Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security Revision - Coggle Diagram
Cyber Security Revision
Understand what is meant by Cyber Security
1.1 Cyber Security aims to protect information
Core Objectives of Information Protection
Confidentiality: Ensuring sensitive data is only accessible to authorized individuals. This prevents unauthorized disclosure and data leaks through measures like encryption and strict access controls.
Integrity: Safeguarding information from unauthorized modification, deletion, or tampering to ensure it remains accurate and trustworthy. Methods include digital signatures and hashing to detect changes.
Availability: Guaranteeing that authorized users have reliable and timely access to data and systems when needed. This involves protecting against DDoS attacks and system failures through redundancy and disaster recovery plans.
Methods of Protection
Technology: Tools like firewalls, Antivirus software, and Multi-Factor Authentication (MFA) to create technical barriers against attackers.
Processes: Established frameworks (e.g., NIST CSF or ISO 27001) and policies that define how to identify, detect, and respond to threats.
People: Regular security awareness training for employees to recognize threats like phishing and social engineering, which involve a human element in 68% of breaches.
1.2 Types of cyber security incidents
Primary Incident Categories in 2025
Phishing & Social Engineering: Phishing remains the #1 entry point for attackers, involved in roughly 16% of breaches. It has evolved into "Phishing 2.0," utilizing generative AI to create hyper-realistic emails, deepfake voice (vishing), and video impersonations to deceive employees.
Ransomware & Extortion: While encryption remains common, attackers have pivoted toward "leakware"—stealing data and threatening its public release without necessarily encrypting systems.
Supply Chain Attacks: These have nearly doubled in prevalence in 2025, now involved in approximately 30% of breaches. Attackers target a single vendor to gain access to hundreds of client organizations simultaneously, as seen in the 2025 Salesforce-related OAuth token breach.
Vulnerability Exploitation: This vector jumped to 20% of initial access paths in 2025, with an 8x increase in exploits targeting VPN and edge devices.
AI-Specific Incidents:
LLMJacking: Exploiting stolen credentials to use corporate large language model (LLM) services for illicit activities.
Shadow AI: Unauthorized use of AI tools by employees, which added an average of $670,000 to breach costs in 2025.
Prompt Injection: Tricking an AI into revealing sensitive data or executing unauthorized commands.
Denial of Service (DoS/DDoS): These attacks surged 46% in frequency by 2025. Modern DDoS incidents often use "short bursts" under a minute to test defenses or disrupt APIs.
1.3 The importance of cyber security