Section 1: Basic Introduction To Cyber Security and Information Security
Section 1: Basic Introduction To Cyber Security and Information Security
Availabilty
refers to authorization
CIA
Triad
Confidentiality Integrity
referes to privacy refers to accuracy
Protocol: digital language through which we communicate with others on the internet.
Types of Protocols:
1. TCP: transmission central protocol
Data is broken down into packets then sent to destination used for communication over
network.
2. FTP: file transfer protocol
Basically used for transferring files to different networks in a quicker way than other.
1
3. SMTP: simple mail transfer protocol
Manages the transmission and outgoing mail over the net.
4. HTTP: hypertext transfer protocol
Used for the connection between the web client and the web server.
5. ARP: address resolution protocol
Used to find a hardware address of a device from IP. It’s used when a device wants to
communicate with some other device on a local network.
6. DNS: domain name protocol
Maintain directory of domain name and translate them to IP address.
7. SSL: Secure Sockets Layer
Establishes encrypted connection between a web server and a browser in an online
connection.
8. TLS: Transport Layer Security
Provides privacy and data integrity between two communicating applications.
9. HTTPS: Hypertext Transfer Protocol Secure
It is a secure version of HTTP. It is often used to protect highly confidential online
transactions like online banking or online shopping…
10. SSH: Secure Socket Shell
Gives system administrators a secure way to access a computer over an unsecured
network.
2
2. Network Hacking: Gathering information about a network with the intent to harm its
system and hamper its operation.
3. Email Hacking: Getting unauthorized access on an Email account and using it
without the permission of its owner.
4. Password Hacking: Process of recovering secret passwords from data that has been
stored by a computer system.
5. Computer Hacking: Stealing computer ID and password by applying some methods
and getting unauthorized access to its system.
3
7. IP Spoofing: It refers to connection hijacking through a fake internet protocol (IP)
address. It is the action of making a computer IP address looks like it is authentic.
During this masking process, the fake IP address sends what appears to be a
malevolent message coupled with an IP address that appears to be trusted.
4
Rootkit: Set of programs or utilities that allows someone to maintain root-level access to
the system. It can be installed in number of ways including phishing attacks … Once
installed, it gives the remote actor access to control over almost every aspect of the
operating system.
Section 4: Defenses
Antivirus: Class of program designed to prevent, detect and remove malware infections
on individual computing devices, networks and IT systems.
Firewall: Network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security
rules.
Encryption: Method by which plaintext or any other type of data is converted from a
readable form to an encoded version that can only be decoded by another entity which
have access to decryption key.
2FA (2 Factor Authentication): Two- step verification or dual factor authentication; it is
a security process in which the user provides two different authentication factors to verify
itself to better protect the user’s credentials.
Honey Pots: Network- attached system set up as a decoy to lure cyber attackers and to
detect, deflect or study hacking attempts in order to gain unauthorized access to
information system.
DMZ (Demilitarized Zones): Small sub network that sits between a trusted internal
network such as a corporate or private LAN, and an untrusted external network such as
the public Internet.