Skip to content

Latest commit

 

History

History
38 lines (27 loc) · 1.64 KB

2 The evolution of cybersecurity.md

File metadata and controls

38 lines (27 loc) · 1.64 KB

3 malware examples

  • Brain virus: 1986, Alvi brothers, accidentally infected disks too.
  • Morris worm: Meant to install on all PCs to count, but accidentally reinstalled infinitely until ran out of memory. Led to creation of CERTs (Computer Emergency Response Teams).
  • LoveLetter (aka "I Love You"), already known. Sent to all email contacts & collected passwords. Example of social engineering.

Types of phishing

  • BEC (Business Email Compromise): Faking / hacking a colleague email.
  • Spear phishing: Targeting specific user(s).
  • Whaling: Executives only.
  • Vishing: Fake voice comms.
  • Smishing: Fake SMSs.

What to do during a breach?

  • Keep cool
  • Be the "pause" in a conversation
  • STOP the breach, then investigate it

8 security domains (defined by CISSP)

  1. Security and risk management: Security goals and objectives, risks, compliance, etc.
  2. Asset security: Securing physical and digital assets.
  3. Security architecture & engineering: Optimise data security w/ tools, systems, processes.
  4. Comms & network security: Securing (and managing) physical networks & wireless comms.
  5. Identity & access mgmt: Validating identities, roles, etc.
  6. Security assessment & testing: Audits, testing, analysing data.
  7. Security operations: Investigations, preventative measures.
  8. Software development security: Coding securely!

Feedback

Nice focus on examples now we're more "into the meat". Example is briefly described, then the relevant topic introduced. Nice!

Quizzes during videos help stay engaged, and being able to click transcript to load that part is great.

Different types of activity (reading, video, quiz, flashcards) keep it fresh.