Cybersecurity Topics Overview
Cybersecurity Topics Overview
Introduction to Cybersecurity
data, from cyberattacks. As the world becomes more digitized, the need to protect sensitive
Malware: Malicious software designed to harm or exploit any programmable device. Examples
Phishing: A method where attackers trick individuals into providing sensitive information by
Man-in-the-Middle (MitM) Attack: Occurs when an attacker intercepts communication between two
Denial of Service (DoS) Attack: An attack designed to overwhelm a system, making it unavailable to
Encryption: The process of converting information into a code to prevent unauthorized access.
Public Key Infrastructure (PKI): A framework that uses encryption and digital certificates to secure
communications.
Transport Layer Security (TLS)/Secure Sockets Layer (SSL): Protocols that provide secure
Network Security
Firewalls: A security system that monitors and controls incoming and outgoing network traffic based
Virtual Private Network (VPN): A service that encrypts your internet connection, protecting your data
Endpoint Security
Antivirus/Antimalware: Software designed to detect and eliminate malicious software from devices.
Endpoint Detection and Response (EDR): Solutions that provide continuous monitoring and
Mobile Device Management (MDM): Tools that enable organizations to secure and manage mobile
Authentication: Verifying the identity of a user or device. This includes passwords, biometrics, and
Single Sign-On (SSO): A session and user authentication service that permits a user to use one set
Cloud Security
Cloud Service Models: Understanding IaaS, PaaS, and SaaS and their security implications.
Shared Responsibility Model: The division of security responsibilities between the cloud provider
Cloud Access Security Broker (CASB): Security policy enforcement points placed between cloud
service consumers and cloud service providers to enforce enterprise security policies.
Incident Response
Incident Response Plan: A set of instructions to help detect, respond to, and recover from
cybersecurity incidents.
Forensics: The process of collecting, preserving, and analyzing evidence after a cybersecurity
incident.
Disaster Recovery and Business Continuity: Plans to ensure that an organization can continue
SOC Team: A group responsible for monitoring and analyzing an organization?s security posture on
an ongoing basis.
Security Information and Event Management (SIEM): Tools that provide real-time analysis of
GDPR (General Data Protection Regulation): A regulation in EU law on data protection and privacy.
HIPAA (Health Insurance Portability and Accountability Act): US legislation that provides data
PCI-DSS (Payment Card Industry Data Security Standard): A set of security standards designed to
ensure that all companies that accept, process, store, or transmit credit card information maintain a
secure environment.
Penetration Testing
Ethical Hacking: The process of testing and assessing the security of a system by simulating an
attack.
Red Team/Blue Team Exercises: Simulated cyberattacks where the Red Team acts as the attacker
accurately.
Internet of Things (IoT) Security: Protecting networks connected to IoT devices, which often have
Zero Trust Architecture: A security concept where access is not granted based on network location
Cybersecurity Careers
Roles: Security Analyst, Penetration Tester, Incident Responder, Security Architect, and more.
Certifications: CISSP, CEH, CompTIA Security+, and others are valuable for career advancement.
Best Practices
Security Awareness Training: Educating employees on how to recognize and respond to potential
threats.
Backup and Data Recovery: Ensuring data is regularly backed up and can be restored in the event
of a breach.