CourseWork2 CST3510 CyberSecurity Notes
CourseWork2 CST3510 CyberSecurity Notes
## 1. **Introduction to Cybersecurity**
Cybersecurity is the practice of protecting systems, networks, and data from
digital threats, attacks, or unauthorized access. With the increasing reliance on
digital platforms, cybersecurity is critical to safeguard sensitive information,
ensure privacy, and maintain system integrity.
---
### a. **Confidentiality**
Ensures that data is only accessible to authorized users or systems and protected
from unauthorized access.
- **Examples:** Encryption, multi-factor authentication (MFA), secure file
permissions.
### b. **Integrity**
Ensures that data is accurate, consistent, and unaltered during transmission or
storage.
- **Examples:** Hashing, checksums, digital signatures.
### c. **Availability**
Ensures that systems, networks, and data are accessible and functional when needed.
- **Examples:** Redundancy, load balancing, backup systems, disaster recovery.
---
### a. **Malware**
Malicious software designed to damage or gain unauthorized access to computer
systems.
- **Examples:**
- **Viruses:** Infect files and spread to other systems.
- **Worms:** Self-replicating programs that spread without user interaction.
- **Trojans:** Disguised as legitimate software but perform malicious actions.
- **Ransomware:** Encrypts data and demands payment for decryption.
### b. **Phishing**
A form of social engineering where attackers impersonate legitimate entities to
steal sensitive information (e.g., passwords, financial details).
- **Phishing Emails:** Fraudulent messages attempting to trick the recipient into
revealing personal information.
---
### a. **Encryption**
Encrypting sensitive data ensures that even if intercepted, the data cannot be read
without the correct decryption key.
- **Examples:** SSL/TLS encryption for web traffic, full-disk encryption (FDE) for
storage.
### c. **Firewalls**
A network security device that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
- **Types:**
- **Network Firewalls:** Protect entire networks from external threats.
- **Host-based Firewalls:** Protect individual devices.
---
---
---
---
---
## 9. **Conclusion**
Cybersecurity is an ongoing effort that requires awareness, continuous learning,
and proactive management. As cyber threats evolve, so too must the strategies and
tools used to defend systems and data. Organizations must maintain a holistic
approach to cybersecurity, ensuring they protect all aspects of their digital
infrastructure.