Week 1: Introduction to Cybersecurity
Understanding the fundamentals of cybersecurity concepts and threats
1 Introduction to Cybersecurity
1.1 Learning Objectives
By the end of this module, you will be able to:
- Define key cybersecurity concepts and terminology
- Identify the main categories of cyber threats and attack vectors
- Explain the motivations and methods of different threat actors
- Apply core security principles including the CIA triad
- Analyze basic security incidents using a structured approach
- Begin building your cybersecurity mindset
1.2 Understanding Cybersecurity
1.2.1 What is Cybersecurity?
Cybersecurity is the practice of protecting systems, networks, programs, devices, and data from digital attacks, damage, or unauthorized access. It encompasses technologies, processes, and practices designed to safeguard all components of cyberspace from threats.
1.2.2 Why Cybersecurity Matters
- Digital Transformation: As organizations and society become increasingly digitized, attack surfaces expand
- Financial Impact: The average cost of a data breach in 2024 exceeds $4.5 million
- Regulatory Requirements: Growing legal and compliance mandates around data protection
- Reputation: Security incidents can cause lasting damage to organizational trust
- Critical Infrastructure: Cyber attacks can impact essential services and public safety
- Personal Impact: Individual privacy and financial security are at stake
1.2.3 Key Concepts and Terminology
- Asset: Anything of value that needs protection (data, systems, etc.)
- Vulnerability: A weakness that can be exploited by threats
- Threat: A potential danger to assets
- Risk: The potential for loss or damage when a threat exploits a vulnerability
- Control: A safeguard or countermeasure to mitigate risk
- Exploit: A method of leveraging a vulnerability
- Attack Vector: The path or means by which an attacker gains access
- Attack Surface: The sum of all points where an attacker could attempt to enter
- Security Posture: The overall security status of an organization
1.3 The Threat Landscape
1.3.1 Categories of Cyber Threats
1.3.1.1 Malware
- Viruses: Self-replicating programs that attach to legitimate files
- Worms: Self-propagating malware that spreads across networks
- Trojans: Malware disguised as legitimate software
- Ransomware: Encrypts data and demands payment for decryption
- Spyware: Covertly gathers information about users
- Rootkits: Provide privileged access while hiding their presence
- Fileless Malware: Operates in memory, leaving minimal traces on disk
1.3.1.3 Network-Based Attacks
- Man-in-the-Middle: Intercepting and potentially altering communications
- Denial of Service: Overwhelming systems to make them unavailable
- DNS Attacks: Manipulating domain name resolution
- ARP Spoofing: Linking attacker’s MAC address to legitimate IP addresses
- Session Hijacking: Taking over valid user sessions
1.3.1.4 Web Application Attacks
- SQL Injection: Inserting malicious SQL code into database queries
- Cross-Site Scripting (XSS): Injecting malicious scripts into web pages
- Cross-Site Request Forgery (CSRF): Tricking users into performing unwanted actions
- Server-Side Request Forgery (SSRF): Inducing servers to make unintended requests
- Insecure Deserialization: Exploiting flawed deserialization processes
1.3.2 Threat Actors
1.3.2.1 Motivation-Based Categories
- Cybercriminals: Financially motivated attackers
- Nation-State Actors: Government-sponsored groups conducting espionage or sabotage
- Hacktivists: Ideologically motivated attackers
- Insider Threats: Employees or contractors who misuse their access
- Script Kiddies: Inexperienced attackers using pre-written tools
- Advanced Persistent Threats (APTs): Sophisticated, targeted campaigns
1.3.2.2 Capability Levels
- Low Skill: Using publicly available tools with minimal customization
- Moderate Skill: Combining and modifying existing tools and techniques
- High Skill: Developing custom exploits and evasion techniques
- Elite: Creating novel attack methods and zero-day exploits
1.3.3 Attack Lifecycle
The Cyber Kill Chain model developed by Lockheed Martin describes the stages of a cyber attack:
- Reconnaissance: Gathering information about the target
- Weaponization: Preparing malware or attack vectors
- Delivery: Transmitting the weapon to the target
- Exploitation: Triggering the malicious code
- Installation: Installing malware on the target system
- Command & Control: Establishing persistent remote access
- Actions on Objectives: Achieving the ultimate goal (data theft, destruction, etc.)
1.4 Core Security Principles
1.4.1 The CIA Triad
The CIA Triad forms the foundation of information security:
- Confidentiality: Ensuring that information is accessible only to those authorized to have access
- Integrity: Maintaining and assuring the accuracy and completeness of data
- Availability: Ensuring that authorized users have access to information when needed
1.4.2 Additional Security Principles
- Defense in Depth: Multiple layers of security controls
- Least Privilege: Providing minimal access rights needed for functions
- Separation of Duties: Dividing critical functions among different individuals
- Need to Know: Restricting access to the minimum necessary information
- Zero Trust: “Never trust, always verify” approach to security
- Fail Secure: Systems should default to secure state when failures occur
1.5 Risk Management Basics
1.5.1 The Risk Equation
Risk = Threat × Vulnerability × Impact
1.5.2 Risk Management Process
- Risk Identification: Determining what risks exist
- Risk Assessment: Evaluating the significance of risks
- Risk Treatment: Deciding how to handle identified risks
- Accept: Acknowledge the risk without action
- Mitigate: Implement controls to reduce risk
- Transfer: Shift risk to another party (e.g., insurance)
- Avoid: Eliminate the activity causing the risk
1.5.3 Security Controls Categories
- Preventive: Stop attacks before they occur
- Detective: Identify attacks in progress
- Corrective: Minimize impact after an incident
- Deterrent: Discourage attackers from targeting
- Recovery: Restore operations after an incident
1.6 Developing a Security Mindset
1.6.1 Characteristics of Security Thinking
- Adversarial Thinking: Considering how systems might be attacked
- Holistic Perspective: Looking at the big picture of security
- Questioning Assumptions: Challenging “secure by default” claims
- Proactive Approach: Anticipating problems before they arise
- Continuous Learning: Keeping up with evolving threats
1.6.2 Building Your Security Awareness
- Stay Informed: Follow security news and advisories
- Practice Skepticism: Question unexpected communications
- Apply Updates: Keep systems and applications patched
- Use Strong Authentication: Implement multi-factor authentication
- Segment Information: Avoid sharing sensitive data unnecessarily
1.7 Practical Exercise: Security Analysis
1.7.1 Exercise 1: Threat Identification
- Consider a common system (e.g., email, cloud storage, smartphone)
- Identify at least five potential threats to that system
- For each threat:
- Describe the potential attack vector
- Identify the security principle(s) that would be violated
- Suggest a control that could mitigate the threat
1.7.2 Exercise 2: Security Incident Analysis
Review the following scenario:
A company employee received an email appearing to be from the IT department requesting they update their password by clicking a link. After following the link and entering their current credentials, they began experiencing unusual behavior on their computer, and colleagues reported receiving strange emails from their account.
Answer the following questions: 1. What type of attack likely occurred? 2. What were the attack vectors? 3. What security principles were violated? 4. What could have prevented this attack? 5. What immediate steps should be taken to respond?
1.8 Additional Resources
1.9 Next Week
Next week, we’ll explore regulatory frameworks and compliance requirements in cybersecurity, and set up our security lab environment for hands-on practice throughout the course.
1.10 Discussion Questions
- How has your understanding of cybersecurity changed after this introduction?
- Which type of cyber threat do you think poses the greatest risk to organizations today, and why?
- How do you currently apply security principles in your personal digital life?
- What aspects of cybersecurity are you most interested in exploring further?
- How might the cybersecurity landscape evolve in the next 5-10 years?
1.3.1.2 Social Engineering