Cybersecurity for Everyone
Welcome to our blog on cybersecurity for everyone! In today’s digital age, it’s crucial for individuals from all walks of life to understand the fundamentals of cyberspace. Whether you’re a novice or someone familiar with the topic, this post is for you. Let’s dive in!
Why CyberSecurity Matters
With the increasing reliance on technology, cyber threats have become more prevalent than ever. Whether it’s a phishing email, a malware-infected cybersecurity website, or a data breach, the consequences can be severe. However, by understanding the basics, we can protect ourselves and our online presence.
Common Cyber Threats
Let’s start by exploring some common cyber threats:
1. Phishing Attacks
Phishing attacks involve tricking individuals into sharing sensitive information such as passwords or credit card details. To protect yourself, always be cautious of suspicious emails or messages, and avoid clicking on unknown links.
2. Malware
Malware refers to malicious software designed to harm your computer or steal your personal information. To prevent malware infections, it’s essential to install and regularly update antivirus software.
3. Password Security
Strong passwords are the first line of defense against unauthorized access. Use a combination of letters, numbers, and special characters, and avoid using the same password across multiple accounts.
How to Enhance Your CyberSecurity
Now that we’ve covered some common threats, let’s discuss practical tips to enhance your cybersecurity:
1. Keep Software Up to Date
Regularly updating your software, including operating systems and applications, ensures that you have the latest security patches installed.
2. Enable Two-Factor Authentication
Two-factor authentication adds an extra layer of security by requiring a second form of verification, such as a unique code sent to your mobile device.
3. Educate Yourself
Be proactive in educating yourself about cybersecurity. Websites like Coursera offer courses specifically tailored to individuals of all skill levels, such as their “CyberSecurity for Everyone“ quiz. By participating in these courses, you can deepen your understanding and apply best practices.
Week 1 Quiz
- The definition for the term “cyber” includes the interplay between technology and human systems.
- True
- The primary challenge in managing the problem of cybersecurity is the complexity of technology and human processes that create vulnerabilities that can be exploited by threat actors.
- True
- The size and complexity of an organization’s publicly facing internet presence is known as the firm’s
- Attack Surface
Week 2 Quiz
- The origin and evolution of the internet was a product of:
- None of the above.
- The federal government’s role in developing the internet can best be described as:
- An early supporter of a radical concept that helped bridge an academic concept into a service leveraged by corporations and users around the world.
- The federal government was the chief developer of internet technology in the 1960s and 1970s.
- False
- The introduction of Senate Bill 2594, the “Super Computer Network Study Act” of 1986, by former president Al Gore helped:
- bring together industry, academia, and government in a joint effort to accelerate the development and deployment of gigabit networking
Week 3 Quiz
- The OSI model is:
- a) A representation of how information from a user is encapsulated, transmitted, and received across networks, and the global telecommunications infrastructure.
- The OSI Data model utilizes the concept of ____________ to move data from one point of the earth to another:
- encapsulation
- What is the key protocol that is leveraged to “provide the map” between networks?
- BGP
- Which definition best describes an Autonomous System?
- A collection of connected Internet Protocol (IP) under the control of one or more network operators
- Which definition best describes an Internet Exchange Point (IXP)?
- The physical infrastructure through which Internet Service Providers (ISPs) and Content Delivery Networks (CDNs) exchange Internet traffic between their networks
- The global telecommunication infrastructure is managed by nation-states that come to an agreement on where to invest and who should have access.
- False
- One major limitation of terrestrial microwave technology for use in long-haul communications is:
- The curvature of the earth prevents long-distance communications, without the need for a repeater
- Which description best describes The Internet Corporation for Assigned Names and Numbers (ICANN)?
- Internationally organized non-profit responsible for coordinating the maintenance and procedures of several databases related to the namespace on the internet
- Regional Internet Registries are:
- d) Both a and c
- The organization that focuses on short-term immediate needs for the efficient development of internet technology is:
- The Internet Engineering Task Force
Week 4 Quiz
- APT is an acronym for:
- Advanced Persistent Threat
- Which of the following is NOT considered a cyber threat actor?
- People who are curious about how technology works and report vulnerabilities to organizations and authorities they discover in their own devices and networks.
- A hacker who defaces a government website to protest the arrest of a political prisoner would be considered what type of threat actor?
- Hacktivist
- How would you best describe the capabilities and motives of an APT?
- They are heavily skilled, highly coordinated, and usually motivated by national objectives such as espionage.
- Fancy Bear is a threat actor that is best categorized as what type of threat actor?
- APT
- Criminal organizations engage in hacking activity primarily to:
- Illegally obtain monies from their victims
Week 5 Quiz
- The best way to describe hacking is as a single effort or activity conducted quickly and effortlessly by the threat actor.
- False
- Spear phishing is a tactic in which part of the Lockheed Martin Attack Kill Chain Model?
- Delivery
- Investigating the organizational chart of a target is part of which phase of the Lockheed Martin Attack Kill Chain Model?
- Reconnaissance
- IT System Administrators often can easily identify who attackers are and submit their identities to law enforcement for prosecution.
- False
- The phase of the hacking process where a threat actor’s code is executed onto a victim’s device is called:
- Exploitation
- Writing an exploit to leverage a vulnerability in the Windows 10 operating system would be included in which phase of the Lockheed Martin Cyber Kill Chain?
- Weaponization
- The use of _______ often makes it difficult for victims of cybersecurity attacks to identify the threat actor involved.
- proxy servers
- Attribution can be difficult for victims of cyber attacks primarily due to:
- The interplay between proxies, encryption, and threat actors hiding in plain network traffic
Week 6 Quiz
- A threat actor can only create direct effects on the victim cyber-attack can only generate impacts on the system it directly hacks.
- False
- The direct impact a threat actor has on a system is called a:
- Primary effect
- Secondary effects capture each of the following consequences except for:
- Decreased technical system performance
- Second-order effects are best described as:
- Effects on society that stem from actions taken by threat actors but whose actions generate failures in a critical organization’s systems and processes
- Determining if a cyber attack is a private problem versus a public concern is primarily a function of:
- The scope and severity of the second-order impacts on a community because of the loss of capabilities of systemically important organizations
- A firm’s stock price that falls 20% after a cyber event is an example of a:
- b) Secondary Effect
- Use the following Narrative for the questions that follow.
In 2017, a cyber attack against Maersk Line, a large container transport company, resulted in thousands of their devices being disrupted by the NotPetya ransomware by having the contents on those devices encrypted and made inaccessible to the cybersecurity company. The firm eventually rebuilt over 45,000 desktops and over 2,500 servers. Port operations in 76 countries were impacted, costing the cybersecurity company $300M in lost revenue and remediation costs. Hundreds of companies had their logistics chains stopped or severely degraded. Researchers have tied the distribution of the ransomware to efforts by a Russian APT.
According to the classification system presented, the primary effect to Maersk’s devices is best described as a:
- Data Attack
- The $300M dollar loss by Maersk Line would be considered a:
- Secondary Effect
- The degradation to the central European logistics supply chains stemming from this attack would be an example of a:
- Second Order Effect
If You want to know about "cybersecurity for everyone", then you can visit my original Course. The Link has been provided below.
Conclusion
In conclusion, cybersecurity is a crucial aspect of our digital lives. By being aware of common threats and implementing best practices, we can protect ourselves from potential harm. Remember to always stay informed, update your software, and use strong passwords. Taking small steps towards enhancing your cybersecurity can go a long way in safeguarding your digital presence.
Take responsibility for your online safety today, and let’s create a secure digital world together!