Cyber Security Fundamentals

Cyber Security Fundamentals:

Cyber Security Fundamentals

Cyber Security Fundamentals:

Cyber security is a critical field that focuses on protecting computer systems, networks, and data from cyber threats. As cyber attacks become more sophisticated and prevalent, organizations need to understand the fundamentals of cyber security to defend against these threats effectively. In this course, we will cover key terms and vocabulary related to cyber security fundamentals to provide you with a strong foundation in this field.

1. Cyber Security: Cyber security refers to the practice of protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing. It involves implementing security measures to prevent unauthorized access, data breaches, and other cyber attacks.

2. Threat: A threat is any potential danger that can exploit a vulnerability in a system or network to compromise security. Threats can come in various forms, including malware, phishing emails, ransomware, and insider threats.

3. Vulnerability: A vulnerability is a weakness in a system or network that can be exploited by a threat actor to compromise security. Vulnerabilities can arise from software bugs, misconfigurations, or human error.

4. Risk: Risk refers to the likelihood of a threat exploiting a vulnerability to cause harm to a system or network. Organizations assess and manage risks to prioritize security measures and allocate resources effectively.

5. Attack: An attack is an intentional action by a threat actor to compromise the security of a system or network. Attacks can be carried out through various means, such as malware, social engineering, or denial-of-service attacks.

6. Malware: Malware is malicious software designed to damage or disrupt computer systems, steal sensitive information, or gain unauthorized access. Examples of malware include viruses, worms, Trojans, and ransomware.

7. Phishing: Phishing is a type of cyber attack where attackers impersonate legitimate entities to trick users into revealing sensitive information, such as passwords or credit card numbers. Phishing attacks are often carried out through emails or websites.

8. Encryption: Encryption is the process of encoding information in such a way that only authorized parties can access it. It helps protect data confidentiality and integrity by scrambling data into unreadable format without the appropriate decryption key.

9. Authentication: Authentication is the process of verifying the identity of a user or system to grant access to resources. It involves providing credentials, such as passwords or biometric data, to prove identity and gain authorization.

10. Authorization: Authorization is the process of granting or denying access to resources based on the authenticated identity of a user or system. It ensures that only authorized users can access specific resources or perform certain actions.

11. Firewall: A firewall is a security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.

12. Intrusion Detection System (IDS): An Intrusion Detection System (IDS) is a security tool that monitors network traffic for suspicious activities or known attack patterns. It alerts administrators to potential security incidents by analyzing network packets or logs.

13. Intrusion Prevention System (IPS): An Intrusion Prevention System (IPS) is a security tool that not only detects but also actively blocks or mitigates potential security threats. It can automatically respond to identified threats by blocking malicious traffic or isolating compromised systems.

14. Patch Management: Patch management is the process of applying updates or patches to software, operating systems, or firmware to address security vulnerabilities and improve system stability. Regular patching is essential to protect systems from known exploits.

15. Incident Response: Incident response is the process of reacting to and mitigating the impact of security incidents, such as data breaches or cyber attacks. It involves identifying the incident, containing the damage, eradicating the threat, and recovering affected systems.

16. Security Policy: A security policy is a set of rules and guidelines that define how an organization protects its assets, enforces security controls, and responds to security incidents. Security policies help ensure consistency and compliance with security best practices.

17. Social Engineering: Social engineering is a tactic used by attackers to manipulate individuals into divulging sensitive information or performing actions that compromise security. Attackers exploit human psychology and trust to deceive victims into disclosing confidential data.

18. Zero-Day Vulnerability: A zero-day vulnerability is a security vulnerability in software or hardware that is unknown to the vendor and has not been patched. Attackers can exploit zero-day vulnerabilities to launch targeted attacks before a patch is available.

19. Data Loss Prevention (DLP): Data Loss Prevention (DLP) is a strategy and set of tools that help organizations prevent the unauthorized disclosure or loss of sensitive data. DLP solutions monitor, detect, and protect sensitive data from being leaked or stolen.

20. Multi-factor Authentication (MFA): Multi-factor Authentication (MFA) is a security mechanism that requires users to provide multiple forms of verification to access a system or application. It typically combines something the user knows (password), has (smartphone), or is (biometric data) to enhance security.

