A04-011-summary.md

'Cybersecurity is a rapidly developing area that needs new inventions to stop any kind of cyberattacks.'

Securing Data

As you have learned during this course, there are multiple ways available to secure and protect data. Many companies offer a variety of firewalls, virus detection, and education for example. However, a lot of the security depends on us, how we take advantage of security tools, and most of all, what we click on the internet.

Security Controls

Companies implement cybersecurity countermeasures to detect, prevent, reduce, and counteract when security threats are found. The controls adapt all the time to be able to face the evolving cyber environment. Due to the fast growth of cyberattacks, it's has come even more important to have up-to-date security controls.

Both control types and control functions can be divided into three different categories that overlap each other. Control types are what organizations define as possible models to classify as how to approach security. Control functions, such as corrective, are safeguards and actions on how to control security.

The chart of examples of control types with control functions. Image source

IDS and IPS

Tässä kohtaa Tick the Box -komponentti, jonka kohdat alla

  • IDS = Intrusion detection system. IDS monitors networks for malicious activities and violations. If anything suspicious is detected, IDS will send an alarm to the system's operator.

  • IPS = Intrusion prevention systems. A form of network security to detect and prevent suspicious threats. IPS commonly is right behind the firewall and will take automated actions if something is detected on the traffic through the network.

Tässä kohtaa Multiple Choices -tehtäväkomponentti

Tässä kohtaa Fill in the Blank -tehtäväkomponentti

Tässä kohtaa Three Column Grid -kuvakomponentti, jonka kolme kuvaa alla

Firewall and Antivirus

As the internet has become accessible for more and more people, the need for security from cyberattacks has increased rapidly. Firewalls are the first line of the defense. They monitor the traffic in the network and stop incoming attacks from viruses. Firewalls also stand in guard to prevent any hacking attempts.

Antivirus software's goal is to prevent, scan, detect, and destroy viruses. Antivirus acts independently in the background and will alert the user if something has been detected.

Tässä kohtaa Matching-tehtäväkomponentti

'One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.'

Encryption

As the Encryption-lesson taught, encryption basically scrambles the data, and only authorized people can access it. Encrypting data aims to keep our sensitive information private and prevent its manipulation.

Encrypting can be divided into two categories: symmetrical encryption and asymmetrical encryption.

Tässä kohtaa Table, jonka tiedot alla

  • Symmetric
  • AES
  • 3-DES -SNOW
  • Asymmetric
  • RSA
  • Elliptic curve cryptography Commonly used encryption algorithms.

Encryption Exercises

You got to practice encryption on a small scale in the Encrypting Exercises-lesson. The internet has multiple different kinds of encryption tools, some are commercial and some are free to use.

  1. FreeCrypt: A quick and simple way to encrypt entire files. You need to decide on a passphrase to later decrypt the files. You can send encrypted files to others and they can view them as long as they have the correct passphrase to decrypt the file.
  2. Crypto Corner: A website full of various kinds of ciphers that include in-depth explanations of how they work. A neat tool to scramble texts and learn how to manually decrypt the texts.