top of page

Prelim Lessons

This section covers the prelim lessons which includes topics such as the five pillars of the subject, IoT hacking, phishing scams, website spoofing, malware, and ransomware.

8EPR3Vs-1024x768.jpg

Information

data that is processed

Assurance

A declaration that instills confidence

Security

Being free from danger or threat

5 Pillars of Information Assurance And Security

Authenticity A feeling of genuineness or legitimacy.

Confidentiality The state of keeping a secret or privacy.

Integrity Trustworthiness and staying true.

Availability The state of being present and accessible.

Non-Repudiation No party can deny the validity of information.

si-solution-digital-asset-protection-feature-1.jpg

Information Security: Protecting Your Data

Critical Assets:

  • Internet Source - Edge Devices

  • Host (Physical/Virtual) - Operating System

  • Applications - Mail Server, POS

  • DATA - The most valuable resource.

Traditional Tech Controls:

  1. Detective: Intrusion Detection System (IDS)

  2. Preventative: Intrusion Prevention System (IPS)

Cyber Threats

IoT Hacking

Infiltrating and controlling internet-connected devices, exploiting vulnerabilities for unauthorized access

Phishing Scams

Deceptive emails tricking users into sharing personal information or login credentials.

Website Spoofing

Creating fake websites that mimic legitimate ones to steal identities or sensitive information.

Malware

Malicious software that includes various types like viruses, worms, ransomware, spyware, adware, and botnets.

Ransomware

Encrypting data and demanding payment in exchange for the decryption key, causing significant financial and reputational damage.

bottom of page