Introduction to Cybersecurity Essentials
It has 4 sub-modules…
It has 4 sub-modules…
An information asset is information or data that is of value.
Information assets can exist physically (paper, disks, other media) or they can exist electronically, in databases and files.
IP refers to creations of the mind and generally are not tangible. It’s protected by copyright, trademark, and patent law.
Industrial designs
Trade secrets
Research discoveries
Even some employee knowledge is considered intellectual property.
Companies use a legally binding document called an NDA to prevent the sharing of sensitive information.
Digital products are non-tangible assets a company owns.
It includes:
Software
Online music
E-book or audiobooks
Web elements like WordPress or Shopify themes
A company must protect digital products from piracy and reserse-engineering.
DRM is code added directly to files that helps prevent digital assets from being copied or pirated.
The DMCA makes it illegal to bypass copy protections or to develop technology that helps bypass copy protections.
Properly handling confidentiality means:
Identification factors are pieces of information that only you and an authentication service know.
SSO verifies users for connected accounts or apps, so they only have to log in once.
There are three processes involved in logging in to a network or account.
Authorization is when you have permissions to access a location or do an action.
Access control must be setup before authorization is granted.
Authorization must be set up for your user account before you’re able to log in.
Authentication is the act of confirming the identity of a user.
Digital accounting is used in troubleshooting, security analysis, forensics, and hacking.
Non-repudiation is when you can’t deny being in a specific location. It guarantees a message sent between two parties is genuine.
Hardening is the process of securing a device to minimize vulnerabilities.
Harden devices by:
Disabling unneeded features.
Updating firmware, OS, and software.
Using firewalls, VPN, and anti-malware.
The more layers of security you use, the safer your data and devices will be.
PKI is when a user is validated with a digital certificate by a Certificate Authority (CA).
A cryptographic hash is a short string of numbers and letters created by running a password or file through an algorithm.
Email management is classifying email messages and deciding whether they should be saved or deleted.
Spam is unwanted, unsolicited email. Some spam is harmless, but it can be dangerous when scammers use it for phishing or fraud.
To reduce spam:
Business software automates transactions, mines sales data, manages information, and more.
To protect files, systems, and resources, businesses must limit access.
Cookies are text files with small pieces of data.
Cookie types:
Secure sockets layer (SSL) certificates authenticate a website’s identity and enable an encrypted connection between a web server and a browser.
Because browsers are a favorite target for hackers, keeping them updated is very important.
A browser cache is a storage data that holds downloads of web pages you’ve visited.
Identifying safe websites is more significant than ever.
Safety tips include:
The aim of redirection is to point you towards certain types of advertising or dangerous code.
Redirection is caused by:
Unwanted toolbars or browser extensions
Malware that alerts searches and URLs
Hacked websites servers that redirect visitors
To avoid hijacking and redirection:
Set automatic updates for your browser, OS, and security tools.
Run regular system scans.
Search engines use algorithms to detect harmful sites. Browsers use those results to warn users.
VPN types:
VPN hardware devices are:
IPsec is a suite of network standards and protocols that use cryptography to protect data traveling over the Internet.
IPsec suite core protocols:
IPsec Authentication Header (AH) protocol: - Authenticates senders and IP addresses
Encapsulating Security Payload (ESP) protocol: - Encrypts data - Authenticates data and senders
The IPsec suite has two modes:
The IPsec suite uses: