PROTOCOLS  FTP (stands for the File Transfer Protocol) and it governs how files are transmitted from one computer to another.
  • 32. More PROTOCOLS  SFTP (is simply the secured form of the file transfer protocol) So this will provide encryption and make it more secure against cyber criminals and hackers.
  • 33. IMAP AND SMTP  IMAP is simply the Internet Access Message Protocol, and of course, it controls how internet messages are sent.
  • 34. IMAP AND SMTP  SMTP stands for the Simple Mail Transfer Protocol, and this governs how emails are sent and received.
  • 35. What are Cookies? • A cookie is a text file which is placed on your computer whenever you visit a website. • This cookie allows the website to keep track of your visit details and store your preferences. • The main objective here is to increase the speed with which you visit that same website again.
  • 36. • At the same time, they are very useful for advertisers who can match the ads to your interests after they see your browsing history. • Usually, cookies and temporary files may affect your privacy since they disclose your online habits, but it is possible to modify your web browser preferences and set a limit. COOKIES FUNCTIONS
  • 37. TCP/IP  TCP (Transmission Control Protocol): Divides a message or file into smaller packets that are transmitted over the internet and then reassembled at the destination point.
  • 38. EXAMPLE  So imagine you wanted to send a very big device, or some sort of machinery to a friend of yours who lives across the country.  Now, sending the device as one piece might be difficult. So, what you can do is to split up the device into smaller pieces.
  • 39. EXAMPLE  You could pick out the parts one by one, separate the bolts, the nuts, things like that, and then send them in smaller packages.  That's basically what TCP does.
  • 40. TCP/IP  IP (stands for the Internet Protocol): that it is responsible for the address of each packet that is sent so that they are sent to the right destination.
  • 41. WHAT WILL HAPPEN?  TCP will split up the data into smaller packets. IP would make sure that all those packets are sent to the right destination.  And then when all those packets have arrived at the destination, TCP takes over again, and then reassembles all the smaller
  • 42. FOUR MAJOR LAYERS  Data Link Layer  Internet Layer  Transport Layer  Application Layer
  • 43. FOUR MAJOR LAYERS  Data Link Layer consists of protocols that operate on a link that connects hosts on a network e.g Ethernet • An example of a protocol that would exist here, would be the Ethernet protocol.
  • 44. FOUR MAJOR LAYERS  Internet Layer connects independent networks together e.g IP  Transport Layer Handles communication between hosts, and this is where you would find the TCP protocol itself. e.g TCP
  • 45. FOUR MAJOR LAYERS  Application Layer Standardizes data exchange for applications e.g HTTP, FTP
  • 46. SUMMARY • So overall, TCP and IP is very, very popular. They are used for several kinds of communications. They're used mostly on the internet, used for emails. • Whenever you're sending emails, you're playing video games as well, you are using TCP/IP. • These are all examples of where the TCP and IP
  • 47. NEXT LESSON HACKERS – WHO ARE THEY?

Hinweis der Redaktion

  1. So let's talk about the difference between cybersecurity and information security. Now, in the real world these two terms are used interchangeably all the time. Let me ask you a question here. See, this is my storage device my physical flash drive, right? I've got some very important data in here. Would you classify my actions on that? Cybersecurity or information security?
  2. Threats that exist on the internet threats that exist in the cyber world. But when you're talking about information security it's a lot broader. Whether there are threats that exist in the cyber world or even from physical threats like thieves who may want to steal my physical hard drive.
  3. With that being said, in cybersecurity, we also have some special branches like cyber law, cyber crime. When one country launches a cyber attack against another country, that falls on the cyber warfare, which is under cybersecurity.
  4. Let's talk about the fundamental pillars of cybersecurity and cyber crime in general. And I'm talking about the CIA and the DAD triads. Now, what exactly is CIA? It is confidentiality, integrity, and availability.
  5. Generally, anything that ensures that data is accessed by only those that that have the right access to it, that's what we call confidentiality. But we also have integrity, where data has not been tampered or altered in any-
  6. Basically, data and resources are available to be accessed or shared.
  7. But then we have the dark side, DAD, which is basically the exact opposite of CIA. So, rather than having confidentiality, we have disclosure. Rather than having integrity, we have alteration. Rather than having availability, we have deniability.
  8. If you plan on becoming a cybersecurity professional or you just want to improve your overall knowledge of information security, then you need to understand what computer protocols are. So what exactly is a protocol? So if you have computers on the same network trying to exchange information, or maybe you even have a computer trying to access a website, you have a protocol or even different protocols working behind the scenes. So again, when you go online, if you're using Firefox or Chrome or Safari, and you try to access a website, all of the images and text and videos that you see on your screen, you have protocols working behind the scenes to ensure that you get to receive all that information.
  9. Remember, that we are talking about the conversation between computers and networks here.
  10. So let's start off with the two most popular protocols out there, which would be HTTP and HTTPS.
  11. This is one of the most popular protocols is because it determines how browsers and web servers communicate. HTTP is the major protocol of the internet. Whenever you go online, whether you're trying to buy something or you're trying to access a website, or even if you're trying to play games online, you have HTTP working behind the scenes.
  12. All right, so moving on to the next two, which would be the SSL and SSH. So whenever you see websites that have the HTTPS protocol, that means that they also have the secure sockets layer, because it's actually the secure sockets layer that provides the necessary encryption. So whenever a network administrator needs to log into the backend of a website or a web server to make certain changes, they'll very often use SSH to connect to the web server, because it is very, very secure.
  13. So moving on to some other protocols out there, we also have the FTP and SFTP. So whenever you're trying to download files from another computer or from another web server, you have FTP in operation, or even if you're trying to upload files, documents as well, then FTP would be the protocol in use.
  14. So whenever you're chatting online, most likely it is the IMAP that is in control right there.
  15. Now, of course, these aren't all the protocols that exist. There are several ones out there, but the ones we've covered are the major ones that you should know about.
  16. You may have heard of the term cookies before but what exactly are they and how can they affect the security of your computer?
  17. So imagine you wanted to send a very big device, or some sort of machinery to a friend of yours who lives across the country.
  18. It splits up data into smaller packets so that they are transmitted more effectively across the internet.
  19. So, together, we refer to it as the TCP/IP Protocols and they are a suite of protocols used to interconnect network devices on the internet.
  20. And they are divided into four major layers.
  21. So whenever you have your computer linking up to the internet, that actual link itself is the Datalink Layer.
  22. So, the internet layer is all about connecting networks now together, and not just single hosts, but major networks.
  23. And then finally, we have the Application Layer. This standardizes the actual data exchange, and this is where you would have protocols like the HTTP and the FTP.