{"id":893,"date":"2024-10-03T14:55:05","date_gmt":"2024-10-03T09:55:05","guid":{"rendered":"https:\/\/augurytech.co.uk\/courses\/?p=893"},"modified":"2025-05-08T16:00:38","modified_gmt":"2025-05-08T11:00:38","slug":"cyber-security-introduction","status":"publish","type":"post","link":"https:\/\/augurytech.co.uk\/courses\/cyber-security\/cyber-security-introduction\/","title":{"rendered":"Cyber Security: Introduction"},"content":{"rendered":"\n<p style=\"font-size:clamp(1.125rem, 1.125rem + ((1vw - 0.2rem) * 0.612), 1.5rem);\"><strong>Cyber security is the practice of protecting systems, networks, and programs from digital attacks.<\/strong><\/p>\n\n\n\n<p>These attacks are usually aimed at accessing, changing, or destroying sensitive data and information; extorting money from users or interrupting normal business processes.<\/p>\n\n\n\n<p>Implementing effective cyber security measures is crucial in protecting computer systems and data from unauthorized access, cyber-attacks, and data breaches.<\/p>\n\n\n\n<p>As a beginner, it&#8217;s essential to understand the basic cyber security concepts and the importance of implementing security practices to stay safe in the digital world.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-353c4f5a wp-block-group-is-layout-flex\">\n<h2 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-42113d2466a351b6b7a8e6c508745427\">Common cyber threats and risks<\/h2>\n\n\n\n<p>The internet is an amazing place but also full of dangers. Cyber threats are everywhere; if you are not careful, you could fall victim to hackers, scams, or malware. But do not worry\u2014understanding these risks is the first step to staying safe online.<\/p>\n\n\n<div class=\"kb-row-layout-wrap kb-row-layout-id893_85d3af-28 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n\n<div class=\"wp-block-kadence-column kadence-column893_9665d0-b2\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>1. Phishing Attacks<\/strong><\/h4>\n\n\n\n<p>Fake emails trick you into revealing sensitive info.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Stay Safe:<\/strong> Don\u2019t click suspicious links. Verify sender addresses.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_d28b2d-26\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>2. Malware &amp; Viruses<\/strong><\/h4>\n\n\n\n<p>Malicious software can steal data or slow your device.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Stay Safe:<\/strong> Use antivirus software. Avoid unknown downloads.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_f1108b-24\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>3. Password Hacking<\/strong><\/h4>\n\n\n\n<p>Weak passwords are easy to guess.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Stay Safe: <\/strong>Use strong passwords. Never reuse them.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_44e825-40\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>4. Social Engineering Scams<\/strong><\/h4>\n\n\n\n<p>Scammers trick people into sharing secrets.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Stay Safe:<\/strong> Verify requests. Trust your instincts.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_bd7363-b7\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>5. Public Wi-Fi Risks<\/strong><\/h4>\n\n\n\n<p>Hackers can steal data on unsecured networks.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Stay Safe:<\/strong> Avoid sensitive tasks on public Wi-Fi. Use a VPN.<\/p>\n<\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h2 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-a5ce99619509f41baf6d7c575201fd0c\">Fundamentals of Cyber Security<\/h2>\n\n\n\n<p>Understanding fundamental concepts in cybersecurity is essential for beginners.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Confidentiality:<\/strong> Ensuring that sensitive information is only accessible to authorized individuals or systems.<\/li>\n\n\n\n<li><strong>Integrity:<\/strong> Maintaining the accuracy and reliability of data and systems, ensuring they are not tampered with.<\/li>\n\n\n\n<li><strong>Availability:<\/strong> Ensuring data and systems are readily accessible to authorized users when needed.<\/li>\n\n\n\n<li><strong>Authentication:<\/strong> Verifying the identity of users or systems to grant access based on their credentials.<\/li>\n\n\n\n<li><strong>Authorization:<\/strong> Granting appropriate access rights to authenticated users, ensuring they can only access the resources they are permitted to use.<\/li>\n\n\n\n<li><strong>Risk Management:<\/strong> Understanding the risks and potential vulnerabilities within an organization&#8217;s digital infrastructure and implementing strategies to mitigate those risks.<\/li>\n\n\n\n<li><strong>Security Policies:<\/strong> Developing and enforcing policies that outline best practices for maintaining cyber security within an organization.<\/li>\n\n\n\n<li><strong>Encryption:<\/strong> Utilizing encryption techniques to secure data in transit and at rest, preventing unauthorized access even if data is intercepted.<\/li>\n\n\n\n<li><strong>Security Awareness:<\/strong> Promoting a culture of cyber security awareness among employees and users to mitigate human error and reduce the risk of social engineering attacks.<\/li>\n\n\n\n<li><strong>Incident Response:<\/strong> Developing and implementing plans to respond to and recover from cyber security incidents, minimizing their impact on the organization.<\/li>\n<\/ol>\n<\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>By understanding these fundamental concepts, beginners can establish a solid understanding of cyber security and its importance in protecting digital assets.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-353c4f5a wp-block-group-is-layout-flex\">\n<h2 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-6826289b0e624364d27a80828f281646\">Basic Cybersecurity Terminology<\/h2>\n\n\n\n<p>Knowing these terms makes cybersecurity easier to understand. Stay informed and protect your digital life!<\/p>\n\n\n<div class=\"kb-row-layout-wrap kb-row-layout-id893_570600-6d alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n\n<div class=\"wp-block-kadence-column kadence-column893_3c10b4-e3\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>1. Cybersecurity<\/strong><\/h4>\n\n\n\n<p>The practice of protecting computers, networks, and data from threats.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_986e14-03\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>2. Malware<\/strong><\/h4>\n\n\n\n<p>Malicious software designed to harm your device or steal data. Includes viruses, spyware, and ransomware.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_3e7994-46\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>3. Phishing<\/strong><\/h4>\n\n\n\n<p>Scam emails or messages trick users into sharing sensitive information.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_fcead2-2c\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>4. Firewall<\/strong><\/h4>\n\n\n\n<p>A security system that blocks unauthorised access to a network.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_ae4ba6-77\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>5. Encryption<\/strong><\/h4>\n\n\n\n<p>A method of scrambling data to keep it safe from hackers.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_f194bb-64\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>6. VPN (Virtual Private Network)<\/strong><\/h4>\n\n\n\n<p>A tool that hides your online activity and secures your internet connection.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_d51885-ba\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>7. Two-Factor Authentication<\/strong><\/h4>\n\n\n\n<p>An extra security step requires two types of verification to log in.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_016f54-bb\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>8. Hacker<\/strong><\/h4>\n\n\n\n<p>Someone who accesses systems illegally or ethically to improve security.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_ba079d-cd\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>9. Data Breach<\/strong><\/h4>\n\n\n\n<p>An incident where personal or company data is leaked or stolen.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-column kadence-column893_683a1b-70\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h4 class=\"wp-block-heading\"><strong>10. Social Engineering<\/strong><\/h4>\n\n\n\n<p>Manipulating people to reveal confidential information.<\/p>\n<\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive data and information; extorting money from users or interrupting normal business processes. Implementing effective cyber security measures is crucial in protecting computer systems and data from unauthorized access, cyber-attacks, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"wp-custom-template-cyber-security","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[12],"tags":[],"class_list":{"0":"post-893","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-security"},"_links":{"self":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts\/893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/comments?post=893"}],"version-history":[{"count":30,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts\/893\/revisions"}],"predecessor-version":[{"id":1501,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts\/893\/revisions\/1501"}],"wp:attachment":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/media?parent=893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/categories?post=893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/tags?post=893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}