Fiveable

๐Ÿ”’Cybersecurity and Cryptography Unit 1 Review

QR code for Cybersecurity and Cryptography practice questions

1.1 Overview of Cybersecurity Concepts and Terminology

๐Ÿ”’Cybersecurity and Cryptography
Unit 1 Review

1.1 Overview of Cybersecurity Concepts and Terminology

Written by the Fiveable Content Team โ€ข Last updated September 2025
Written by the Fiveable Content Team โ€ข Last updated September 2025
๐Ÿ”’Cybersecurity and Cryptography
Unit & Topic Study Guides

Cybersecurity is all about protecting our digital lives from bad guys and accidents. It's like having a super-smart guard dog for your computer and phone, always on the lookout for trouble.

In this part, we'll learn the basics - what cybersecurity is, why it matters, and how it works. We'll cover the main ideas you need to know to stay safe online and keep your info private.

Fundamental Concepts

Core Cybersecurity Principles

  • Cybersecurity protects systems, networks, and programs from digital attacks
  • Aims to maintain confidentiality, integrity, and availability of information
  • Involves various technologies, processes, and practices
  • Applies to individuals, organizations, and governments
  • Addresses threats from both internal and external sources

Understanding Threats and Vulnerabilities

  • Threat represents potential danger to assets or systems
  • Can originate from malicious actors, natural disasters, or human errors
  • Vulnerability refers to weakness in system that can be exploited
  • Common vulnerabilities include unpatched software, weak passwords, and misconfigured systems
  • Risk measures potential impact and likelihood of threat exploiting vulnerability
  • Calculated using formula: Risk=Threatร—Vulnerabilityร—ImpactRisk = Threat \times Vulnerability \times Impact

Anatomy of Cyber Attacks

  • Attack involves deliberate attempt to breach security of system or network
  • Can be passive (eavesdropping) or active (data manipulation)
  • Common attack types include phishing, malware, and denial-of-service
  • Often exploit known vulnerabilities or social engineering techniques
  • Attackers may have various motivations (financial gain, espionage, hacktivism)

Defensive Measures

Network Protection and Access Control

  • Firewall acts as barrier between trusted internal network and untrusted external networks
  • Can be hardware-based, software-based, or cloud-based
  • Filters incoming and outgoing traffic based on predetermined security rules
  • Authentication verifies identity of users or systems
    • Employs various methods (passwords, biometrics, smart cards)
    • Often uses multi-factor authentication for enhanced security
  • Authorization determines what authenticated users can access or do within system
    • Implements principle of least privilege
    • Uses access control lists (ACLs) to manage permissions

Data Protection and Secure Communication

  • Encryption converts data into unreadable format to protect confidentiality
  • Uses complex algorithms and keys to scramble information
  • Symmetric encryption uses single key for both encryption and decryption
    • Faster but requires secure key exchange
    • Commonly used algorithms include AES and DES
  • Asymmetric encryption uses public-private key pairs
    • Slower but provides additional security features
    • Enables secure key exchange and digital signatures
    • Popular algorithms include RSA and ECC

Incident Handling

Malware Detection and Prevention

  • Malware encompasses various types of malicious software
  • Includes viruses, worms, trojans, ransomware, and spyware
  • Spreads through infected files, email attachments, or compromised websites
  • Anti-malware software uses signature-based and behavior-based detection
  • Regular system updates and patches help prevent malware infections

Incident Response Process

  • Incident response addresses security breaches or cyber attacks
  • Follows structured approach to minimize damage and recover quickly
  • Key phases include preparation, identification, containment, eradication, recovery, and lessons learned
  • Requires coordination among various teams (IT, legal, PR)
  • Emphasizes documentation and communication throughout process

Developing and Implementing Security Policies

  • Security policy outlines rules and procedures for protecting assets
  • Addresses various aspects (acceptable use, password management, data classification)
  • Requires regular review and updates to address evolving threats
  • Involves stakeholders from different departments in development process
  • Includes enforcement mechanisms and consequences for non-compliance
  • Supports overall risk management strategy of organization