0% found this document useful (0 votes)
64 views9 pages

Introduction To Cybersecurity

This document provides an introduction to cybersecurity. It defines cybersecurity as techniques used to protect networks, programs, and data from attacks, damage, or unauthorized access. It discusses the CIA concepts of confidentiality, integrity, and availability. It also outlines some basic principles of IT security, such as security being a process, not just products, and that security succeeds or fails on the weakest link. The document provides an overview of the key topics in cybersecurity.

Uploaded by

Michaela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views9 pages

Introduction To Cybersecurity

This document provides an introduction to cybersecurity. It defines cybersecurity as techniques used to protect networks, programs, and data from attacks, damage, or unauthorized access. It discusses the CIA concepts of confidentiality, integrity, and availability. It also outlines some basic principles of IT security, such as security being a process, not just products, and that security succeeds or fails on the weakest link. The document provides an overview of the key topics in cybersecurity.

Uploaded by

Michaela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Introduction to

Cybersecurity
Learning Objectives

• To introduce the
concepts of
cybersecurity.
• To understand the
CIA concepts.
• To discuss the
principles of IT
security.

2
“Cybersecurity refers to a set of
techniques used to protect the
integrity of networks, programs
and data from attack, damage or
unauthorized access.”

What is Cybersecurity?
Security in a nutshell

Computer Security Network Security Internetwork Security


Generic name for the collection Measures to protect data during Measures to protect data during
of tools designed to protect data their transmission their transmission over a
and to prevent hackers collection of interconnected
For distributed systems and the networks
For shared systems such as time- use of networks and
sharing systems, systems communications facilities for For a collection of
accessed over a public telephone carrying data between terminal interconnected networks such as
network user and computer and between an Internet
computer and computer

4
What is a “secure” computer
system?

To decide whether a computer system is


“secure”, you must first decide what
“secure” means to you, then identify the
threats you care about.

5
Why study cybersecurity?
Our network connectivity is only growing.
Job opportunities are projected to grow substantially
Specialties within cyber security are increasing
This job can be hard to outsource
You get to be a hero sometimes
You have multiple viable educational paths
It’s a career of consistent change
You get to solve complex technical puzzles
6
Basic Components of Cybersecurity

Confidentiality is the protection of Confidentiality: Who is authorized to


personal information. Confidentiality use data?
means keeping a client’s information
between you and the client, and not Integrity: Is data good?
telling others including co-workers, Availability: Can access data whenever
friends, family, etc. need it?
Integrity, in the context of computer
systems, refers to methods of ensuring
that data is real, accurate and
safeguarded from unauthorized user
modification.
Availability, in the context of a
computer system, refers to the ability
of a user to access information or
resources in a specified location and in
the correct format.

7
Principles of Security

• Security is a process, not a product


//meaning, CCTV doesn’t mean you’re secured. A security is always a process

• Computer Security is not just about computer systems


• Security and convenience are inversely proportional
//The higher the security the inconvenient it gets
• Security succeeds or fails based on the weakest link
// No matter how secure your defense is, if there’s a person who has the will to do a crime it will happen.
• Hackers are generally technologists (as opposed to programmers, they build system)
• Utilize Multiple Layers of Defense
//Don’t focus on one layer of security, depends on level
• Focus your security energy on dealing with the most likely threat
• One aspect of security is obscurity

8
References

• Volonino, L, Robinson S. R., “PRINCIPLES AND PRACTICES OF


INFORMATION SECURITY”, Pearson/Prentice Hall, 2004
• Vacca, J. A., “MANAGING INFORMATION SECURITY (1st Edition)”,
Elsevier, 2010
• Stallings, W., “CRYPTOGRAPHY AND NETWORK SECURITY (5th
Edition)”, Pearson/Prentice Hall, 2011
• Paul, “What is Cybersecurity? – A Beginner’s Guide to Cybersecurity
World”, www.edureka.co, 2019
• Flavin, B., “Why Study Cyber Security? 8 Reasons to Remember”,
https://www.rasmussen.edu/degrees/technology/blog/why-study-cyber-securi
ty
/, 2019

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy