<aside> đź’ˇ
Cybersecurity is the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, and potential threats in the cyber realm. It encompasses various technologies, processes, and practices designed to safeguard information technology assets, personal information, and organizational infrastructure from cyber threats.
</aside>
https://www.youtube.com/watch?v=inWWhr5tnEA&t=2s
| Topic | Key Concepts | Importance | Strategies |
|---|---|---|---|
| TYPES OF CYBER THREATS | • Cyber attacks | ||
| • vulnerabilities | |||
| • hacking | |||
| • tricking users | To be self-aware of the threats online that can take over your security and personal data. | • Strong passwords | |
| • Check for authentic websites | |||
| • reading laterally | |||
| • install system security | |||
| • Don’t install software not trusted | |||
| • Keeping software updated is crucial to prevent cyber-attacks and protect your systems | |||
| FIVE LAWS OF CYBERSECURITY | • Everything is vulnerable | ||
| • Weaknesses | |||
| • Exploitation | To understand that everything around us has the vulnerability of being wrecked and protecting ourselves out there. | • Thinking like a hacker is the actual way to stop a hacker | |
| • Be skeptical on the internet | |||
| • Don’t trust everything you see | |||
| CRYPTOGRAPHY | • Uses the same key for encryption and decryption | ||
| • Provides privacy and secure measures | To protect your privacy and information from hackers trying to steal your information. | • ACL (access control lists) | |
| what each user has access to file, program on computer | |||
| • two factor authentication |
Cybersecurity consists of exploiting the vulnerabilities of hardware and software through unintentional mistakes made by the people on the internet using software. This is why taking into account the types of threats you have online is crucial to become more self-aware. Some of the cyber threats online are the following…
This is one of the most common harms created to harm a user or computer and can be spread pretty easily. It can be disguised as security updates and can steal, delete files, control programs, or even your computer if you get tricked into a website with viruses.
Most commonly known as Distribute denial of service. This threat consists of overwhelming a website with too many requests from different places (different computers) and attacks with the computer all together at once. This is how a cyber army can look like when trying to hack into a system.
Being tricked with “rusted” emails and credentials that steal your information, or your money is what is called a phishing scam. Similarly to viruses they trick the user to hack them which 90% of the time systems have the opportunity of getting hacked due to a human mistake in the software.
This is another type of threat where hackers use computers to try all digit combinations in a matter of seconds to get a password or key. This is another common threat that has the danger of getting your personal password if it is easy to guess. The harder the password the more combinations a computer would have to make in order to find the right password. This is why creating a strong password is crucial for your data and safety.
A malicious software that steals data which has many forms of being created like viruses, botnets, worms, spyware, and more. This kind of software has the power to damage hardware.
When having physical access of the computer and making a copy of all data with a memory chip.