21. Virtual Private Network (VPN): A Virtual Private Network (VPN) is a secure tunnel that encrypts and protects network traffic between a user's device and a remote server. VPNs help ensure privacy and confidentiality by masking the user's IP address and encrypting data transmissions.

22. Penetration Testing: Penetration testing, also known as ethical hacking, is a controlled process of simulating real-world cyber attacks to identify security vulnerabilities in a system or network. Penetration testers use authorized tools and techniques to assess the security posture of an organization.

23. Security Awareness Training: Security awareness training is an educational program designed to educate employees about cyber security best practices, policies, and procedures. It aims to raise awareness of potential threats and reduce human error in security incidents.

24. Data Encryption Standard (DES): Data Encryption Standard (DES) is a symmetric encryption algorithm used to secure data transmissions and protect sensitive information. While DES is considered outdated and vulnerable to attacks, it laid the foundation for modern encryption standards.

25. Advanced Persistent Threat (APT): An Advanced Persistent Threat (APT) is a sophisticated, targeted cyber attack launched by a well-funded and organized threat actor. APTs often involve stealthy tactics, long-term persistence, and multiple attack vectors to compromise high-value targets.

26. Security Information and Event Management (SIEM): Security Information and Event Management (SIEM) is a technology that provides real-time monitoring, correlation, and analysis of security events and logs from various sources. SIEM solutions help organizations detect and respond to security incidents effectively.

27. Certificate Authority (CA): A Certificate Authority (CA) is a trusted entity that issues digital certificates to verify the identity of individuals, organizations, or websites. CAs play a crucial role in establishing secure communication through the use of SSL/TLS certificates.

28. Denial-of-Service (DoS) Attack: A Denial-of-Service (DoS) attack is a cyber attack that aims to disrupt or disable the normal operation of a network, system, or service by overwhelming it with excessive traffic. DoS attacks can cause service outages and impact the availability of resources.

29. Distributed Denial-of-Service (DDoS) Attack: A Distributed Denial-of-Service (DDoS) attack is a variant of DoS attack that involves multiple compromised devices, known as bots or zombies, flooding a target with malicious traffic. DDoS attacks are harder to mitigate due to their distributed nature.

30. Security Operations Center (SOC): A Security Operations Center (SOC) is a centralized facility that provides continuous monitoring, analysis, and response to security incidents. SOC teams use security tools and technologies to detect and mitigate threats in real-time.

31. Red Team vs. Blue Team: In cyber security, Red Team refers to a group of ethical hackers who simulate attacks to test and improve an organization's defenses. Blue Team, on the other hand, represents the defenders who respond to Red Team attacks and strengthen security controls.

32. Cryptography: Cryptography is the science of secure communication through the use of codes and ciphers to protect data confidentiality, integrity, and authenticity. Cryptographic techniques play a crucial role in securing communications, transactions, and information.

33. Public Key Infrastructure (PKI): Public Key Infrastructure (PKI) is a framework that enables secure communication and authentication through the use of digital certificates and key pairs. PKI provides a trusted hierarchy of Certificate Authorities to issue, manage, and revoke digital certificates.

34. Secure Sockets Layer (SSL) / Transport Layer Security (TLS): SSL and TLS are cryptographic protocols used to secure communications over the internet by encrypting data transmissions between clients and servers. SSL has been deprecated in favor of TLS, which provides more secure and robust encryption.

35. Security Best Practices: Security best practices are recommended guidelines and procedures that organizations should follow to enhance their security posture and reduce the risk of cyber attacks. Best practices encompass a range of security controls, policies, and technologies to protect assets.

36. Zero Trust Security Model: Zero Trust is a security model that assumes no trust in users, devices, or networks and requires verification for every access request. Zero Trust architecture applies strict access controls, least privilege, and continuous monitoring to prevent insider threats and data breaches.

37. Bring Your Own Device (BYOD): Bring Your Own Device (BYOD) refers to a policy that allows employees to use their personal devices, such as smartphones or laptops, for work purposes. BYOD presents security challenges related to data protection, device management, and network security.

