What Is Cybersecurity
What Is Cybersecurity
WHAT IS CYBERSECURITY?
TITLES IN THIS SERIES
WHAT IS CYBERSECURITY?
KAMAR
HAQ KAMAR
LET’S FI N D OUT! COM PUTER SCI ENCE
WHAT IS
CYBERSECURITY?
HAQ KAMAR
Published in 2018 by Britannica Educational Publishing (a trademark of Encyclopædia Britannica, Inc.) in
association with The Rosen Publishing Group, Inc.
29 East 21st Street, New York, NY 10010
Copyright © 2018 The Rosen Publishing Group, Inc. and Encyclopædia Britannica, Inc. Encyclopædia
Britannica, Britannica, and the Thistle logo are registered trademarks of Encyclopædia Britannica, Inc. All
rights reserved.
First Edition
Rosen Publishing
Bernadette Davis: Editor
Nelson Sá: Art Director
Nicole Russo-Duca: Series Designer
Cindy Reiman: Photography Manager
Sherri Jackson: Photo Researcher
C omputer N etworks ?
A computer stores,
displays, and processes
information. Computers
come in many forms. We
use desktops, laptops,
tablets, or smartphones
at home, at school, and
at work. Computers
help with manufacturing
products, keeping
records, communicating,
All of these devices and banking. Computers can be fun,
are computers. They too. We use computers to shop, to
are each used for listen to music, and to play games.
different reasons, A computer network is a
and some are more
collection of computers that are
mobile than others.
connected to each other. They
4
The computers
in this computer
lab have access
to the internet
and to a local area
network.
Think About It
Think about what would happen if you and
your family went through a day without using
a computer at all. What would you do? What
activities would you have to do differently?
5
P hysical H arm
Computers can be damaged
in many different ways. A
person can pour water on
a device, hit it with a hard
object, or drop it.
Computers can also
be stolen. A smartphone
can be taken from out
of a person’s pocket or a
laptop may be swiped from
an unattended chair in a
restaurant. There are many other ways A Kensington
a computer may be stolen. Laws clearly lock will keep
explain punishments for people who a device secure
steal or deliberately damage physical while left in
property such as computers. However, an open area if
it is locked to
people can also damage computers
furniture.
through software. A hacker, or a person
6
Malware can come from
running a program or
downloading files from
a flash drive like the one
pictured.
7
W hat I s
C ybersecurity ?
The word “cyber” means “related to computers or
computer networks.” Cybersecurity therefore is
protection for your computer and the information
on the computer. Without cybersecurity, data on a
computer can be erased or stolen.
Keeping yourself safe online is a lot like keeping
yourself safe offline. It is important to be aware of your
surroundings at all
times. Understand
where threats may
A firewall can
protect computers
by filtering traffic
between devices
and the internet.
8
Someone has
left a computer
and a cell phone
unattended. The
devices and the
data they store
are at risk.
come from
and know
how to get help. However, it is a little harder to keep
your virtual existence safe. Your virtual existence is the
information that computers and databases associate
with you. Threats in the virtual world are not always as
easy to recognize as threats in the real world. That is
why cybersecurity is so important.
9
W hy A ttack
a C omputer ?
Cybersecurity can often stop hackers from committing
a cybercrime. However, some hackers are familiar with
certain cybersecurity measures and know how to get
around them.
Hackers may break into computers for a number of
reasons. They may want to sell the data they access or
use the victim’s computer to spread harmful programs.
They may also
want to harm
or embarrass an
organization they
do not like. Or,
12
Sharing credit card
information online can
be dangerous. There’s
always a chance for shared
information to be abused.
13
M alware
Malicious software, or malware, is more invasive
than phishing. It enters a computer through
network connections, other software, and hardware.
Downloading email attachments, visiting websites,
or attaching a hardware device can put malware on a
computer.
There are many types of malware. One type is
spyware. Spyware gathers information by watching what
a user does. Spyware can steal webcam footage and allow
a hacker to watch the user. It can also record input.
Worms
and viruses are
other types of
malware. When
downloaded,
they attempt
to spread
themselves either Think About It
throughout the same During the Trojan War, the
infected computer ancient Greeks built a hollow
or to a network. wooden horse that allowed them
Spreading can corrupt to enter the city of Troy and
data. capture it. Why do you think
Trojan malware has that name?
Trojans, or Trojan
horse viruses, are
malware, too. Trojans are packaged with software that
the user did intend to install. It is like opening a box of
cereal and finding a prize you did not expect, but the
prize is actually something harmful or unpleasant.
15
W hat D oes
M alware D o ?
One effect of malware is that it slows down the infected
computer when it runs. The infected computer may also
become a zombie computer, or a computer that hackers
control. Many zombie computers can attack a website
by overloading it with traffic. One way to understand
this is to think of a small restaurant where hundreds of
people want to eat. There would not be enough space for
all of them to eat. A restaurant employee would have to
16
This man is checking his
email. Email attachments
may have malware.
17
M alware and
I ndividuals
Malware that deletes data can cause many problems.
Victims may only lose a few hours of homework, or they
may lose years of photos and videos. It can cost money,
too, if the malware damages a computer so that it needs
to be fixed or replaced.
A serious cybercrime Vocabulary
committed against individuals is
identity theft. Hackers can use Identity means the
qualities that make
one person or thing
different from all
others.
This woman is
destroying data to
protect information.
Destroying data can
also be harmful.
18
Identity
thieves will
target sensitive
information like
a Social Security
number or a
credit card to
steal money.
19
M alware and
C ompanies
Companies sometimes use software that acts as malware.
