Prelim Lessons
This section covers the prelim lessons which includes topics such as the five pillars of the subject, IoT hacking, phishing scams, website spoofing, malware, and ransomware.

Information
data that is processed
Assurance
A declaration that instills confidence
Security
Being free from danger or threat
5 Pillars of Information Assurance And Security
Authenticity A feeling of genuineness or legitimacy.
Confidentiality The state of keeping a secret or privacy.
Integrity Trustworthiness and staying true.
Availability The state of being present and accessible.
Non-Repudiation No party can deny the validity of information.

Information Security: Protecting Your Data
Critical Assets:
-
Internet Source - Edge Devices
-
Host (Physical/Virtual) - Operating System
-
Applications - Mail Server, POS
-
DATA - The most valuable resource.
Traditional Tech Controls:
-
Detective: Intrusion Detection System (IDS)
-
Preventative: Intrusion Prevention System (IPS)
Cyber Threats
IoT Hacking
Infiltrating and controlling internet-connected devices, exploiting vulnerabilities for unauthorized access
Phishing Scams
Deceptive emails tricking users into sharing personal information or login credentials.
Website Spoofing
Creating fake websites that mimic legitimate ones to steal identities or sensitive information.
Malware
Malicious software that includes various types like viruses, worms, ransomware, spyware, adware, and botnets.
Ransomware
Encrypting data and demanding payment in exchange for the decryption key, causing significant financial and reputational damage.