Please enable JavaScript.
Coggle requires JavaScript to display documents.
cyber security all modules - Coggle Diagram
cyber security all modules
Cybercrime impacts individuals, businesses, and society as a whole, leading to financial losses, reputational damage, and potential disruptions to critical services
Cybersecurity is the practice of protecting computers, networks, programs, and data from digital attacks and unauthorized access
Common cyber security threats include malware, phishing, social engineering, ransom ware, DDoS attacks, and insider threat
Cybersecurity careers encompass a wide range of roles, from entry-level analysts to senior leadership positions. These careers focus on protecting computer systems and networks from cyber threats, ensuring data security and privacy, and mitigating the risk of cyberattacks.
White hat attackers break into networks or computer systems to identify any
weaknesses so that the security of a system or network can be improved. These
break-ins are done with prior permission and any results are reported back to the
owner.
Gray hat attackers may set out to find vulnerabilities in a system, but they will only
report their findings to the owners of a system if doing so coincides with their agenda.
They might even publish details about the vulnerability on the internet so that other
attackers can exploit it.
Black hat attackers take advantage of any vulnerability for illegal personal, financial,
or political gain.
Cybercriminals use many different types of malicious software, or malware, to carry out their
activities. The use of malware is any code that can steal data, bypass access controls, or cause
harm to or compromise a system. Knowing the different types and how they spread is key to
containing and removing them.
Spyware:
Spyware monitors your online activity and can log every key you press on your keyboard and
capture almost any of your data, including sensitive personal information such as your online
banking details. Its design is to track and spy on you. Spyware does this by modifying the security
settings on your devices.
Attackers also achieve infiltration through advanced persistent threats (APTs) — a multi-phase,
long-term, stealthy, and advanced operation against a specific target. For these reasons, an
individual attacker often lacks the skill set, resources, or persistence to perform APTs.
When you are away from home, you can access your online information and surf the Internet via
public wireless networks or Wi-Fi hotspots.
However, some risks are involved, meaning it is best not to access or send personal information
using public Wi-Fi.
It would help if you continuously verified that your device does not configure with file and media
sharing and requires user authentication with encryption.
You should also use an encrypted VPN service to prevent others from intercepting your
information (known as ‘eavesdropping’) over a public wireless network.
This service gives you secure access to the Internet by encrypting the connection between your
device and the VPN server.
Even if hackers intercept a data transmission in an encrypted VPN tunnel, they cannot decipher it.
Encryption is the process of converting information into a form in which unauthorized parties
cannot read it.
Open authorization (OAuth) is an open standard protocol that allows you to use your credentials to
access third-party applications without exposing your password.
What does this mean in practice?
You are looking forward to registering for Cisco’s ‘Cybersecurity Essentials,’ the next course in this
series, to help you develop your career. But you must be logged into the eLearning portal to do
Popular online services, such as Google, Facebook, Twitter, LinkedIn, Apple, and Microsoft, use
two-factor authentication to add an extra layer of security for account logins.