For example, a music company called Sony BMG once
installed software on their music CDs that was meant to
stop the user from copying the music. However, it also
had other effects. Hackers were able to use the same
software to cause trouble on other computers.
Companies can also be victims. Some hackers target
companies to steal customers’ personal information.
Other hackers are more
20
Think About It
Should a company ever be able to access the data
on a user’s computer if the company isn’t helping
to fix a software problem? Why or why not?
22
Compare and Contrast
share it with others.
How is stealing a government’s
They may have many
computer information similar
reasons for doing that. to stealing information from
They may want to sell an individual or a company?
the information or How is it different?
they may want to let
other people know
about activities that they do not approve of.
Governments themselves may use malware to
hack into the computers of other governments or of
companies. A man named Edward Snowden released files
showing that the US government was secretly collecting
data about many
citizens and
foreigners.
Sensitive government
documents are
frequently blacked out
for security reasons.
23
G ood P ractices
Users can protect their devices
by installing anti-malware
software. This software scans
a computer for malware and
attempts to remove it. Users
can also add a firewall to
protect their information.
It is also a good idea to
back up data often. This
involves creating copies of the
Vocabulary
A firewall is a program
that restricts access to a
computer.
24
This external hard
drive is hooked up to a
laptop. Users can back
up data on external
hard drives.
25
D ata E ncryption
Encryption is an advanced form of protection.
Computers encrypt data by turning it into a code that
must be solved, or decrypted, to be read.
Encryption has been done by hand since ancient
times. Encryption is useful because it is not easy to read
or determine the value of encrypted data. In addition
to encrypting files, a
user can encrypt access
points. Doing that
means a hacker cannot
even get to the files on
a computer. Layers of
encryption mean layers of
cybersecurity.
26
Think About It
Speaking another language is like encryption.
What else is like encryption?
Encryption scrambles
information. It
makes the data look
something like this.
27
L aw
E nforcement
There are some laws against online misconduct but not
for every type of attack. As a result, some victims of
online attacks cannot receive justice or compensation
for their trouble.
Companies and providers of internet service work to
end abuse. They may recognize and address some abuses,
but there are too many abuses to keep up with.
Using
the internet
This police
officer is
looking at email.
She may be
investigating a
cybercrime.
28
In 2013, Major General
Brett Williams spoke
to a crowd about
cybersecurity.
creates an
environment
that exposes
people to
millions of
strangers.
Certain websites have more visitors than the population
of the biggest cities in the world. Online hackers can do
much more than thieves stealing in the real world.
It is possible to keep hackers out of your computer,
however. You must protect hardware and data from
theft. Have a plan and know what to do if protection
fails. Parents can help
Think About It with prevention, and
Computers can be difficult computer experts can
to keep safe, but people solve any problems
still like to use them. Why that occur.
do you think that is?
29
G lossary
communicate To send and receive malicious Mean or spiteful; deliberately
information. harmful.
cyberattack An online attack. scam A plan to deceive or trick someone.
decrypt To crack a code so that the spyware Software that collects and
message can be read. shares information about a computer’s
denial of service attack An attack that activities without the user’s permission.
overloads a website so that no one can URL An address on the internet. It is
use it. short for Uniform Resource Locator
hacker An expert at programming and and is formatted as “http://www.
solving problems with a computer; a website.com.”
person who gains access to a computer virtual Of or existing mostly online.
system through an unusual entry point. virus A program that produces copies of
infected Contaminated with a harmful itself in a computer.
computer program. worm A program that infects and
input To enter data into a computer. damages networks.
internet A communications system
that connects computers and computer
networks all over the world.
30
F or M ore
I nformation
Books
Brundle, Harriet. Staying Safe Online. Kings Lynn, UK: BookLife, 2016.
Goldstein, Margaret J., and Martin Gitlin. Cyber Attack. Minneapolis, MN:
Twenty-First Century Books, 2015.
Head, Honor. Being Safe Online. London, UK: Franklin Watts, 2015.
McAneney, Caitie. Online Safety (Let’s Talk About It). New York, NY: Powerkids
Press, 2015.
Stuckey, Rachel. Cyber Bullying. New York, NY: Crabtree Publishing Company, 2013.
Websites
Because of the changing nature of internet links, Rosen Publishing has developed
an online list of websites related to the subject of this book. This site is updated
regularly. Please use this link to access this list:
http://www.rosenlinks.com/LFO/Cyber
31
I ndex
computer network, 4–5, 8 Investigation (FBI), 21 online safety, 8–9, 28–29
computers firewall, 8, 24
backup, 25 phishing, 12–13
definition, 4 hackers
encryption, 26–27 company-employed, 11 smartphones, 4, 6, 21
infection of, 14–15, 16–17, definition, 6–7 Snowden, Edward, 23
18 and identity theft, 18–19 software
physical harm to, 6–7 protection from, 26, 29 anti-malware, 24
scans, 24 reasons for attack, 10–11, destructive, 6–7
types of, 4–5 20–21 malware, 14–15, 20
virus, 14–15 and spyware, 14 Sony BMG, 20
worm, 14–15 and zombie computers, spyware, 14
cybercrime, 10–11, 18 16–17
cybersecurity Trojan viruses, 15
definition, 8–9 identity theft, 18–19
and encryption, 26 internet, 5, 28–29 virtual existence, 9
and governments, 22–23
and hackers, 10 law enforcement, 28–29 zombie computers, 16–17
32
LET’S FI N D OUT! COM PUTER SCI ENCE
WHAT IS CYBERSECURITY?
TITLES IN THIS SERIES
WHAT IS CYBERSECURITY?
KAMAR
HAQ KAMAR