CYBER SECURITY
What is Cyber Security?
"Imagine you're a superhero, and your mission is to protect a city (your computer and data) from villains (hackers and cyber threats). Cybersecurity is your superpower!"
Why is Cybersecurity Important?
"Imagine someone breaks into a bank and steals all the money. Now think of hackers as digital thieves who steal data instead of money!"
How Does Cybersecurity Work
"Think of cybersecurity like a spy movie—agents (security tools) are always watching and protecting against enemy spies (hackers)!"
Common Terms in Cyber Security
Vulnerability
• A flaw or weakness in a system that attacker can exploit.
• Example: If Outdated software(Software that is not updated can have known bugs that attackers can use) are used, then your application/software is vulnerable
Risk
• The potential damage that could happen if a vulnerability is exploited.
• Example: If you don’t update your phone’s security, there’s a risk of getting hacked.
Threat
• A possible danger that could exploit a vulnerability.
• Example: An attacker attempting to steal data using malware is a threat.
Exploit
• When hackers take advantage of a vulnerability to break into a system.
• Example: If your Wi-Fi password is too weak, attackers can exploit it to steal your internet.
Malware
• Malicious software designed to harm your system.
• Types of Malware:
- Virus
- Worm
- Ransomware
• Example: Clicking on fake download links can install malware on your computer.
Phishing
• A scam where attackers send fake emails to steal personal info.
• Example: If you get an email saying "Your bank account is locked! Click here to fix it", it's phishing!
Firewall
•A protective barrier that blocks unauthorized access to a network.
Encryption
•The process of converting data into a secret code to protect it.
Social Engineering
• Tricking people into revealing sensitive information.
Zero-Day Attack
• An attack that happens before a vulnerability is fixed.
Ethical Hacker
• A cybersecurity expert who hacks legally to find security flaws and fix them.
• Example: Ethical hackers help companies find vulnerabilities before criminals do!
CIA Triad
• Confidentiality (Keeping Secrets Safe)
• Integrity (No Cheating, Just the Truth)
• Availability (Always Accessible When Needed)
deck
By Allen James
deck
- 6