Introduction and Basic Terminology - Introductory Cyber Security
Students

Academic Programs

AI-powered learning for grades 8-12, aligned with major curricula

Professional

Professional Courses

Industry-relevant training in Business, Technology, and Design

Games

Interactive Games

Fun games to boost memory, math, typing, and English skills

Introduction and Basic Terminology

Introduction and Basic Terminology

Cyber security encompasses the protection of digital assets and information systems against unauthorized access and attacks. The foundational principles are framed within the CIA Triad—Confidentiality, Integrity, and Availability—each supported by various mechanisms. A comprehensive understanding of cyber threats helps in safeguarding against potential risks, while recognizing the importance of cyber-attack surfaces reveals vulnerabilities that need to be managed. Recent significant incidents highlight the critical need for robust security measures and proactive incident response plans.

19 sections

Sections

Navigate through the learning materials and practice exercises.

  1. 1
    Introduction And Basic Terminology

    This section provides an overview of cybersecurity and its foundational...

  2. 1.1
    Cyber Security: Defining The Digital Domain's Defense

    Cyber security entails protecting digital systems from unauthorized access,...

  3. 1.1.1
    Confidentiality

    Confidentiality is a key aspect of cybersecurity that ensures sensitive...

  4. 1.1.2

    Integrity in cybersecurity ensures data accuracy and trustworthiness...

  5. 1.1.3
    Availability

    This section explores the concept of availability in cybersecurity, ensuring...

  6. 2
    Basic Cyber Threats To Cia

    This section covers various cyber threats aimed at compromising the...

  7. 2.1
    Threats Primarily Targeting Confidentiality

    This section outlines different cyber threats that primarily target the...

  8. 2.2
    Threats Primarily Targeting Integrity

    This section explores various cyber threats that primarily aim to compromise...

  9. 2.3
    Threats Primarily Targeting Availability

    This section addresses various cyber threats that primarily affect the...

  10. 3
    Cyber-Attack Surfaces

    The cyber-attack surface encompasses all possible vulnerabilities in an...

  11. 3.1
    Network Attack Surface

    The network attack surface comprises all potential entry points for...

  12. 3.2
    Software/application Attack Surface

    The software/application attack surface refers to all potential...

  13. 3.3
    Human Attack Surface (Social Engineering)

    The Human Attack Surface refers to vulnerabilities arising from human...

  14. 3.4
    Physical Attack Surface

    The physical attack surface represents the tangible risks associated with...

  15. 3.5
    Supply Chain Attack Surface

    This section discusses the vulnerabilities in the supply chain that can be...

  16. 4
    Recent Cyber Security Incidents And Their High-Level Analysis

    This section discusses significant recent cyber security incidents,...

  17. 4.1
    Example 1: Colonial Pipeline Ransomware Attack (May 2021)

    This module introduces **Cyber Security**, defining it as the practice of...

  18. 4.2
    Example 2: Equifax Data Breach (March-July 2017)

    The Equifax data breach in 2017 was one of the largest in history, exposing...

  19. 4.3
    Example 3: Solarwinds Supply Chain Attack (Late 2020)

    This section details the SolarWinds Supply Chain Attack, focusing on its...

What we have learnt

  • Cyber security involves protecting digital assets and information from unauthorized access and attacks.
  • The CIA Triad—Confidentiality, Integrity, and Availability—forms the foundational principles of cyber security.
  • Recognizing and managing cyber-attack surfaces is essential to protect organizations from potential vulnerabilities.

Key Concepts

-- Cyber Security
The practice of protecting digital assets, information systems, networks, devices, and data from unauthorized access, use, or malicious attacks.
-- CIA Triad
A model consisting of three principles: Confidentiality, Integrity, and Availability, used to guide security policies and strategies.
-- Confidentiality
Ensuring that information is accessed only by authorized entities to prevent unauthorized disclosure.
-- Integrity
Guaranteeing the accuracy and trustworthiness of information and systems throughout their lifecycle.
-- Availability
Ensuring that authorized users have reliable access to information and resources when needed.
-- CyberAttack Surface
The total sum of points in a system or network where an unauthorized user can attempt to enter data or extract data.
-- Cyber Threats
Hostile actions or events that exploit vulnerabilities to compromise assets, impacting the CIA Triad.

Additional Learning Materials

Supplementary resources to enhance your learning experience.