Introduction to
Cyber Security
Cyber security is vital to protect our digital lives. It involves safeguarding
our information and systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.
by Bhumi Naik
Importance of Cyber
Security
1 Privacy Protection 2 Business Continuity
Cyber security ensures the Protecting sensitive data
confidentiality of personal and systems is essential for
data, preventing identity uninterrupted business
theft and other privacy operations and preventing
breaches. financial losses.
3 National Security 4 Global Stability
Cyber security plays a Protecting global networks
crucial role in safeguarding and critical infrastructure
national infrastructure and ensures stability and
critical systems from prevents disruptions to
cyberattacks. essential services.
Common Cyber Threats
Malware Phishing
Malicious software designed Deceptive emails or websites
to harm computer systems, that trick users into revealing
steal data, or disrupt sensitive information like
operations, including viruses, passwords or credit card
worms, and ransomware. details.
Social Engineering Denial of Service
(DoS)
Manipulating people into
revealing confidential Overwhelming a server or
information or granting network with traffic,
access to systems through rendering it unavailable to
psychological tactics. legitimate users.
Protecting Devices and Networks
Firewall Antivirus Software Security Updates
A software or hardware barrier that Detects and removes malware from Regularly installing software updates
blocks unauthorized access to a computers, protecting against viruses, patches security vulnerabilities,
network or device. worms, and other threats. strengthening system defenses.
Password Management
Best Practices
Use Strong Passwords
1 Combine uppercase and lowercase letters, numbers, and
symbols for a complex and secure password.
Avoid Reusing Passwords
2 Use different passwords for each online account to limit
damage in case one is compromised.
Enable Multi-Factor Authentication
3 Adds an extra layer of security by requiring users to
provide multiple forms of identification.
Use a Password Manager
4 Securely stores and manages passwords, simplifying
access and enhancing security.
Recognizing and Avoiding
Phishing Attacks
Suspicious Emails
1
Look for typos, grammatical errors, or unfamiliar
senders, which are red flags.
Urgent Requests
2
Phishing emails often create a sense of urgency to
pressure users into clicking links or providing
information.
Verify Links
3
Hover over links before clicking to check if the
destination URL matches the expected website.
Report Suspicious Activity
4
If you receive a suspicious email, report it to your IT
department or the relevant authorities.
Securing Wireless
Connections
Strong Password Encryption
Use a strong and unique password Enable WPA2 or WPA3 encryption
for your wireless network to to scramble data transmitted over
prevent unauthorized access. your wireless network.
Hide SSID Regular Updates
Conceal your network name (SSID) Keep your router firmware
to make it less visible to potential updated to patch security
attackers. vulnerabilities and improve
performance.
Backing Up Data and
Recovering from Incidents
Regular Backups Create regular backups of
important data to ensure
recovery in case of loss or
damage.
Offline Storage Store backups on external
drives or cloud services to
protect against local system
failures.
Incident Response Plan Develop a plan to address
security breaches, including
steps to contain, recover, and
prevent future incidents.
Staying Up-to-Date with Security Updates
Software Updates Mobile Updates
Install security patches and updates for operating systems, Update your phone's operating system and apps regularly to
applications, and antivirus software to address known keep your device protected.
vulnerabilities.
Cyber Security Resources
and Next Steps
To learn more, explore resources like the National Institute of Standards
and Technology (NIST), SANS Institute, and the Cybersecurity and
Infrastructure Security Agency (CISA). Stay informed about emerging
threats and best practices to protect your digital life.