INTRODUCTION TO
CYBERSECURITY
Explain the basics of online security, including what
cybersecurity is and its potential impact.
Explain the most common threats, attacks, and vulnerabilities.
Explain how organizations can protect their operations against
these attacks.
Access diverse information and resources to explore different
career options in cybersecurity.
Cybercrime: it is all around us. And it's growing!
In fact, one source estimates that malicious hackers are attacking
computers and networks at a rate of one attack every 39 seconds,
posing a major threat to personal information, organizational data,
and even national security.
But we can fight back and, with your help, stop these
cybercriminals in their tracks.
As cyberattacks become more sophisticated, more targeted and
global, we need people like you to join us.
As a cybersecurity professional, you can help prevent people and
organizations around the world from falling victim to cybercrime.
An organization has already asked for your help. E-learning
company @Apollo is on high alert following a wave of recent
cyberattacks. As an entry-level security analyst, your job is to help
build their defenses and safeguard the company from attacks by
making the right cyber decisions.
Module 1: Introduction to Cybersecurity
Welcome to this module, which aims to help you understand the growing need for
cybersecurity.
Faced with an unprecedented increase in cyber attacks, the demand for
cybersecurity professionals has never been higher.
Learn more about what cybercriminals want and what you can do to ensure a
cyber threat never becomes a reality.
Let's start your cybersecurity career path
1.1.1
Image with selectable areas. Select each button to display more information.
What is Cybersecurity?
Cybersecurity is the ongoing effort to protect people,
organizations, and governments from digital attacks by protecting
networked systems and data from unauthorized use or damage .
Protection levels.
Telepresence
On a personal level, you must protect your identity, your data, and
your computing devices.
Organizational
At the corporate level, it is everyone's responsibility to protect the
organization's reputation, data, and customers.
Government
As more digital information is collected and shared, its protection
becomes even more vital at the government level, where national
security, economic stability, and the safety and well-being of
citizens are at stake .
1.1.2 Protecting your Personal Data
Personal data is any information that can be used to identify you
and can exist both offline and online.
Select images to discover the difference between your offline and
online identity.
Many people think that if they don't have any social media or
online accounts, then they don't have an online identity. This is not
the case. If you use the web, you have an online identity.
1.1.3 Your Online Identity
It's your first day at work and it's time to choose a username for
your online identity. Which of the following options would you
choose?
This is your first chance to earn valuable advocate points at e-
learning company @Apollo, so take your time and think carefully
before making decisions.
Choose two correct answers
1.1.3 Your Online Identity
That's right, well done! You surely know how to keep your online
identity safe.
When choosing a username, it is important not to reveal any
personal information. This username should not lead strangers to
think that you are an easy target for cybercrime or unwanted
attention.
Other useful tips to help you generate your username:
Don't use your full name or parts of your address or phone
number.
Don't use your email username.
Don't use the same username and password combination,
especially on financial accounts.
Don't choose a really strange username and then reuse it
over and over again, as it makes it easier to track.
Don't choose a username that gives away clues to your
passwords, such as a series of numbers or letters or the first
part of a two-part phrase, such as knock-knock or starlight,
or the department you work in, such as IT.
Choose a username that is appropriate for your account
type, i.e. business, social, or personal.
1.1.4 Your Data
Image with selectable areas. Select each button to display more information.
Personal data describes any information about you, including your
name, social security number, driver's license number, date and
place of birth, your mother's maiden name, and even photos or
messages you exchange with family and friends.
Cybercriminals can use this sensitive information to identify you
and impersonate you, which violates your privacy and can cause
serious damage to your reputation.
Medical records
Every time you visit the doctor, personal information about your
physical and mental health and well-being is added to your
electronic health records (EHR). Since most of these records are
kept online, you need to be aware of the medical information you
share.
And these records go beyond the confines of the doctor's office. For
example, many fitness trackers collect large amounts of clinical
data, such as heart rate, blood pressure, and blood sugar levels,
which are transferred, stored, and displayed via the cloud.
Therefore, you should consider this data to be part of your medical
history.
Educational records
Educational records contain information about your grades
and academic achievements. However, these records may
also include your contact information, attendance records,
disciplinary reports, health and immunization records, as well
as any special education records, including individualized
education programs (IEPs).