38. Internet of Things (IoT) Security: Internet of Things (IoT) security focuses on securing connected devices, sensors, and systems that communicate over the internet. IoT security measures aim to protect data privacy, prevent unauthorized access, and mitigate potential vulnerabilities in IoT devices.

39. Cloud Security: Cloud security involves securing data, applications, and infrastructure hosted in cloud environments to protect against cyber threats and data breaches. Cloud security measures include encryption, access controls, monitoring, and compliance with cloud service providers.

40. Security Awareness: Security awareness is the knowledge and understanding of cyber security risks, threats, and best practices among individuals, employees, or organizations. Security awareness programs aim to educate users about potential security threats and promote a culture of security awareness.

41. Network Security: Network security focuses on protecting the integrity, confidentiality, and availability of data transmitted over computer networks. Network security controls, such as firewalls, intrusion detection systems, and VPNs, help secure network infrastructure from cyber threats.

42. Endpoint Security: Endpoint security involves protecting individual devices, such as computers, laptops, smartphones, and tablets, from cyber threats. Endpoint security solutions, including antivirus software, encryption, and device management, help secure endpoints from malware and unauthorized access.

43. Security Architecture: Security architecture refers to the design and implementation of security controls, policies, and technologies to protect an organization's assets from cyber threats. Security architecture encompasses network architecture, application security, and data protection strategies.

44. Data Security: Data security focuses on protecting sensitive information from unauthorized access, disclosure, or modification. Data security measures include encryption, access controls, data loss prevention, and secure data storage to safeguard valuable data assets.

45. Threat Intelligence: Threat intelligence is information about potential cyber threats, vulnerabilities, and attackers that can help organizations proactively defend against security incidents. Threat intelligence sources include security feeds, threat reports, and analysis of emerging threats.

46. Cyber Resilience: Cyber resilience refers to an organization's ability to withstand, respond to, and recover from cyber attacks or security incidents. Cyber resilience strategies involve preparing for threats, detecting incidents, mitigating risks, and restoring operations to normalcy.

47. Security Controls: Security controls are policies, procedures, and technologies implemented to protect systems, networks, and data from security threats. Security controls include preventive, detective, and corrective measures to mitigate risks and ensure compliance with security requirements.

48. Risk Management: Risk management is the process of identifying, assessing, and mitigating risks to protect an organization's assets and achieve its security objectives. Risk management involves risk assessment, risk treatment, and risk monitoring to reduce the impact of potential threats.

49. Cybersecurity Frameworks: Cybersecurity frameworks are structured guidelines and standards that organizations can use to develop, implement, and improve their cyber security programs. Common cybersecurity frameworks include NIST Cybersecurity Framework, ISO 27001, and CIS Controls.

50. Security Incident Response Plan: A Security Incident Response Plan is a documented strategy that outlines how an organization will respond to security incidents, such as data breaches or cyber attacks. Incident response plans define roles, responsibilities, communication protocols, and actions to mitigate security threats.

51. Security Compliance: Security compliance refers to adhering to regulatory requirements, industry standards, and internal policies to ensure that an organization's security practices meet legal and operational obligations. Security compliance aims to protect sensitive data, reduce risks, and maintain trust with stakeholders.

In this course, you will explore these key terms and concepts to build a strong foundation in cyber security fundamentals. By understanding the terminology and vocabulary of cyber security, you will be better equipped to protect systems, networks, and data from cyber threats and contribute to a secure digital environment.

Key takeaways

  • As cyber attacks become more sophisticated and prevalent, organizations need to understand the fundamentals of cyber security to defend against these threats effectively.
  • Cyber Security: Cyber security refers to the practice of protecting computer systems, networks, and data from cyber threats such as hacking, malware, and phishing.
  • Threat: A threat is any potential danger that can exploit a vulnerability in a system or network to compromise security.
  • Vulnerability: A vulnerability is a weakness in a system or network that can be exploited by a threat actor to compromise security.
  • Risk: Risk refers to the likelihood of a threat exploiting a vulnerability to cause harm to a system or network.
  • Attacks can be carried out through various means, such as malware, social engineering, or denial-of-service attacks.
  • Malware: Malware is malicious software designed to damage or disrupt computer systems, steal sensitive information, or gain unauthorized access.
May 2026 intake · open enrolment
from £90 GBP
Enrol