🎓 Computer Security Foundations – Preparation Course

  


I) Introduction to Cybersecurity

Cybersecurity is the practice of protecting computers, servers, mobile devices, networks, and data from digital attacks. These attacks usually aim to steal sensitive information, damage systems, or disrupt services.

Cybersecurity is important because almost everything today is connected to the internet, including banking, communication, and businesses.

🎯 CIA Triad (Core Principle of Security)

  • Confidentiality → Ensures that data is only accessible to authorized users.
    Example: Your password should not be visible to others.
  • Integrity → Ensures that data is not modified or corrupted without permission.
    Example: No one should change your exam score.
  • Availability → Ensures that systems and data are available when needed.
    Example: A website should not be down when users need it.

II) Cryptography Basics

Cryptography is the science of protecting information by converting it into unreadable formats so that only authorized users can understand it.

🔐 Encryption

Encryption converts plaintext (readable data) into ciphertext (unreadable data).

Types:

  • Symmetric encryption
    • Same key is used for encryption and decryption
    • Example: AES
    • Faster but key must be shared securely
  • Asymmetric encryption
    • Uses two keys: public key and private key
    • Example: RSA, ECC
    • More secure for communication over the internet

🔎 Hashing

Hashing converts data into a fixed-length string called a hash.

  • It is one-way (cannot be reversed)
  • Used to store passwords securely
  • Even a small change in input changes the entire hash

Example:
password → a3f5x9z... (hash value)


III) Network Security

Network security protects data while it is being sent between systems over a network or the internet.

🛡️ Firewall

A firewall acts like a security barrier between a trusted network and untrusted networks.

  • It monitors incoming and outgoing traffic
  • Blocks suspicious or unauthorized connections

🔐 HTTPS

HTTPS is the secure version of HTTP.

  • Uses encryption (TLS)
  • Protects data like passwords and credit card information
  • Prevents attackers from reading transmitted data

🌍 VPN (Virtual Private Network)

A VPN creates a secure encrypted tunnel between your device and the internet.

  • Hides your real IP address
  • Protects data on public Wi-Fi
  • Improves privacy and security

IV) Cyber Attacks

Cyber attacks are actions performed by attackers to exploit systems or steal information.

🎣 Phishing

Phishing is a fake message (email, SMS, website) that tricks users into revealing sensitive data like passwords.

Example:
A fake email pretending to be your bank asking for login details.

🌊 DDoS Attack

A Distributed Denial of Service attack floods a server with massive traffic.

  • Makes websites slow or unavailable
  • Uses many infected devices (botnet)

🕵️ MITM (Man-in-the-Middle)

An attacker secretly intercepts communication between two users.

  • Victims think they are communicating directly
  • Attacker can read or modify messages

🔓 Brute Force Attack

An attacker tries many password combinations until the correct one is found.

  • Works well on weak passwords
  • Slowed down by strong passwords and MFA

📌 Suspicious Logins

If a login happens from an unknown country or device, it may indicate:

  • stolen password
  • hacked account
  • unauthorized access attempt

V) Malware

Malware is software designed to damage or exploit systems.


🦠 Types of Malware

  • Virus → attaches to files and spreads when executed
  • Worm → spreads automatically through networks
  • Trojan → appears as legitimate software but is malicious

⚠️ How Malware Spreads

  • Email attachments
  • Downloading unsafe software
  • USB devices and external storage
  • Fake websites

VI) Security Best Practices

🔑 Strong Passwords

A strong password should:

  • include letters, numbers, symbols
  • avoid common words or personal information
  • be unique for each account

Example of weak password: 123456
Example of strong password: J!d8@kP2x


🔐 Multi-Factor Authentication (MFA)

MFA adds an extra security step after password login.

Examples:

  • SMS code
  • Authentication app
  • Fingerprint

🧾 Access Control

Access control ensures that users only access data they are allowed to see.

Example:

  • Students cannot access admin data
  • Employees only access their department data

👤 Human Error

Human mistakes are one of the biggest cybersecurity risks.

Examples:

  • sending files to wrong person
  • clicking on phishing links
  • using weak passwords

VII) Databases & Risk

💾 SQL Injection

SQL injection is an attack where malicious code is inserted into a database query to access or modify data.

Example:
Attacker enters special input in login fields to bypass authentication.

📊 Cybersecurity Risk Formula

Risk is calculated as:

Risk = Threat × Vulnerability × Impact

  • Threat → potential attacker or danger
  • Vulnerability → weakness in the system
  • Impact → damage caused by the attack

🎓 Conclusion

Cybersecurity is essential in today’s digital world. Understanding basic threats and applying security practices helps protect data, systems, and privacy.

To stay safe:

  • Use strong authentication
  • Avoid suspicious links and emails
  • Keep systems updated
  • Follow security best practices

🏁 You are now ready for the exam


🚀 Start Your Exam

Click below to begin:

👉 Launch Certification Exam

 

Post a Comment

Previous Post Next Post