Employment and financial records
Employment data can be valuable to hackers if they can
gather information about your previous employment or even
your current performance evaluations.
Your financial history may include information about your
income and expenses. Your tax records may include
paychecks, credit card statements, your credit score, and your
bank account details. All of this data, if not properly
protected, can compromise your privacy and allow
cybercriminals to use your information for their own benefit.
1.1.5 Where is your data?
This has made you think. Just yesterday, you shared a couple of
photos from your first day at work with some of your close friends.
But it should be fine, right? Let's see!
He took some photos at work with his mobile phone. Prints of
these photos are now available on your mobile device.
You shared them with five close friends, who live in various places
around the world.
All your friends downloaded the photos and now have copies of
your photos on their devices.
One of your friends was so proud that they decided to post and
share your photos online. Photos are no longer just on your
device. In fact, they have ended up on servers located in different
parts of the world and people you don't even know now have
access to your photos.
1.1.6 What else is there...
This is just one example to remind us that whenever we collect or
share personal data, we must consider our security. There are
different laws that protect privacy and data in your country. But do
you know where your data is?
Select the images to see more examples that may not be so
obvious.
After a consultation, the
doctor will update your
medical history. For billing
purposes, this information
may be shared with the
insurance company. In such
cases, your medical record, or
part of it, is now available to
the insurance company .
Store loyalty cards can be a
convenient way to save money on
your purchases. However, the
store is using this card to create a
profile of your purchasing
behavior, which it can then use to
target you with special offers from
its marketing partners.
1.1.7 Smart devices
Please be aware of how often you use your computing devices to
access your personal data. Unless you have elected to receive
paper statements, you probably access digital copies of bank
statements through your bank's website. And when paying a bill,
there's a good chance you've transferred the required funds
through a mobile banking app.
But in addition to allowing you to access your information,
computing devices can now also generate information about you.
Wearable technologies such as smartwatches and activity trackers
collect your data for clinical research, patient health monitoring,
and fitness and wellness tracking. As the global fitness tracker
market grows, so does the risk to your personal data.
It may seem like the information available online is free. But is
privacy the price we pay for this digital convenience?
For example, social media companies generate the majority of
their revenue by selling targeted advertising based on customer
data that has been extracted using algorithms or formulas. Of
course, these companies will argue that they are not "selling"
customer data with their marketing partners.
You can make your own decision!
1.1.8 What do hackers want?
So, with all this information about you available online, what do
hackers want? Of course, they want your money.
Can you think of an example that you have experienced yourself
or heard or read about, where cybercriminals have accessed or
attempted to access financial information online?
A cybercriminal can take advantage of your relationships, access
your online accounts, and appeal to your good nature to try to trick
you into transferring money to your friends or family in a time of
need. For example, there have been many reported cases of
hackers posing as family members and sending messages stating
that they need money transferred to get home from abroad after
losing their wallets.
And while you may think your frequent flyer airline miles aren't
valuable to cybercriminals, think again. In 2015, cybercriminals
hacked into approximately 10,000 American Airlines and United
accounts, booking free flights and upgrades with stolen
credentials. Although frequent flyer kilometers were returned to
customers by airlines, this demonstrates the value of login
credentials.
Cybercriminals are certainly very imaginative when it comes to
gaining access to your money. But that's not all they're after, they
could also steal your identity and ruin your life.
Let's find out.
1.1.9 Identity theft
Not content with stealing your money for short-term financial gain,
cybercriminals are investing in the long-term gain of identity theft.
Select the cards to see two examples of how they could do
this.
medical theft
Rising medical costs have led to a rise in medical identity theft,
with cybercriminals stealing health insurance to use the benefits
for themselves. When this happens, any medical procedures
carried out on your behalf will be saved in your medical record.
Banking
Theft of private data can help cybercriminals access bank
accounts, credit cards, social profiles, and other online accounts.
Armed with this information, an identity thief could file a false tax
return and collect the refund. They could even take out loans in
your name and ruin your credit rating (and your life, too).
1.1.10 Who else wants my data?
It's not just criminals who are after your personal data.
Select the headings below to learn which other entities are
interested in your online identity and why.
Next...
It is obvious that cybercriminals are becoming more sophisticated
in their search for valuable personal data. But they also pose a
huge threat to the organization's data.