Lecture 1
Lecture 1
Security
Cybersecurity aims to protect computer systems and networks from unauthorized
access, theft, and damage to hardware, software, or electronic data. It's a critical issue
that affects individuals, businesses, and governments.
An attempt to trick users into giving sensitive Malicious software designed to harm or disrupt
information via email or messages. computer systems or steal data.
Exploits vulnerabilities in web applications to A type of malware that encrypts data, rendering it
gain unauthorized access to sensitive data. inaccessible, and demands payment in exchange
for decryption.
Impact of Cyber Attacks
1 2 3
Use complex and unique passwords Install reputable antivirus software Keep software and operating
for each account and utilize multi- on all devices and keep security systems up to date, including
factor authentication. software up to date. security patches and updates.
Recent High-Profile Cyber Attacks
• Capital One suffered a data breach in July 2019, exposing the personal information of more
than 100 million customers and applicants.
• Capital One Financial (NYSE: COF) falls 5.5% after disclosing after Monday's close a data breach
perpetrated by a former employee of Amazon Web Services, where the bank had stored its
customer data.
• In 2017, Equifax, one of the largest credit reporting agencies in the US, suffered a major data
breach that compromised the personal information of 147 million consumers.
• Private records of 147.9 million Americans along with 15.2 million British citizens and about
19,000 Canadian citizens were compromised in the breach, making it one of the largest
cybercrimes related to identity theft.
• The United States government indicted members of China's People's Liberation Army for
hacking into Equifax, though the Chinese Communist Party denied these claims.
• Information accessed in the breach included first and last names, Social Security numbers,
birth dates, addresses, and, in some instances, driver's license numbers for an estimated 143
million Americans, based on Equifax’s analysis.
• Security experts expected that the lucrative private data from the breach would be turned
around and sold on black markets and the dark web, though as of May 2021, there has been no
sign of any sale of this data.
Best Practices for Cybersecurity and Risk
Management
Effective cybersecurity and risk management strategies can help organizations prevent and mitigate the
impact of cyber attacks. Best practices include:
A firewall is a network security system that monitors A Virtual Private Network is a secure and encrypted
and regulates incoming and outgoing network traffic connection that enables users to access the internet
based on defined security rules. securely, despite using public networks.
Computers, routers, switches, Network operating systems, Fiber optic, coaxial, twisted
hubs, and servers are all drivers, and applications pair, and wireless connections
essential components of a enable devices to provide the physical
network. communicate with one infrastructure for networks.
another.
The Internet and the World Wide Web
1983: TCP/IP Today
The creation of the Transmission The internet and the World Wide Web
Control Protocol and Internet Protocol are integral to our daily lives,
established the foundation of the connecting us to people and
modern internet. information around the world.
1 2 3 4
The first precursor to the internet was Tim Berners-Lee invented the World
a network created by the US Wide Web, which revolutionized the
Department of Defense. internet by allowing multimedia
content to be distributed and accessed
through browsers.
Types of Networks
Local Area Network (LAN) Wide Area Network (WAN) Wireless Local Area
Network (WLAN)
A network confined to a small A network that covers a large
geographic area, such as a home geographic area, such as a city or A LAN that uses wireless
or office. even multiple countries. technology to connect devices.
Internet Protocols and
Standards
1 TCP/IP 2 HTTP
3 HTML
1 5G Networks