Module 1: Introduction to Cybersecurity
Part 1: Understanding Cybersecurity
Objective: To provide a foundational understanding of what cybersecurity is, its importance, and the common threats faced in the digital world.
Content:
- Definition and Scope of Cybersecurity: Introduce cybersecurity as the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
- Importance of Cybersecurity: Discuss the growing reliance on technology and the internet in both personal and professional life, making cybersecurity crucial for protecting everything from personal data to critical national infrastructure.
- Common Cyber Threats:
- Viruses and Malware: Programs designed to damage or do other unwanted actions on a computer system.
- Ransomware: A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Phishing Attacks: Fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- Data Breaches: Incidents in which information is stolen or taken from a system without the knowledge or authorization of the system's owner.
- DDoS Attacks: Distributed Denial of Service attacks that overwhelm a system’s resources so that it cannot respond to service requests.
Activities:
- Case Study Analysis: Review real-life examples of significant cybersecurity breaches and their impacts.
- Discussion: How does cybersecurity impact your personal and professional life?
Part 2: Cybersecurity Terminologies
Objective: To familiarize participants with common cybersecurity terminologies, enhancing their understanding of discussions and literature on the subject.
Content:
- Key Terms and Their Meanings:
- VPN (Virtual Private Network): A service that protects your internet connection and privacy online by creating an encrypted tunnel for your data, hiding your IP address, and allowing you to use public Wi-Fi hotspots safely.
- Encryption: The process of converting information or data into a code, especially to prevent unauthorized access.
- Malware: Malicious software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- Phishing: The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Firewall: A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
- Two-Factor Authentication (2FA): A security process in which users provide two different authentication factors to verify themselves, enhancing the security of their login credentials and the resources they can access.
Activities:
- Quiz: Test understanding of key terms with a short quiz.
- Practical Exercise: Set up two-factor authentication for a personal account.
Part 3: Risks and Vulnerabilities