CYBER SECURITY CLASS ON 16TH OF OCTOBER, 2025. Cyber security is the practice of keeping information and data safe from hackers and other online threats.
These are the reasons why cyber security being studied: 1. To safeguard one's data from unauthorized access. 2. It teaches one to protect one's data from cyber criminals. 3. To create awareness on the need to be security conscious. 4. To find weaknesses and to help organizations strengthen their defences ethically. 5. In the medical field to protect against unauthorized genetic data theft.
Types of data locations. 1. On-premises storage:This involves the physical process of storing data with external storage devices such as flash drive, hard drive. 2. Cloud storage: Involves data stored on servers involving third parties. 3. Hybrid storage: This combines both the On-premises and the cloud storage, which creates a safer means of storing data. 4. Mobile and remote devices: These are devices like phones and laptops that have one's personal data.
Cyber Crimes These are criminal and illegal acts done through technology such as hacking, theft, or unauthorized access to data.
Cyber criminals indulge in such act due to the following reasons: 1. For them to gain financially. 2. For a payback or revenge moment probably because they got reported in the past. 3. To steal important data. 4. They derive satisfaction in the practice. 5. To override their competitors. 6. In the case of political parties, for them to gain an edge over a rival party in order to win.
In a case where one's personal data is wanted, there are bodies that can have access to it that can track it, they include: 1. Internet Service Providers such as our telecommunication networks. 2. Search engines or social media platforms. 3. Advertisers which can come from subscription to some social media platforms.
Cyber theft comprises of the following: 1. Identity theft, which include a. Personal data. b. Organization data such as traditional data like names and emails, intellectual transactional, financial data and the internet of things.
John McCumber. This man created the security models with 3 dimensions which include: 1. The fundamental principles for protecting information system which are a. Confidentiality which are rules that safeguards one's sensitive information from getting disclosed. b. Integrity which uses hashtag to protect system information and processes. c. Availability where authorized users only have access to the information provided them.
2. Information protection in its possible states, and they include: a. Processing or data in use, where information is actively being processed. b. Data at rest or storage, where information is stored on a storage device such as the USB, flash drive. c. Transmission or data in transit, where data is being transferred from one point to another over the internet.
3. Security measures which include: a. Awareness training and education where users are educated on security risks and threats. b. Technology which includes both software and hardware-based means to protect data like the Firefox. c. Policies and procedures where the admin dictates how organizational information is being implemented.
Data Security Breach This is a situation where sensitive information is viewed, stolen or copied by an unauthorized person.
Consequences of data breaches. 1. Reputation damages. 2. Vandalism. 3. Theft. 4. Loss of revenue.
Cyber Attackers They are individuals or groups that use the internet to carry out illegal activities. These cyber attackers are of different types which include: 1. Amateurs:those that may have the knowledge of what to do but being clueless of how to do it, or that do not have the right tools. 2. Hackers: Authorized or unauthorized professionals that gain access to data. 3. Organized hackers: Terrorists that are well sponsored by states who can possibly be for hire to government bodies to breach and steal data.
Threats A threat is anything that has the potential to cause harm to a computer system. These threats can either be internal or external. 1. Internal threat: This comes from within the organization, people that have access to the the system, which can either be intentional or unintentional. 2. External threat: This comes from outside the organization,which are attackers who try to gain unauthorized access to data. These ones always have malicious intents and can be paid by a rival company or group.