Lecture 1 “Introduсtion to cybersecurity”

1. Introduction to Cybersecurity

  • Instructor Information:

    • Senior-Lecturer: Assemgul Sadvakassova

    • Email: s.assemgul@gmail.com

2. Chapter Objectives

  • Overview of the Cybersecurity World

  • Distinction Between Cyber Criminals and Cybersecurity Specialists

  • Identification of Common Threats

  • Examination of the Spread of Cybersecurity Threats

  • Strategies for Creating More Cybersecurity Experts

  • Summary of Key Concepts

3. The Cybersecurity World

3.1 Importance of Data

  • Data Power:

    • Large businesses thrive on collecting and utilizing data.

    • Responsibility to protect data against misuse and unauthorized access.

  • Opportunities for Cybersecurity Specialists:

    • Growth in data leads to increased need for cybersecurity protection.

3.2 Key Cybersecurity Domains

  • Businesses acknowledge the power of big data analytics.

  • Examples of companies involved include Google, LinkedIn, and Amazon.

  • Risks associated with data collection highlight the necessity for cybersecurity measures.

3.3 Innovative Technologies

  • New technologies like Geospatial Information Systems (GIS) and the Internet of Everything (IoE) rely on vast data collections to improve efficiency and safety.

4. Cybersecurity Criminals vs Cybersecurity Specialists

4.1 Cybersecurity Criminals

  • Types of Hackers:

    • White Hat: Ethical hackers improving system security.

    • Gray Hat: Find vulnerabilities but may act on personal agendas.

    • Black Hat: Malicious hackers seeking personal gain.

    • Script Kiddies: Inexperienced individuals using existing tools for basic pranks.

    • Vulnerability Brokers: Report exploits for rewards.

    • Hacktivists: Political motives behind cyber actions.

    • State-Sponsored Hackers: Targeting government secrets and corporate espionage.

4.2 Defending Against Cybercriminals

  • Efforts by governments and organizations to counteract cyber threats.

  • Vulnerability Database: Examples include the CVE database for known vulnerabilities.

  • Early Warning Systems: The Honeynet Project provides real-time attack visualizations.

  • Sharing Cyber Intelligence: Programs like Infragard facilitate collaboration between sectors.

5. Common Threats to Cybersecurity

5.1 Understanding Cyber Threats

  • A threat is a possibility of harm, whereas vulnerability is a weakness that can be exploited.

  • Specific industries are particularly susceptible based on the data they handle.

5.2 Key Vulnerabilities

  • Network Services: DNS and HTTP are commonly targeted by hackers.

  • Data capturing methods such as packet sniffing and forgery provide cybercriminals opportunities to exploit networks.

6. Spreading Cybersecurity Threats

6.1 Types of Security Threats

  • Internal Threats: Employees with access pose significant risks.

  • External Threats: Exploit vulnerabilities using social engineering.

6.2 Mobile Device Vulnerabilities

  • With the rise of mobile devices and BYOD policies, security management has become complex.

6.3 Internet-of-Things (IoT)

  • IoT connectivity increases data management challenges and security needs.

6.4 Big Data Challenges

  • Volume, velocity, and variety of data necessitate improved cybersecurity measures and regulations.

7. Creating More Cybersecurity Experts

7.1 Framework for Cybersecurity Workforce

  • NIST Framework: Identifies necessary skills and responsibilities in cybersecurity.

  • Seven major categories of cybersecurity work include:

    • Operate and Maintain

    • Protect and Defend

    • Investigate

    • Analyze

    • Collect and Operate

    • Securely Provision

    • Leadership and Management

7.2 Student Engagement

  • Importance of competitions and various organizational opportunities to enhance skills.

8. Industry Certifications

  • Value of certifications in proving cybersecurity competence:

    • CompTIA Security+

    • EC-Council Certified Ethical Hacker (CEH)

    • SANS GIAC Security Essentials (GSEC)

    • ISC² Certified Information Systems Security Professional (CISSP)

    • ISACA Certified Information Security Manager (CISM)

  • Company-sponsored certifications to test knowledge of specific products (e.g., Cisco and Microsoft).

9. How to Become a Cybersecurity Specialist

  • Response and Analysis: Ability to quickly respond to threats and understand cybercriminal thought processes.

  • Education and Certifications: Pursuing a solid foundation in IT and ongoing education.

  • Professional Engagement: Importance of networking and participating in relevant organizations and events.

10. Chapter Summary

  • Overview of the structure of the cybersecurity world and the motivations of cyber criminals.

  • Discussion on the spread of threats due to advancements in technology and data utilization.

  • Emphasis on the critical need for cybersecurity professionals and pathways to become experts in the field.

robot