100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Notas de lectura

Notes Lectures & Readings Cyber Threats, Security Studies Year 2

Puntuación
-
Vendido
-
Páginas
138
Subido en
06-06-2025
Escrito en
2023/2024

This document is a summary of all the notes from lectures and readings for the subject cyber threats, given in security studies year 2.

Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
6 de junio de 2025
Número de páginas
138
Escrito en
2023/2024
Tipo
Notas de lectura
Profesor(es)
.
Contiene
Todas las clases

Temas

Vista previa del contenido

Lecture 1
1.​ Millenium bug → coding error
-​ years only in two numbers
2.​ Cambridge analytica → profiling
-​ personalizing advertisements
3.​ OPCW → hack attempt
-​ russia accused of cyber-attack on chemical weapons watchdog
4.​ Diginotar → trust issue
-​ .
5.​ Maastricht University → ransomware attack
-​ .
6.​ Grindr → selling data
7.​ Stuxnet → sabotage
8.​

Cyber (in)security) as a threat to
-​ individuals
-​ groups/organizations
-​ nations
-​ international community

What is cyberspace?
→ composed of all the computerized networks in the world, as well as of all computerized
end points, including telecommunications networks, special purpose networks, the internet,
computer systems, and computer-based systems. The concept also includes the information
stored, processed, and transmitted on the devices and between these networks

What is cybersecurity?
→ comprises technologies, processes and controls that are designed to protect systems,
networks and data from cyber attacks
→ effective cyber security reduces the risk of cyber attacks, and protects organizations and
individuals from the unauthorized exploitation of systems,
networks and technologies

‘if it works, nothing happens’
-​ Is there a threat or are actors not interested?
-​ how can we tell?
-​ focus on measurable outcomes

Why do we care?
-​ protection of critical national infrastructure
-​ privacy and sensitive data
-​ financial reasons

Three-layer model
……

,Protection of Data: CIA-triad
-​ confidentiality
-​ integrity
-​ availability

Confidentiality
→ information only available to authorised entities
→ not only through hacking
→ also:
-​ wrong attachment in an email
-​ data screens in public displays
-​ materials not removed correctly (e.g. secure bins)

Integrity
→ can we trust the data, the whole data and nothing but the data?
→ no changes made to data without detection
-​ changing data
-​ adding data
-​ deleting data

Availability
→ data is available when needed
→ systems up and running
→ people who should have access, do have access

So what about the following?
1.​ Maastricht University (ransomware attack)
2.​ Grindr HIV (data sale)
3.​ Millennium bug (coding error)
4.​ Strava (publishing data)

Data backup
-​ what would you lose if your computer crashed?/ what if your laptop got stolen?/
house burns down

→ 3-2-1
-​ 3 copies
-​ 2 local
-​ 1 far away
→ dropbox etc., usb

Multi-factor authentication (usually 2)
→ something you:
-​ know (password)
-​ have (token, bank card)
-​ are (fingerprint, iris, facial)

,Upside: increased security
Downside: often a (bit more) fuss

VPN → Virtual Private Network
-​ secure connection over unsecure network
-​ When would you want one?
-​ Do you have one?
-​ What are possible dangers?

End-to-end encryption
-​ you already have it
-​ what is it
-​ do we want it

Public-key encryption
→ create pairs of keys: ‘public’ and ‘private’ key
-​ share the public key, keep private key secret
→ used to encrypt/decrypt messages (private key)

Encryption
-​ not just messages, but files as well
-​ helps with the CIA triad!
-​ also helps in starting a cyber attack…
-​ ransomware

, Readings Lecture 1
Meeuwisse
Cybersecurity for beginners

1.​ Cybersecurity & its origins
EMP = electromagnetic pulse
→ organizations collect information to gain power

Cybersecurity = the protection of digital devices and their communication channels to keep
them stable, dependable and reasonably safe from danger or threat. Usually the required
protection level must be sufficient to prevent or address unauthorized access or intervention
before it can lead to substantial personal, professional, organizational, financial and/or
political harm.

Digital device = any electronic appliance that can create, modify, archive, retrieve or transmit
information in an electronic format. Desktop computers, laptops, tablets, smartphones and
Internet-connected home devices are all examples of digital devices.

Defense in depth = the use of multiple layers of security techniques to help reduce the
chance of a successful attack. The idea is that if one security technique fails or is bypassed,
there are others that should address the attack. The latest (and correct) thinking on defense
in depth is that security techniques must also consider people and operations (for example
processes) factors and not just technology.

Virus = a form of malicious software that spreads by infecting (attaching itself) to other files
and usually seeks opportunities to continue that pattern. Viruses are now less common than
other forms of malware. Viruses were the main type of malware in very early computing. For
that reason, people often refer to something as a virus when it is technically another form of
malware

→ The transformation that gave rise to cybersecurity threats was mostly driven by one key
factor: Internet connection speeds became faster, cheaper and more widely adopted, even in
less economically developed countries.

Darwin effect = Those who adapted to the advantages of connected technologies were (and
are) gaining advantages and thriving. Those organizations that were (and are) not evolving
to use connected technologies are mostly shrinking or perishing.

Cryptanalysis = the art of examining ciphered information to determine how to circumvent
the technique that was used to encode or hide it. Analyzing ciphers.

The cloud = An umbrella term used to identify any technology service that uses software and
equipment not physically managed or developed by the person or organization (customer)
using it. This usually provides advantages of on-demand scalability at lower cost. Examples
$10.47
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
jhbos Leiden University College The Hague
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
19
Miembro desde
5 año
Número de seguidores
10
Documentos
24
Última venta
2 meses hace
Van Alles En Nog Wat

NL: hier vind je samenvattingen, opdracthen en meer! EN: this account sells summaries, papers, essays, notes and more!

3.5

2 reseñas

5
0
4
1
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes