100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
College aantekeningen

Notes Lectures & Readings Cyber Threats, Security Studies Year 2

Beoordeling
-
Verkocht
-
Pagina's
138
Geüpload op
06-06-2025
Geschreven in
2023/2024

This document is a summary of all the notes from lectures and readings for the subject cyber threats, given in security studies year 2.












Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
6 juni 2025
Aantal pagina's
138
Geschreven in
2023/2024
Type
College aantekeningen
Docent(en)
.
Bevat
Alle colleges

Voorbeeld van de inhoud

Lecture 1
1.​ Millenium bug → coding error
-​ years only in two numbers
2.​ Cambridge analytica → profiling
-​ personalizing advertisements
3.​ OPCW → hack attempt
-​ russia accused of cyber-attack on chemical weapons watchdog
4.​ Diginotar → trust issue
-​ .
5.​ Maastricht University → ransomware attack
-​ .
6.​ Grindr → selling data
7.​ Stuxnet → sabotage
8.​

Cyber (in)security) as a threat to
-​ individuals
-​ groups/organizations
-​ nations
-​ international community

What is cyberspace?
→ composed of all the computerized networks in the world, as well as of all computerized
end points, including telecommunications networks, special purpose networks, the internet,
computer systems, and computer-based systems. The concept also includes the information
stored, processed, and transmitted on the devices and between these networks

What is cybersecurity?
→ comprises technologies, processes and controls that are designed to protect systems,
networks and data from cyber attacks
→ effective cyber security reduces the risk of cyber attacks, and protects organizations and
individuals from the unauthorized exploitation of systems,
networks and technologies

‘if it works, nothing happens’
-​ Is there a threat or are actors not interested?
-​ how can we tell?
-​ focus on measurable outcomes

Why do we care?
-​ protection of critical national infrastructure
-​ privacy and sensitive data
-​ financial reasons

Three-layer model
……

,Protection of Data: CIA-triad
-​ confidentiality
-​ integrity
-​ availability

Confidentiality
→ information only available to authorised entities
→ not only through hacking
→ also:
-​ wrong attachment in an email
-​ data screens in public displays
-​ materials not removed correctly (e.g. secure bins)

Integrity
→ can we trust the data, the whole data and nothing but the data?
→ no changes made to data without detection
-​ changing data
-​ adding data
-​ deleting data

Availability
→ data is available when needed
→ systems up and running
→ people who should have access, do have access

So what about the following?
1.​ Maastricht University (ransomware attack)
2.​ Grindr HIV (data sale)
3.​ Millennium bug (coding error)
4.​ Strava (publishing data)

Data backup
-​ what would you lose if your computer crashed?/ what if your laptop got stolen?/
house burns down

→ 3-2-1
-​ 3 copies
-​ 2 local
-​ 1 far away
→ dropbox etc., usb

Multi-factor authentication (usually 2)
→ something you:
-​ know (password)
-​ have (token, bank card)
-​ are (fingerprint, iris, facial)

,Upside: increased security
Downside: often a (bit more) fuss

VPN → Virtual Private Network
-​ secure connection over unsecure network
-​ When would you want one?
-​ Do you have one?
-​ What are possible dangers?

End-to-end encryption
-​ you already have it
-​ what is it
-​ do we want it

Public-key encryption
→ create pairs of keys: ‘public’ and ‘private’ key
-​ share the public key, keep private key secret
→ used to encrypt/decrypt messages (private key)

Encryption
-​ not just messages, but files as well
-​ helps with the CIA triad!
-​ also helps in starting a cyber attack…
-​ ransomware

, Readings Lecture 1
Meeuwisse
Cybersecurity for beginners

1.​ Cybersecurity & its origins
EMP = electromagnetic pulse
→ organizations collect information to gain power

Cybersecurity = the protection of digital devices and their communication channels to keep
them stable, dependable and reasonably safe from danger or threat. Usually the required
protection level must be sufficient to prevent or address unauthorized access or intervention
before it can lead to substantial personal, professional, organizational, financial and/or
political harm.

Digital device = any electronic appliance that can create, modify, archive, retrieve or transmit
information in an electronic format. Desktop computers, laptops, tablets, smartphones and
Internet-connected home devices are all examples of digital devices.

Defense in depth = the use of multiple layers of security techniques to help reduce the
chance of a successful attack. The idea is that if one security technique fails or is bypassed,
there are others that should address the attack. The latest (and correct) thinking on defense
in depth is that security techniques must also consider people and operations (for example
processes) factors and not just technology.

Virus = a form of malicious software that spreads by infecting (attaching itself) to other files
and usually seeks opportunities to continue that pattern. Viruses are now less common than
other forms of malware. Viruses were the main type of malware in very early computing. For
that reason, people often refer to something as a virus when it is technically another form of
malware

→ The transformation that gave rise to cybersecurity threats was mostly driven by one key
factor: Internet connection speeds became faster, cheaper and more widely adopted, even in
less economically developed countries.

Darwin effect = Those who adapted to the advantages of connected technologies were (and
are) gaining advantages and thriving. Those organizations that were (and are) not evolving
to use connected technologies are mostly shrinking or perishing.

Cryptanalysis = the art of examining ciphered information to determine how to circumvent
the technique that was used to encode or hide it. Analyzing ciphers.

The cloud = An umbrella term used to identify any technology service that uses software and
equipment not physically managed or developed by the person or organization (customer)
using it. This usually provides advantages of on-demand scalability at lower cost. Examples
€8,66
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
jhbos Leiden University College The Hague
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
19
Lid sinds
5 jaar
Aantal volgers
10
Documenten
24
Laatst verkocht
2 maanden geleden
Van Alles En Nog Wat

NL: hier vind je samenvattingen, opdracthen en meer! EN: this account sells summaries, papers, essays, notes and more!

3,5

2 beoordelingen

5
0
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen