Cybersecurity Basics: Beginner’s Guide

Sainapei Lenapunya - May 27 - - Dev Community

Table of Content:

  1. Definition
  2. Requirements
  3. CIA Triad
  4. The Importance of Cybersecurity
  5. The Advantages of Cybersecurity
  6. Disadvantages of Cybersecurity
  7. Common Threats
  8. Common Types of Attacks
  9. Vulnerabilities
  10. Conclusion
  11. Useful Resources

  12. Definition

Cybersecurity is the process of safeguarding your devices, data, and online presence against unauthorized access, use, disclosure, disruption, alteration, or destruction. It's like installing a security system in your digital life to protect your data.

  1. Requirements

Generally, you need some knowledge in some areas to understand cybersecurity as it encompasses several types of skills and basics . These may include:

  • Basic Computer Skills
  • Networking Knowledge
  • Programming Knowledge
  • Understanding of Security Principles
  • Information Security
  • System Security
  • Network Security
  1. CIA Triad

The security of any organization starts with three principles: Confidentiality, Integrity and Availability. Next in this cyber security for beginners tutorial we will learn about the CIA Triad, which has served as the industry standard for computer security since the time of first mainframes.

Fig: CIA triad

  • Confidentiality-The principle of confidentiality asserts that only authorized parties can access sensitive information and functions. Example: military secrets.

  • Integrity- The principle of integrity asserts that only authorized people and means can alter, add, or remove sensitive information and functions. Example: a user entering incorrect data into a database.

  • Availability-The principle of availability asserts that systems, functions, and data must be available on-demand according to agreed-upon parameters based on levels of service.

  1. Importance of Cybersecurity:
  2. Safeguards Personal Information- Prevents theft and illegal access to sensitive data, including financial, health, and personal information

  3. Maintains Reputation-Prevents security mishaps or data exposures that could erode trust among stakeholders, clients, and customers.

  4. Boosts Output-Prevents downtime brought on by cyber incidents that could impair production by guaranteeing the uninterrupted operation of networks and systems.

  5. Supports Remote Work-Enables flexible work schedules without sacrificing security by providing remote workers with secure access to company networks and data.

  6. Regulation Adherence-Assists companies in meeting legal and regulatory obligations around cybersecurity and data protection.

  7. Strengthens Cyber Stance-Strengthens an organization's defenses against cyber threats and assaults by enhancing its overall cybersecurity posture.

  8. Better Data Handling- Guarantees integrity, confidentiality, and availability through secure storage, transmission, and processing.

  9. Advantages of Cybersecurity

Cybersecurity is no longer an optional issue; it is a necessary expenditure for businesses of all sizes. Here are some significant benefits of establishing effective cybersecurity measures, backed up by research and articles:

  1. Cost Savings-Data breaches can be quite costly. According to the IBM Cost of a Data Breach Report 2023 (https://www.ibm.com/reports/data-breach), the global average overall cost of a data breach in 2023 is $4.35 million. Strong cybersecurity may considerably reduce the danger of such breaches, saving your firm significant money.

  2. Competitive Advantage-According to a PwC research, 73% of customers prefer to do business with companies that prioritize data protection. Demonstrating a commitment to cybersecurity increases trust among customers and partners, giving a competitive advantage.

  3. Innovation support-A 2022 Harvard Business Review article (https://hbr.org/insight-center/the-future-of-cybersecurity) addresses how cybersecurity is critical for driving innovation. By building a secure environment, businesses may confidently explore new technologies and digital transformation efforts without fear of security concerns.

  4. Customer confidence-According to an Accenture study (https://www.accenture.com/us-en/case-studies/about/creating-culture-security), organizations with excellent cybersecurity procedures have higher customer satisfaction and loyalty. Customers feel more comfortable exchanging information and doing business with a safe corporation.

  5. Risk Management-A 2021 report by the Cybersecurity and Infrastructure Security Agency (CISA) https://www.cisa.gov/topics/risk-management emphasizes the necessity of cybersecurity risk management in proactively identifying, assessing, and mitigating cyber threats. Implementing a strong cybersecurity plan may greatly reduce the likelihood and effect of security breaches on your company.

  6. Business continuity-Uninterrupted Operations, that is cyberattacks can disrupt business operations and result in considerable downtime. A 2023 analysis by Datto https://www.linkedin.com/pulse/what-2023-datto-ransomware-report-says-SMBS-dale-shulmistra The average downtime caused by a ransomware attack is 21 days. Strong cybersecurity procedures can assist ensure that your company can continue to operate even after a hack happens.

  7. Disadvantages of cybersecurity

While cybersecurity provides enormous benefits, there are some obstacles to consider, as backed by research and articles-:

  1. Needs Continuous Learning- the cybersecurity landscape is ever-changing, with new threats appearing all the time. The 2022 ISC Cybersecurity Workforce Report (https://www.isc2.org/research) emphasizes the importance of cybersecurity experts being current on the latest threats and vulnerabilities. Your security personnel must study and train on a continuous basis.

