(Bookflare - Net) - Introduction To Cyber Security Fundamentals
(Bookflare - Net) - Introduction To Cyber Security Fundamentals
U EKPO
MCSA CONSULTING
1
Table of Contents
Acknowledgement ................................................................................................................................. 2
Overview................................................................................................................................................. 3
CHAPTER 1: Introduction ....................................................................................................................... 4
Cyber Security..................................................................................................................................... 4
CHAPTER 2: Information Security Standards & Common Threats...................................................... 12
Common Security Threats ................................................................................................................ 12
CHAPTER 3: Protecting your systems and network ............................................................................ 16
Internet Safety and Social Media .................................................................................................... 17
CHAPTER 4: Artificial Intelligence (AI) and Cyber Security ................................................................. 18
CHAPTER 5: Cyber Essentials and Essential Plus ................................................................................. 19
CHAPTER 6: General Data Protection Regulation (GDPR)................................................................... 20
CHAPTER 7: Education and Certification ............................................................................................. 21
CHAPTER 8: Roles & Responsibilities in Cyber Security ...................................................................... 23
CHAPTER 9: Starting a career in Cyber Security .................................................................................. 29
CHAPTER 10: Summary ........................................................................................................................ 32
Other useful information ..................................................................................................................... 34
References ............................................................................................................................................ 34
Appendix A: Relationships in the field of Cyber Security ................................................................... 35
Appendix B: Starting a career in Cyber security flowchart ................................................................. 36
2
Acknowledgement
Overview
Wherever you go, live or work, news on Cyber Security is prominent to the
public eye. When asking most people about their knowledge of Cyber Security,
a common response relates to the like of ‘hackers’ or companies that have
been in the media as part of a security hacking. In turn, what this can mean, is
that quite a large number of people, will be surprised to know that Cyber
Security covers quite a large field of activities. It covers technical and non-
technical IT activities, legal, forensics, policing, etc. So we could look at Cyber
Security as a field which is made up of all the areas where information security
has been impacted or has something to offer in making information technology
and data secure. There is a simplified diagrammatic representation of the
relationships within the field of Cyber Security in the Appendix of chapter 10.
4
CHAPTER 1: Introduction
Introduction to Cyber Security has been put together for the benefit of those
who are new to the field of Information Technology and are interested to learn
about Cyber Security as part of a potential career change. This information is
to provide the basics about the field of Cyber Security and will also provide
additional materials to help anyone interested, improve their knowledge to an
advanced level.
Cyber Security is the body of technologies, processes and practices designed to
protect networks, computers, programs and data from attack, damage or
unauthorised access. In a computing context, security includes both cyber or
online security and physical security (itgovernance, 2018).
Here are some important overviews;
- International Organisation for Standards (ISO)/ International
Electro-technical Commission (IEC): This is a joint technical
committee. Its purpose is to develop, maintain and promote
standards in the fields of information technology (IT) and Information
and Communications Technology (ICT).
- The web: This is the collection of servers that hold and process web
sites we see. The web is not the internet, but it runs on top of the
internet, which acts like the bridge for the web. HTTP (i.e. HyperText
Transfer Protocol), is the underlying protocol used by the World Wide
Web and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take
in response to various commands)
- Network: You have the physical network and the virtual network.
This is the integration of computer systems and servers via routers,
switches, repeaters, both locally and globally.
- User errors are made by those who lack awareness of Cyber Security or
behave carelessly. For example, sending private or sensitive data over an
unsecure network or without encrypting their data when in transit.
16
Internet users must always think of safety whenever or wherever they are
using the internet. Over the years on social media, we have heard things like
bullying, sexting, stress, suicide, use of abusive language, addiction, etc. To
ensure we continue to enjoy the positive aspects of the internet, we must
practice the things we do well offline, when we are online. For example,
bullying in real life situations is unlawful. Therefore, cyber bullying should be
treated the same. Any inappropriate language or behaviour noticed online
should be reported to the authority in charge of that platform as soon as
possible, and where appropriate it should be reported to the police as well.
There are some social media platforms which do not permit children of certain
age groups to register as members. In light of this, it would not be fitting for an
adult or parent to register as a member and allow their under age children
access to those sites. Combining well-mannered and apt behaviour online, with
the guidance of industry professionals, the internet will always be a window of
opportunities that will serve us well.
18
The key roles in the area of information or Cyber Security are the
following;
The positions above cover specialist areas, which are relevant to the
respective job titles. However, at its core, an IT security consultant is
required to be well versed in cyber-security, risk management,
compliance auditing, testing, customer service, and information
assurance. An IT security consultant is the key point of contact for all
these areas.
The following roles are also important in the field of Cyber Security.
However, some of them may reside in a separate department but will
continue to work closely with security professionals when dealing with
security issues:
26
- System Owners look after one or more systems, each of which may
hold and process data owned by different data owners.
Responsibilities include integrating security considerations into
application and system purchasing decisions and development
projects. The system owner is responsible for ensuring that adequate
security is being provided by the necessary controls, password
management, remote access controls, operating system
configurations, etc. This role must ensure the systems are properly
assessed for vulnerabilities and must report any to the incident
response team and data owner.
References –
- Tech Targets, https://searchsoftwarequality.techtarget.com
- ISO, https://www.iso.org/home.html
- IEC, http://www.iec.ch/
- https://www.itgovernance.co.uk/what-is-cybersecurity
- https://safeandsecureonline.org/
- https://www.cylance.com
- https://www.avira.com
35
PROFESSIONS
- Education
- Legal
- Clerks
TOOLS - Engineers
- Artists
Software -
- Programmers ARTIFICAL
- Testers INTELLIGENCE
Hardware - - Medical Examiners Machine
Research - Learning
CYBER SECURITY
CYBER SECURITY
SOLUTIONS
Review current
transferable skills
No
Offered
a Job?
Yes