Introduction to Cyber Security Part 1-2
  • Introduction to Cyber Security Part 1-2

About the Product

Introduction to Cyber Security Part 1-2

Summary:

This document introduces the cyber security concept, emphasizing its increasing importance due to growing threats. Cybersecurity protects networked systems and all associated data from unauthorized use or harm. It is essential on an individual, organizational, and national level to safeguard identities, data, reputations, and national security.

Your online identity should be carefully managed, revealing minimal personal information to mitigate risks. Your data, including medical, educational, employment, and financial records, is also a prime target for cybercriminals. Even data from IoT devices, such as fitness bands, become part of your medical records, showing the widespread reach of personal data.

The document explains that your data is stored in multiple locations, both physically and digitally. Data shared online, whether text or images, can be downloaded and saved by anyone accessing it, making it available on servers worldwide.

The increasing value of personal data online has led to growing threats from hackers, who seek access to online accounts and personal credentials to steal money or identities. This can lead to significant personal harm and financial loss.

For organizations, traditional data includes corporate data, intellectual property, and financial data. The emergence of the Internet of Things (IoT) and the resulting surge in data generation have created a new field of interest: Big Data. This data’s confidentiality, integrity, and availability (CIA triad) are vital to an organization’s survival.

Hackers seeking to exploit system vulnerabilities for personal or financial gain can be categorized into several types. Amateurs or “Script Kiddies” use pre-existing attack tools, while professional hackers break into systems to identify weaknesses.

Excerpt:

Introduction to Cyber Security Part 1-2

CHAPTER 1 (PART 1 – 2): THE NEED FOR CYBERSECURITY
This Chapter discusses the following:

  • What is Cyber Security?
  • Why the demand for cybersecurity professionals is growing?
  • Explains what your online identity and data are, where it is, and why it is of interest to cyber criminals
  • What organizational data is, and why it must be protected
  • Discusses who the cyber attackers are and what they want
  • Content that briefly explains cyber warfare and why nations and governments need cybersecurity professionals to help protect their citizens and infrastructure