  2. Complicated to Setup- i.e. specific skills- Implementing effective cybersecurity measures frequently necessitates specific knowledge and expertise. A 2021 article in SearchSecurity (Why Cybersecurity is Hard: Challenges Businesses Face) https://www.techtarget.com/searchsecurity/ examines the difficulty of establishing security architectures and technologies. Businesses may need to hire cybersecurity professionals or outsource these tasks, which can be costly.

  3. Potential performance impact- Certain cybersecurity tools and processes may use system resources, affecting performance. Finding the correct combination of security and performance is critical. There are two resources to consider,
    NSS Labs' 2023 Endpoint Detection and Response (EDR) Group Test (https://nsslabs.com/tested-technologies/endpoint-detection-response/). compared the performance of several endpoint detection and response (EDR) solutions.

A 2017 report by the Cybersecurity and Infrastructure Security Agency (CISA) (The Impact of Cybersecurity on Small Businesses). https://www.cisa.gov/cyber-guidance-small-companies investigates the trade-offs between security controls and system performance, focusing on small firms.

  1. Talent Shortage-There is a global scarcity of cybersecurity specialists. According to Cybersecurity Ventures' 2023 research (Cybersecurity positions Market 2023-2028 Forecast) https://cybersecurityventures.com/stats/, there will be 3.3 million unfilled cybersecurity positions in the world by 2023. This shortfall can make it challenging for businesses to find and keep the talent they require.

  2. High Costs- Cybersecurity necessitates continual investments in technology, training, and personnel. This can be a challenge for small and medium-sized businesses (SMBs) with limited resources.

Ponemon Institute (2023 Cost of a Data Breach Report) https://www.ponemon.org/ investigated the financial impact of data breaches, emphasizing the potential cost savings associated with strong cybersecurity policies.

A report by Gartner (Cost Optimization for Security Programs) https://www.gartner.com/en/insights/cost-optimization provides recommendations for optimizing cybersecurity spending, particularly for organizations with limited budgets.

  1. Common Threats
  2. Phishing scams
    These are deceptive emails or messages that attempt to fool one into providing personal information or clicking on dangerous links.

    Example: You receive an email that appears to be from your bank, warning about suspicious activity on your account. The email prompts you to click a link and log in to verify your identity. However, the link leads to a fake website designed to steal your login credentials.

    Estimated Occurrences- Millions per year. According to a report by PhishLabs https://www.proofpoint.com/us/resources/threat-reports/state-of-phish, there were over 26.8 billion phishing attempts detected in 2022.

  3. Malware

    This is a malicious software (viruses, worms, etc.) that can infect your devices, steal data, or disrupt operations(Stytz & Banks, 2006).

    Example: You download a seemingly harmless free software program from an untrusted source. Once installed, the program secretly installs malware on your computer that encrypts your files, demanding a ransom payment to decrypt them. This is a common example of ransomware, a specific type of malware.

    Estimated Occurrences: Billions per year. A report by Cybersecurity Ventures https://cybersecurityventures.com/ransomware-report-2021/ predicts global ransomware damage costs will reach $26 billion USD by 2026.

  4. Computer hacking
    It alludes to attempts made without authorization to enter networks or computer systems.

    Example: Hackers exploit a security vulnerability in a company's database, gaining access to customer information such as credit card details and personal data. This information can be sold on the black market or used for further fraudulent activities.

    Estimated Occurrences: Millions per year. According to the Identity Theft Resource Center https://www.idtheftcenter.org/post/2022-annual-data-breach-report-reveals-near-record-number-compromises/, there were over 1,800 data breaches reported in the US alone in 2022.

  5. Social Engineering-Deception, Not Force.
    This is a method used by hackers to trick people into disclosing sensitive information or performing activities that jeopardize their security. Unlike hacking, which exploits technological flaws in systems, social engineering preys on human trust and vulnerability.

    Example: You receive a phone call from someone claiming to be from your internet service provider (ISP). They inform you of a problem with your account and request remote access to your computer to fix it. In reality, the caller is a social engineer trying to gain control of your device and potentially steal sensitive information.

  6. Vishing
    This is a short for "voice phishing". A type of social engineering attack where cyber criminals use phone calls to trick individuals into providing sensitive information or performing actions that compromise their security. The attackers typically pretend to be representatives from legitimate organizations such as banks, government agencies, or tech support services to gain the victim's trust.

    Example: You receive a voicemail from someone claiming to be from the government, stating that there's an issue with your tax return and urging you to call a specific number to resolve it. The number connects you to a scammer who attempts to pressure you into revealing your social security number or making a fraudulent payment.

