Understanding the fundamentals of cybersecurity concepts and threats
By the end of this module, you will be able to:
Cybersecurity is the practice of protecting systems, networks, programs, devices, and data from digital attacks, damage, or unauthorized access. It encompasses technologies, processes, and practices designed to safeguard all components of cyberspace from threats.
The Cyber Kill Chain model developed by Lockheed Martin describes the stages of a cyber attack:
The CIA Triad forms the foundation of information security:
Risk = Threat × Vulnerability × Impact
Review the following scenario:
A company employee received an email appearing to be from the IT department requesting they update their password by clicking a link. After following the link and entering their current credentials, they began experiencing unusual behavior on their computer, and colleagues reported receiving strange emails from their account.
Answer the following questions: 1. What type of attack likely occurred? 2. What were the attack vectors? 3. What security principles were violated? 4. What could have prevented this attack? 5. What immediate steps should be taken to respond?
Next week, we’ll explore regulatory frameworks and compliance requirements in cybersecurity, and set up our security lab environment for hands-on practice throughout the course.
1.3.1.2 Social Engineering