0% found this document useful (0 votes)
4 views4 pages

cyber security course

The document outlines fundamental cybersecurity concepts, including the principles of confidentiality, integrity, and availability, as well as various types of security measures such as preventive, detective, and corrective security. It details common cybersecurity terminology, malware classifications, server-side web application attacks, and the importance of planning and policy in cybersecurity. Additionally, it covers network protocols, transport layer security, wireless security, cloud security, and IoT security, emphasizing the need for protective measures across different technology domains.

Uploaded by

alihassan940210
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views4 pages

cyber security course

The document outlines fundamental cybersecurity concepts, including the principles of confidentiality, integrity, and availability, as well as various types of security measures such as preventive, detective, and corrective security. It details common cybersecurity terminology, malware classifications, server-side web application attacks, and the importance of planning and policy in cybersecurity. Additionally, it covers network protocols, transport layer security, wireless security, cloud security, and IoT security, emphasizing the need for protective measures across different technology domains.

Uploaded by

alihassan940210
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Basic Security Concepts

 Explanation: Cybersecurity involves protecting systems, networks, and data from unauthorized
access, damage, or theft. The core principles are confidentiality (keeping data secret), integrity
(ensuring data is accurate), and availability (ensuring systems are available when needed).

 Types:

o Preventive Security: Prevents attacks (e.g., firewalls, encryption).

o Detective Security: Detects intrusions (e.g., intrusion detection systems).

o Corrective Security: Corrects problems after a breach (e.g., backups, patching).

2. Information Security Terminology

 Explanation: Common terms used in cybersecurity:

o Authentication: Verifying the identity of a user.

o Authorization: Granting access based on identity.

o Encryption: Scrambling data to prevent unauthorized access.

o Malware: Malicious software designed to damage or steal data.

3. Malware Classifications and Types

 Explanation: Malware is any software designed to harm or exploit a device.

 Types:

o Viruses: Replicate and spread through systems, infecting files.

o Worms: Self-replicating and spread without user interaction.

o Trojan Horses: Appear as legitimate software but carry out harmful activities.

o Ransomware: Locks or encrypts data, demanding payment for release.

o Spyware: Collects private information without consent.

o Adware: Displays unwanted ads, often tracking user activity.

4. Server-Side Web Application Attacks

 Explanation: Attacks that target web applications on a server.

 Types:

o Cross-Site Scripting (XSS): Injecting malicious scripts into webpages to be executed by


users’ browsers.

o SQL Injection: Inserting malicious SQL code to manipulate a database.


o Cross-Site Request Forgery (CSRF): Tricks a user into making unwanted requests on a
website where they are authenticated.

5. Cross-Site Scripting (XSS)

 Explanation: An attack that injects malicious scripts into trusted websites. The attacker’s script
runs in the victim’s browser, often leading to data theft.

 Types:

o Stored XSS: Malicious code is stored on the web server and executed when other users
visit the page.

o Reflected XSS: The malicious script is reflected off the web server and executed
immediately when the user clicks on a link.

6. SQL Injection

 Explanation: An attack where malicious SQL statements are inserted into an entry field (e.g., a
login form) to gain unauthorized access to a database or manipulate it.

 Example: Inserting OR 1=1 into a login form can bypass authentication by manipulating the SQL
query.

7. Cross-Site Request Forgery (CSRF)

 Explanation: An attack that forces a user to unknowingly execute unwanted actions on a web
application where they are authenticated.

 Example: If you’re logged into a bank website, an attacker can trick you into transferring money
to their account without your knowledge.

8. Planning and Policy in Cybersecurity

 Explanation: Creating and enforcing strategies to protect systems and data. Policies help
organizations define security measures, response strategies, and acceptable use of resources.

 Types:

o Security Policies: Documented rules for user behavior and access control.

o Incident Response Plans: Step-by-step actions to take when a security breach occurs.

o Disaster Recovery Plans: Procedures to restore systems after a catastrophic event.

9. Network Protocols and Service Models

 Explanation: Network protocols are rules that define how data is transmitted between devices.
Service models refer to how services like networking and storage are provided.

 Types of Network Protocols:

o HTTP/HTTPS: Protocols for web communication.


o TCP/IP: A suite of protocols used for internet and local networks.

o DNS: Converts domain names to IP addresses.

 Types of Service Models:

o IaaS (Infrastructure as a Service): Provides virtualized computing resources (e.g., AWS,


Azure).

o PaaS (Platform as a Service): Provides platform tools for developers to build applications
(e.g., Google App Engine).

o SaaS (Software as a Service): Provides software applications over the internet (e.g.,
Google Workspace, Dropbox).

10. Transport Layer Security (TLS)

 Explanation: TLS is a protocol that ensures secure communication over the internet by
encrypting data during transmission.

 Types:

o SSL (Secure Sockets Layer): The predecessor of TLS, now largely obsolete due to security
vulnerabilities.

o TLS 1.2 and TLS 1.3: The latest and most secure versions of the protocol.

11. Network Layer Security

 Explanation: Network layer security involves protecting data during transmission between
devices on a network.

 Types:

o Firewalls: Prevent unauthorized access to networks by filtering traffic.

o VPN (Virtual Private Network): Secures communication over the internet by encrypting
data and hiding the user's IP address.

o Intrusion Detection Systems (IDS): Monitor network traffic for suspicious activity.

12. Wireless Security

 Explanation: Protecting wireless networks (like Wi-Fi) from unauthorized access and attacks.

 Types:

o WPA2 (Wi-Fi Protected Access 2): The standard for securing Wi-Fi networks.

o WPA3: The latest Wi-Fi security standard with improved protection.

o WEP (Wired Equivalent Privacy): Older, less secure wireless encryption protocol.

13. Cloud Security


 Explanation: Cloud security protects data and services hosted on the cloud, ensuring privacy,
compliance, and resilience against attacks.

 Types:

o Data Encryption: Encrypting data stored in the cloud to prevent unauthorized access.

o Identity and Access Management (IAM): Ensures only authorized users can access cloud
services.

o Multi-Factor Authentication (MFA): An added layer of security requiring more than just
a password for access.

14. IoT Security

 Explanation: Protecting devices that connect to the internet, such as smart home appliances,
wearables, and medical devices.

 Types:

o Device Authentication: Ensures that only authorized devices can connect to a network.

o Encryption: Encrypts data exchanged between IoT devices to prevent interception.

o Secure Firmware Updates: Ensures that device software is updated with secure patches.

You might also like