    Estimated Occurrences: Millions per year. The Federal Trade Commission (FTC) https://reportfraud.ftc.gov/ receives hundreds of thousands of vishing complaints annually in the US.

  7. Smishing

Like phishing emails, smishing employs SMS text messages to deceive victims. You may receive a notice about a bogus parcel delivery issue or a tempting offer that demands you to click on a malicious website or supply sensitive information.

Example: You receive a text message claiming you won a prize in a contest you never entered. The message includes a link to a website where you need to provide your personal details to claim the prize. Clicking the link takes you to a fake website designed to steal your information.

  1. Pretexting
    In this case, the attacker fabricates a story to earn your trust and access to sensitive data. For example, they could act as a tech support agent calling to "fix" an issue with your computer, eventually luring you into giving them remote access or divulging passwords.

    Example: You receive a call from someone claiming to be from a charity organization. They provide a sob story and pressure you into donating money over the phone. However, the caller is a fraudster who will pocket the donation instead of directing it to a legitimate cause.

  2. Common Types of Attacks:

There are mainly five types of attacks-;

  1. Distributed denial of service(DDoS) - Through flooding the traffic used to access resources, it is an attack designed to prevent a user from using those resources. Every bot under the control of a botnet is managed by a botnet controller. The attacker instructs the botnet controller to launch a bot attack on a server, flooding it with bot traffic. The website's traffic will be so heavy that a person attempting to visit it will be unable to do so.

  2. Email attacks - there are three types of Email attacks

- Phishing- Usually through email, the attackers sends bait, it motivates people to divulge personal information

- Spoofing- The assailant posses as a different individual or entity and sending you an email purporting to be authentic.

- Email Attachment- Emails can be used to send files. These files could be documents, files, audio or pictures. You receive an email from attackers urging you to open the attached files.
Enter fullscreen mode Exit fullscreen mode
  1. Password attacks -

There are five different kinds of password assaults that exist-:

  • Dictionary attack: With this technique, we use the dictionary to handle all potential passwords.

  • Brute force: This technique uses trial and error to figure out how to decode the data or password. It takes the longest to execute this attack.

  • Keylogger: A keylogger does exactly what its name implies—it logs every keystroke made on a keyboard. Keyloggers are used by most hackers to obtain passwords and account information.

  • Shoulder surfing: By peering over the user's shoulder, the attackers can see what's on their keyboard.

  • Rainbow table: Precomputed hash values can be found in rainbow tables. Attackers utilize this table to determine the user's password.

  1. Malware Attack
    • This is a malicious program or software that disrupts or damages the computer.
- There are various types of malware.
    - Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator. An example of a virus is the Melissa virus.

    - Worms: These are standalone programs that run independently and infect systems. For example, W32.Alcra.F is a worm that propagates through network share devices.
Enter fullscreen mode Exit fullscreen mode

Essential Practices.
1. Use of Strong Passwords
Create unique and complex passwords for each online account(CISA, 2023). Consider using a password manager to help you keep track.

2.  Regular Software Updates
Regularly update your operating systems, browsers, and software applications to patch security vulnerabilities.

3.  Beware of Suspicious Links
Don't click on links or attachments in emails or messages from unknown senders.

4.  Secure Wi-Fi
Avoid using public Wi-Fi for sensitive activities like online banking. If you must use it, consider a VPN (Virtual Private Network) for added security.

5. Antivirus Software
 Install and maintain reputable antivirus software on your devices to help detect and prevent malware infections.
Enter fullscreen mode Exit fullscreen mode

Internal threats consists of-:
1.Employee Negligence: Unintentional actions or mistakes made by employees, such as clicking on malicious links or failing to follow security protocols, which can lead to security breaches.

2.Insider Threats: Malicious actions taken by individuals within an organization, such as disgruntled employees or contractors, to steal data, sabotage systems, or cause harm.
Enter fullscreen mode Exit fullscreen mode
  1. Vulnerabilities

Explaining common vulnerabilities in systems and networks helps users understand the potential weak points that cyber attackers exploit, enabling them to develop effective strategies to safeguard against such threats and enhance overall cybersecurity.

  1. Conclusion

By implementing these foundational cybersecurity practices, you can significantly reduce your risk of falling victim to cyber threats. Remember, cybersecurity is an ongoing process, so stay informed and adapt to new challenges as they arise.

  1. Useful Resources

CISA. (2023). Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA. Www.cisa.gov. https://www.cisa.gov/topics/cybersecurity-best-practices

Stytz, M. R., & Banks, S. B. (2006). Personal privacy, information assurance, and the threat posed by malware techology. Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE. https://doi.org/10.1117/12.665344

Top 8 Cyber Security Vulnerabilities. (n.d.). Check Point Software. Retrieved May 23, 2024, from https://www.checkpoint.com/cyber-hub/cyber-security/top-8-cyber-security-vulnerabilities

. . . . . . . . . . .