Explain the basics of being safe online, including what cybersecurity is and its potential impact.
Explain the most common cyber threats, attacks and vulnerabilities.
Explain how organizations can protect their operations against these attacks.
Access various information and resources to explore the different career options in cybersecurity.
Module 1 - Introduction to Cybersecurity
Welcome to this module, which aims to help you understand
the growing need for cybersecurity.
Faced with an unprecedented surge in cyber attacks, never before has
the demand for cybersecurity professionals been so high.
Find out more about what cybercriminals want and what you can do
to ensure that a cyber threat never becomes a reality.
Chapter 1.2 - Organizational Data
Before you can start implementing best practices to safeguard organizational data, you need to know
what it is. In organizations like eLearning company @Apollo, there are two main types of data that
you should be aware of.
Let’s explore these now.
1.2.1 Types of Organizational Data
1.2.1.1 Traditional Data
Traditional data is typically generated and maintained by all organizations, big and small.
It includes the following:
Transactional data such as details relating to buying and selling, production activities
and basic organizational operations such as any information used to make employment
decisions.
Intellectual property such as patents, trademarks and new product plans, which allows an
organization to gain economic advantage over its competitors. This information is often
considered a trade secret and losing it could prove disastrous for the future of a
company.
Financial data such as income statements, balance sheets and cash flow statements, which
provide insight into the health of a company.
1.2.1.2 Internet of Things (IoT) and Big Data
IoT is a large network of physical objects, such as sensors, software and other equipment. All
of these ‘things’ are connected to the Internet, with the ability to collect and share data. And
given that storage options are expanding through the cloud and virtualization, it’s no surprise
that the emergence of IoT has led to an exponential growth in data, creating a new area of
interest in technology and business called 'Big Data'.
1.2.2 The Cube
The McCumber Cube is a model framework created by John McCumber in 1991 to help organizations
establish and evaluate information security initiatives by considering all of the related
factors that impact them. This security model has three dimensions:
ordered list type="1"
The foundational principles for protecting information systems.
The protection of information in each of its possible states.
The security measures used to protect data.
1.2.3 What Do You Think?
A concerned customer has forwarded on what they believe to be a fraudulent email. It looks as if it
has been sent by @Apollo but something appears a little 'phish-y.'
Take a look at the email. Which of the following indicates that it is in fact a phishing email?
Four answers are correct
Email address
correct
Customer name
wrong
Link URL
correct
The language, spelling and grammar
correct
Graphics
correct
Hints
Closer inspection reveals:
that the sender's email domain is spelled incorrectly
that the link URL is not pointing to @Apollo's website
poor language, spelling and grammar
low quality, pixelated graphics
Phishing emails can be hard to detect. For example, they will often address you by name to
appear legitimate, but hackers can easily find this information on the Internet. So, it’s
important to stay alert and think before you click.
1.2.4 Is This for Real?
Yes, phishing is very common and often works. For example, in August 2020, elite gaming brand Razer
experienced a data breach which exposed the personal information of approximately 100,000 customers.
A security consultant discovered that a cloud cluster (a group of linked servers providing data
storage, databases, networking, and software through the Internet), was misconfigured and exposed a
segment of Razer’s infrastructure to the public Internet, resulting in a data leak.
It took Razer more than three weeks to secure the cloud instance from public access, during which
time cybercriminals had access to customer information that could have been used in social
engineering and fraud attacks, like the one you uncovered just now.
Organizations therefore need to take a proactive approach to cloud security to ensure that sensitive
data is secured.
1.2.5 Data Security Breaches
The implications of a data security breach are severe, but they are becoming all too common.
If you are ever faced with a similar situation, quickly verify if your information was compromised,
so that you can minimize the impact. Keep in mind that, in a time of crisis, you may be tricked into
using unauthorized websites.
Always be vigilant when providing personally identifiable information over the Internet. Check your
credit reports regularly and immediately report any false information, such as applications for
credit that you did not initiate or purchases on your credit cards that you did not make.
1.2.6 Consequences of a Security Breach
These examples show that the potential consequences of a security breach can be severe.
Select the headings for a summary of these impacts.
Reputational damage
A security breach can have a negative long-term impact on an organization’s reputation that has
taken years to build. Customers, particularly those who have been adversely affected by the
breach, will need to be notified and may seek compensation and/or turn to a reliable and secure
competitor. Employees may also choose to leave in light of a scandal.
Depending on the severity of a breach, it can take a long time to repair an organization’s
reputation.
Vandalism
A hacker or hacking group may vandalize an organization’s website by posting untrue information.
They might even just make a few minor edits to your organization’s phone number or address,
which can be trickier to detect.
In either case, online vandalism can portray unprofessionalism and have a negative impact on
your organization’s reputation and credibility.
Theft
A data breach often involves an incident where sensitive personal data has been stolen.
Cybercriminals can make this information public or exploit it to steal an individual’s money
and/or identity.
Loss of revenue
The financial impact of a security breach can be devastating. For example, hackers can take down
an organization’s website, preventing it from doing business online. A loss of customer
information may impede company growth and expansion. It may demand further investment in an
organization’s security infrastructure. And let’s not forget that organizations may face large
fines or penalties if they do not protect online data.
Damaged intellectuel property
A security breach could also have a devastating impact on the competitiveness of an
organization, particularly if hackers are able to get their hands on confidential documents,
trade secrets and intellectual property.
Despite the best of intentions and all the safeguards you can put in place, protecting organizations
from every cyberattack is not feasible.
Cybercriminals are constantly finding new ways to attack and, eventually, they will succeed.
When they do, it will be up to cybersecurity professionals, like you, to respond quickly to minimize its
impact.