Lecture 1 & 2
Lecture 1 & 2
Fundamentals of
Cybersecurity
Chapter 1:
Introduction to
Information Security
Lecture Learning
outcomes
❑ Explain the main purpose and
the principles of information
security and its uses.
❑ Illustrates the advantages and
disadvantages of using
information security and its
main issues.
❑ Differentiate between Cyber
security, Information security,
and Network security.
Outlines
History of Introduction of
Definition of
Information information
Security.
Security (IS). Security.
How can
Purpose of Principles of
information
Information Information
security be
Security. Security.
achieved?
Access to network
resources will be through
unique user ID and
password
Policies
Passwords will be 10
characters
Standards
Passwords should include
one non-alpha and not
found in dictionary
Procedures , Guidelines,
Practices
Purposes of Information Security
• Protecting sensitive information.
• Mitigating risk.
• Compliance with regulations.
• Protecting reputation.
• Ensuring business continuity
Protecting sensitive information
• Information security helps protect sensitive
information from being accessed, disclosed, or
modified by unauthorized individuals.
• This includes personal information, financial
data, and trade secrets, as well as confidential
government and military information.
Mitigating risk
• By implementing information security
measures, organizations can mitigate the risks
associated with cyber threats and other
security incidents.
• This includes minimizing the risk of data
breaches, denial-of-service attacks, and other
malicious activities.
Compliance with regulations
• Many industries and jurisdictions have specific
regulations governing the protection of
sensitive information.
• Information security measures help ensure
compliance with these regulations, reducing
the risk of fines and legal liability.
Protecting reputation
Information security is
It protects anything in the It protects anything in for information
3
cyber area. the network area. irrespective of the
space.
Information
Security attacks
Network Security against
Cyber security attacks against
4 attacks against unauthorized
cybercrime and cyber fraud.
trojans. access, disclosure
modification, and
disruption.
Common Network
Common
Common Cyber Security Risks: Security Risks:
Information
•Social engineering •Viruses, worms,
Security Risks:
6 •Brute force and trojans
•Access
•Baiting •Denial of Service
•Destruction
•Ransomware (DOS) attack
• Availability
• Zero-day attacks
Case Study
• Snowden & The NSA, 2013.
• Yahoo, 2013 – 2014.
• WannaCry, 2017.