Posts

Showing posts from February, 2020

Attackers & Defenders [Intro Final]

Types of Attackers Attackers are individuals or groups who attempt to exploit vulnerability for personal or financial gain. Attackers are interested in everything, from credit cards to product designs and anything with value. Amateurs  – These people are sometimes called Script Kiddies. They are usually attackers with little or no skill, often using existing tools or instructions found on the Internet to launch attacks. Some of them are just curious, while others are trying to demonstrate their skills and cause harm. They may be using basic tools, but the results can still be devastating. Hackers  – This group of attackers break into computers or networks to gain access. Depending on the intent of the break-in, these attackers are classified as white, gray, or black hats. The white hat attackers break into networks or computer systems to discover weaknesses so that the security of these systems can be improved. These break-ins are done with prior permission and any result

Intro - Part 2

Types of Organizational Data Traditional Data Corporate data includes personnel information, intellectual properties, and financial data. The personnel information includes application materials, payroll, offer letters, employee agreements, and any information used in making employment decisions. Intellectual property, such as patents, trademarks and new product plans, allows a business to gain economic advantage over its competitors. This intellectual property can be considered a trade secret; losing this information can be disastrous for the future of the company. The financial data, such as income statements, balance sheets, and cash flow statements of a company gives insight into the health of the company. Internet of Things and Big Data With the emergence of the Internet of Things (IoT), there is a lot more data to manage and secure. IoT is a large network of physical objects, such as sensors and equipment that extend beyond the traditional computer network. All th

Introduction to CyberSecurity for absolute beginners

Welcome When you were a child, did you ever imagine you as a Defender of the Universe just like Avengers or Justice league — recognize threats, protect the innocent, and do the right thing? Guess what,  you can make a career out of that! IT Security Expert IT Forensic Expert Information Security Expert Ethical Hacker All of these roles can be part of your work in the exciting, ever-changing, high-demand field of Cybersecurity. Course Overview As the course title states, the focus of this course is to explore the field of Cybersecurity. In this course, you will do the following: Learn the basics about how to be safe online. Learn about different types of malware and attacks, and how organizations are protecting themselves against these attacks. Explore the career options in Cybersecurity. By the end of this course, you will be more aware of the importance of being safe online, the potential consequences of cyberattacks,