Lecture 1 “Introduсtion to cybersecurity”
1. Introduction to Cybersecurity
Instructor Information:
Senior-Lecturer: Assemgul Sadvakassova
Email: s.assemgul@gmail.com
2. Chapter Objectives
Overview of the Cybersecurity World
Distinction Between Cyber Criminals and Cybersecurity Specialists
Identification of Common Threats
Examination of the Spread of Cybersecurity Threats
Strategies for Creating More Cybersecurity Experts
Summary of Key Concepts
3. The Cybersecurity World
3.1 Importance of Data
Data Power:
Large businesses thrive on collecting and utilizing data.
Responsibility to protect data against misuse and unauthorized access.
Opportunities for Cybersecurity Specialists:
Growth in data leads to increased need for cybersecurity protection.
3.2 Key Cybersecurity Domains
Businesses acknowledge the power of big data analytics.
Examples of companies involved include Google, LinkedIn, and Amazon.
Risks associated with data collection highlight the necessity for cybersecurity measures.
3.3 Innovative Technologies
New technologies like Geospatial Information Systems (GIS) and the Internet of Everything (IoE) rely on vast data collections to improve efficiency and safety.
4. Cybersecurity Criminals vs Cybersecurity Specialists
4.1 Cybersecurity Criminals
Types of Hackers:
White Hat: Ethical hackers improving system security.
Gray Hat: Find vulnerabilities but may act on personal agendas.
Black Hat: Malicious hackers seeking personal gain.
Script Kiddies: Inexperienced individuals using existing tools for basic pranks.
Vulnerability Brokers: Report exploits for rewards.
Hacktivists: Political motives behind cyber actions.
State-Sponsored Hackers: Targeting government secrets and corporate espionage.
4.2 Defending Against Cybercriminals
Efforts by governments and organizations to counteract cyber threats.
Vulnerability Database: Examples include the CVE database for known vulnerabilities.
Early Warning Systems: The Honeynet Project provides real-time attack visualizations.
Sharing Cyber Intelligence: Programs like Infragard facilitate collaboration between sectors.
5. Common Threats to Cybersecurity
5.1 Understanding Cyber Threats
A threat is a possibility of harm, whereas vulnerability is a weakness that can be exploited.
Specific industries are particularly susceptible based on the data they handle.
5.2 Key Vulnerabilities
Network Services: DNS and HTTP are commonly targeted by hackers.
Data capturing methods such as packet sniffing and forgery provide cybercriminals opportunities to exploit networks.
6. Spreading Cybersecurity Threats
6.1 Types of Security Threats
Internal Threats: Employees with access pose significant risks.
External Threats: Exploit vulnerabilities using social engineering.
6.2 Mobile Device Vulnerabilities
With the rise of mobile devices and BYOD policies, security management has become complex.
6.3 Internet-of-Things (IoT)
IoT connectivity increases data management challenges and security needs.
6.4 Big Data Challenges
Volume, velocity, and variety of data necessitate improved cybersecurity measures and regulations.
7. Creating More Cybersecurity Experts
7.1 Framework for Cybersecurity Workforce
NIST Framework: Identifies necessary skills and responsibilities in cybersecurity.
Seven major categories of cybersecurity work include:
Operate and Maintain
Protect and Defend
Investigate
Analyze
Collect and Operate
Securely Provision
Leadership and Management
7.2 Student Engagement
Importance of competitions and various organizational opportunities to enhance skills.
8. Industry Certifications
Value of certifications in proving cybersecurity competence:
CompTIA Security+
EC-Council Certified Ethical Hacker (CEH)
SANS GIAC Security Essentials (GSEC)
ISC² Certified Information Systems Security Professional (CISSP)
ISACA Certified Information Security Manager (CISM)
Company-sponsored certifications to test knowledge of specific products (e.g., Cisco and Microsoft).
9. How to Become a Cybersecurity Specialist
Response and Analysis: Ability to quickly respond to threats and understand cybercriminal thought processes.
Education and Certifications: Pursuing a solid foundation in IT and ongoing education.
Professional Engagement: Importance of networking and participating in relevant organizations and events.
10. Chapter Summary
Overview of the structure of the cybersecurity world and the motivations of cyber criminals.
Discussion on the spread of threats due to advancements in technology and data utilization.
Emphasis on the critical need for cybersecurity professionals and pathways to become experts in the field.