A04-001-introduction.md

'Securing data is simple and easy, the internet has multiple choices and guides to do that.'

Introduction on How to Protect Data

This course focuses heavily on how you can make different security controls and protection measures a part of your daily internet surfing. These functions quite simple and should be easy to learn.

The most effective protection against cyberattacks would be deleting any sort of contact from the internet, but in this day and age, it's quite difficult to do. A lot of services and products are online, we communicate through social media, share pictures, watch movies, and play games against others. Many aspects of entertainment reside on the internet, but so does handling official things like bank transactions and buying essential things.

Having a basic concept of how to protect our data and privacy is much easier when we have basic knowledge of security controls and actions.

Subjects On The Course

Tähän tulee Accordion-komponentti, jonka tiedot alla

Security Measures And Controls Security measures are divided into two lessons, as the subject is quite large, how to keep yourself safe and how to secure data. While surfing the internet, we should be aware of the security risks that we may encounter.

Security controls are common actions that organizations survey and implement the proper protection measures.

Encryption Encrypting data scramble it into something that outsiders can't read or view. This protects the privacy and prevents the data's manipulation. When we secure our data, we block any maleficent person to use the data for possible financial gain or other harm.

IDS And IPS Intrusion detection systems and intrusion prevention systems are there to monitor network traffic and packages moving through it. When a threat is detected, it causes an alarm to be sent to the user and also takes automated actions against the threat.

Tähän tulee Column Grid -komponentti, jonka tiedot alla

Firewalls monitor ongoing traffic on the network and block the attempted hackings.

Antivirus software detects and destroys viruses. They work on the background independently.

Youtube-video: https://www.youtube.com/watch?v=H3XpuDN4Tsc

Tähän tulee Multiple Responses -tehtäväkomponentti

Tähän tulee Fill in the Blanks -tehtäväkomponentti

Encryption

The course will also present how you can encrypt files by yourself. These small tools might come in handy if you need to make sure that outsiders won't get to view your data.

In the Encryption Exercises-lessons, we will have a couple of small tasks for you to do. Crack open the encrypted files and find answers within them.

FreeCrypt

FreeCrypt is a free-to-use site, where you can encrypt files and also decrypt them. You only need to memorize the passphrase for the decryption process.

FreeCrypt

Crypto Corner

Crypto Corner has an entire library of different ciphers for anyone to use. Every cipher has an in-depth explanation of how exactly the encryption works. It will also teach how to manually decrypt the ciphertext.