CYBER SECURITY

What is Cyber Security?

"Imagine you're a superhero, and your mission is to protect a city (your computer and data) from villains (hackers and cyber threats). Cybersecurity is your superpower!"

Why is Cybersecurity Important?

"Imagine someone breaks into a bank and steals all the money. Now think of hackers as digital thieves who steal data instead of money!"​

How Does Cybersecurity Work

"Think of cybersecurity like a spy movie—agents (security tools) are always watching and protecting against enemy spies (hackers)!"

Common Terms in  Cyber Security

Vulnerability

 A flaw or weakness in a system that attacker can exploit.

 Example: If Outdated software(Software that is not updated can have known bugs that attackers can use) are used, then your application/software is vulnerable

Risk

 The potential damage that could happen if a vulnerability is exploited.

 Example: If you don’t update your phone’s security, there’s a risk of getting hacked.

 

Threat 

 A possible danger that could exploit a vulnerability.

 Example: An attacker attempting to steal data using malware is a threat.


Exploit

 When hackers take advantage of a vulnerability to break into a system.

 Example: If your Wi-Fi password is too weak, attackers can exploit it to steal your internet.

 

Malware

 Malicious software designed to harm your system.

 Types of Malware:

- Virus 

- Worm 

- Ransomware 

 Example: Clicking on fake download links can install malware on your computer.

Phishing

 A scam where attackers send fake emails to steal personal info.

 Example: If you get an email saying "Your bank account is locked! Click here to fix it", it's phishing!

 

Firewall

•A protective barrier that blocks unauthorized access to a network.

Encryption

•The process of converting data into a secret code to protect it.

Social Engineering

 Tricking people into revealing sensitive information.

Zero-Day Attack

 An attack that happens before a vulnerability is fixed.

 

Ethical Hacker

 A cybersecurity expert who hacks legally to find security flaws and fix them.

 Example: Ethical hackers help companies find vulnerabilities before criminals do!

 

CIA Triad

 Confidentiality (Keeping Secrets Safe)

 Integrity (No Cheating, Just the Truth

• Availability (Always Accessible When Needed)

 

deck

By Allen James

deck

  • 6