1. Understanding Cyber Security
● Cyber security = protecting systems, networks, and data from attacks, damage, or
unauthorized access.
● Key goals: Confidentiality, Integrity, Availability (CIA Triad).
2. Types of Cyber Threats
● Malware → viruses, worms, trojans, spyware, ransomware.
● Phishing → fake emails/websites tricking users.
● Social Engineering → manipulating people into giving info.
● DDoS Attacks → overwhelming servers to cause downtime.
● Hacking → exploiting system weaknesses.
● Insider Threats → employees misusing access.
3. Impacts of Cyber Attacks
● Financial loss → theft, fines, compensation.
● Reputation damage → loss of customer trust.
● Operational disruption → downtime, lost productivity.
● Legal consequences → data protection laws (GDPR).
4. Preventative Measures
● Technical Controls:
○ Firewalls
○ Anti-virus & anti-malware
○ Encryption
● Cyber security = protecting systems, networks, and data from attacks, damage, or
unauthorized access.
● Key goals: Confidentiality, Integrity, Availability (CIA Triad).
2. Types of Cyber Threats
● Malware → viruses, worms, trojans, spyware, ransomware.
● Phishing → fake emails/websites tricking users.
● Social Engineering → manipulating people into giving info.
● DDoS Attacks → overwhelming servers to cause downtime.
● Hacking → exploiting system weaknesses.
● Insider Threats → employees misusing access.
3. Impacts of Cyber Attacks
● Financial loss → theft, fines, compensation.
● Reputation damage → loss of customer trust.
● Operational disruption → downtime, lost productivity.
● Legal consequences → data protection laws (GDPR).
4. Preventative Measures
● Technical Controls:
○ Firewalls
○ Anti-virus & anti-malware
○ Encryption