Chapter 1 -Material (1)
Chapter 1 -Material (1)
Cybersecurity
Diploma
Edited By: Omar Zayed
Introduction to
Cybersecurity
Edited By: Omar Zayed
• Explain the characteristics and motives of cyber attackers and the legal and ethical issues for cybersecurity professionals.
• Describe the characteristics and motives of an attacker.
1.4 Cyberwarfare
Cybersecurity is the ongoing effort to protect these networked systems and all of the data from
unauthorized use or harm. On a personal level, you need to safeguard your identity, your data, and
your computing devices.
Network
Infrastructure
Network
Security
Infrastructure
Cybersecurity
SIEM
14
Financial
Data
Data on
your Education
Computing Data
Devices
Your Data
Medical Your
Data Identity
Employment
Information
Online
When you share your pictures online with your friends, do you know who may have a copy of
the pictures? Copies of the pictures are on your own devices. Your friends may have copies of
those pictures downloaded onto their devices. If the pictures are shared publicly, strangers
may have copies of them, too. They could download those pictures or take screenshots of
those pictures. Because the pictures were posted online, they are also saved on servers
located in different parts of the world. Now the pictures are no longer only found on your
computing devices.
21
Confidentiality
CIA
Triad
Integrity Availability
Confidentiality
CIA
Triad
Integrity Availability
Confidentiality
CIA
Triad
Integrity Availability
Confidentiality
CIA
Triad
Integrity Availability
In this lab, you will generate a hash for a file and use the hash value to
compare the integrity of a file.
In this lab, you will generate a hash for a file and use the hash value to
compare the integrity of a file.
38
Hackers
White hats – break into Gray hats – compromise Black hats - take advantage
system with permission to systems without permission of any vulnerability for
discover weaknesses so illegal personal, financial or
that the security of these political gain
systems can be improved
41
43
Script
gather intelligence or commit sabotage on specific Kiddies
goals on behalf of their government
Hacktivists
make political statements, or create fear, by causing
physical or psychological damage to victims
Terrorists