CYB201 Lecture Note and Excercise 12-3-25 (1) Sent
CYB201 Lecture Note and Excercise 12-3-25 (1) Sent
Security policies, best current practices, testing security, and incident response.
Evolution of cyber-attacks.
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
These attacks are usually aimed at accessing, changing, or destroying sensitive information;
extorting money from users; or interrupting normal business processes.
Cybersecurity Methods
Preventive measures: These measures are designed to prevent cyberattacks from happening
in the first place.
Detective measures: These measures are designed to detect cyberattacks that have already
occurred.
Cybersecurity elements:
iii. Availability: This is ensuring that authorized users have access to information when they
need it.
iv. Authentication: This is the process of verifying the identity of a user or device.
vi. Non-repudiation: This is ensuring that users cannot deny having performed an action.
Fault-tolerant methodologies:
Fault-tolerant methodologies are designed to ensure that systems can continue to operate even in
the event of a failure. There are a variety of fault-tolerant methodologies that can be used to
implement security, such as:
i. Redundancy: This involves having multiple copies of critical components so that if one
component fails, another can take over.
ii. Diversity: This involves using different types of components so that if one type of
component is vulnerable to attack, another type of component can still provide protection.
iii. Isolation: This involves isolating critical components from other components so that if
one component is compromised, the others are not affected.
Confidentiality: A company encrypts its sensitive data so that only authorized employees
can access it.
Integrity: A bank uses digital signatures to ensure that transactions cannot be modified
without authorization.
Availability: A website uses a content delivery network (CDN) to ensure that it can
handle a large number of visitors.
Authentication: A user enters a username and password to log in to their email account.
Access control: A company uses a firewall to block unauthorized access to its network.
Non-repudiation: A user signs a digital contract to ensure that they cannot later deny
having agreed to the terms.
Case studies:
i. The Equifax data breach (2017): This breach resulted in the personal information of
147.9 million people being compromised.
ii. The WannaCry ransomware attack (2017): This attack infected over 200,000
computers in 150 countries.
iii. The SolarWinds supply chain attack (2020): This attack compromised the software of
a major IT company, giving attackers access to the networks of its customers.
Advantages of cybersecurity:
Disadvantages of cybersecurity:
Class Exercises
Assignment Questions
2. What are some of the ethical considerations that cybersecurity professionals need to be
aware of?
3. Imagine that you are a cybersecurity consultant. A small business owner has asked you to
help them improve their cybersecurity posture. What are some of the steps you would
recommend?
Solution
Class Exercises
1. The three main goals of cybersecurity are confidentiality, integrity, and availability.
2. A threat is anything that has the potential to cause harm. A vulnerability is a weakness
in a system that can be exploited by a threat. An attack is an attempt to exploit a
vulnerability.
Assignment Questions
Class Exercise 1:
Class Exercise 2:
Class Exercise 3:
Answer: A virus is a type of malware that requires a host program to execute. A worm is
a type of malware that can spread from computer to computer without requiring a host
program.