Instructor Information:
Senior-Lecturer: Assemgul Sadvakassova
Email: s.assemgul@gmail.com
Overview of the Cybersecurity World
Distinction Between Cyber Criminals and Cybersecurity Specialists
Identification of Common Threats
Examination of the Spread of Cybersecurity Threats
Strategies for Creating More Cybersecurity Experts
Summary of Key Concepts
Data Power:
Large businesses thrive on collecting and utilizing data.
Responsibility to protect data against misuse and unauthorized access.
Opportunities for Cybersecurity Specialists:
Growth in data leads to increased need for cybersecurity protection.
Businesses acknowledge the power of big data analytics.
Examples of companies involved include Google, LinkedIn, and Amazon.
Risks associated with data collection highlight the necessity for cybersecurity measures.
New technologies like Geospatial Information Systems (GIS) and the Internet of Everything (IoE) rely on vast data collections to improve efficiency and safety.
Types of Hackers:
White Hat: Ethical hackers improving system security.
Gray Hat: Find vulnerabilities but may act on personal agendas.
Black Hat: Malicious hackers seeking personal gain.
Script Kiddies: Inexperienced individuals using existing tools for basic pranks.
Vulnerability Brokers: Report exploits for rewards.
Hacktivists: Political motives behind cyber actions.
State-Sponsored Hackers: Targeting government secrets and corporate espionage.
Efforts by governments and organizations to counteract cyber threats.
Vulnerability Database: Examples include the CVE database for known vulnerabilities.
Early Warning Systems: The Honeynet Project provides real-time attack visualizations.
Sharing Cyber Intelligence: Programs like Infragard facilitate collaboration between sectors.
A threat is a possibility of harm, whereas vulnerability is a weakness that can be exploited.
Specific industries are particularly susceptible based on the data they handle.
Network Services: DNS and HTTP are commonly targeted by hackers.
Data capturing methods such as packet sniffing and forgery provide cybercriminals opportunities to exploit networks.
Internal Threats: Employees with access pose significant risks.
External Threats: Exploit vulnerabilities using social engineering.
With the rise of mobile devices and BYOD policies, security management has become complex.
IoT connectivity increases data management challenges and security needs.
Volume, velocity, and variety of data necessitate improved cybersecurity measures and regulations.
NIST Framework: Identifies necessary skills and responsibilities in cybersecurity.
Seven major categories of cybersecurity work include:
Operate and Maintain
Protect and Defend
Investigate
Analyze
Collect and Operate
Securely Provision
Leadership and Management
Importance of competitions and various organizational opportunities to enhance skills.
Value of certifications in proving cybersecurity competence:
CompTIA Security+
EC-Council Certified Ethical Hacker (CEH)
SANS GIAC Security Essentials (GSEC)
ISC² Certified Information Systems Security Professional (CISSP)
ISACA Certified Information Security Manager (CISM)
Company-sponsored certifications to test knowledge of specific products (e.g., Cisco and Microsoft).
Response and Analysis: Ability to quickly respond to threats and understand cybercriminal thought processes.
Education and Certifications: Pursuing a solid foundation in IT and ongoing education.
Professional Engagement: Importance of networking and participating in relevant organizations and events.
Overview of the structure of the cybersecurity world and the motivations of cyber criminals.
Discussion on the spread of threats due to advancements in technology and data utilization.
Emphasis on the critical need for cybersecurity professionals and pathways to become experts in the field.