View Screen Reader-Friendly Version

Cyber Security

Take a moment to observe your surroundings, and you'll notice that our reliance on technology in our daily lives has reached unprecedented levels. This growing dependence has brought about various advantages, including immediate access to information online and the convenience of smart home automation and the Internet of Things. The positive impacts of technology are abundant, making it difficult to fathom the lurking dangers that exist within every device and platform. Despite the general optimism surrounding technological advancements, it is crucial to recognize the genuine risks posed by cyber security threats in the modern age.

A steady rise in cybercrime highlights the flaws in devices and services we've come to depend on. This concern forces us to ask what cyber security is, why it's essential, and what to learn about it. Watch the following video before you get started with this lesson.

Cybersecurity is everyone's responsibility and we must all work together to create a safer society. - National Institute of Standards and Technology

What is Cybersecurity?

Cybersecurity is a field dedicated to safeguarding devices and services against malicious activities conducted by individuals such as hackers, spammers, and cybercriminals. While certain aspects of cybersecurity involve proactive measures, the majority of experts today emphasize the importance of devising effective defense strategies for all types of assets, including computers, smartphones, networks, and databases, in order to mitigate potential attacks.

Where did Cybersecurity Begin?

Cybersecurity can be traced back to the early days of computing when the concept of securing computer systems and networks against unauthorized access and malicious activities began to emerge. The origins of cybersecurity can be linked to the rise of computer hacking in the 1960s and 1970s when individuals, known as "hackers," explored the vulnerabilities of computer systems out of curiosity or for personal gain.

The formal discipline of cybersecurity started to take shape in the 1980s with the increasing reliance on interconnected computer networks and the emergence of computer viruses and malware. The Morris Worm, unleashed in 1988, served as a wake-up call for the vulnerability of networked systems and prompted the need for stronger security measures.

As technology continued to advance, cybersecurity evolved to encompass various domains such as cryptography, network security, data protection, access control, and incident response. Governments, organizations, and institutions recognized the importance of cybersecurity and established dedicated teams and departments to address the growing threats in the digital realm.

Over the years, cybersecurity has become an essential aspect of our increasingly connected world, with ongoing efforts to stay ahead of the ever-evolving tactics of cyber attackers. It has grown into a complex and multidisciplinary field, involving experts in technology, law, policy, risk management, and ethical hacking, working together to protect digital assets and ensure the confidentiality, integrity, and availability of information systems.

Read the article and watch the video provided below to learn more.

Cybersecurity Terminology

How well do you know these terms? Watch the video below to learn the 15 fundamental cybersecurity terms.

“You are an essential ingredient in our ongoing effort to reduce Security Risk.” ― Kirsten Manthorne

Why is Cybersecurity Important?

Society relies on technology more than ever before. This reliance has increased the amount of digital information that is moved and stored and because of this, it is imperative that this information be kept safe at all times.

If a person, company, organization, or government is hacked the consequences can be devastating. For example, an individual can become a victim of identity theft causing financial ruin, emotional distress, loss of time, lower credit score, and possible arrest. The consequences are similar for companies, governments, and organizations on a larger scale. In addition, these entities are responsible for their data as well as the data of anyone who does business with them.

Impact of Cybersecurity

According to Forbes, 2022 brought diverse and terrifying cyber security challenges, everything from supply chain disruption to increased smart device risks to a continued cyber security talent drought.

According to Cybercrime Magazine, cybercrime will cost the world $10.5 trillion annually by 2025! Furthermore, global cybercrime costs are predicted to rise by almost 15 percent yearly over the next four years.

Types of Cyber Threats

Cybercrime is defined as any unauthorized activity involving a computer, device, or network. There are three generally recognized classifications of cybercrime: computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related.

There are three generally recognized classifications of cyber attacks: computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related.

Cyberattacks can target a wide range of victims from individual users to enterprises or even governments. The hacker’s goal is to access sensitive and valuable company resources, such as intellectual property (IP), customer data, or payment details. Here is a list of common cyber threats:

  • Cyber terrorism
  • Malware
  • Trojans
  • Botnets
  • Adware
  • SQL injections
  • Phishing
  • Man-in-the-middle-attacks
  • Denial of Service

Deep Dive

Watch the videos provided below to learn more about some of these threats and how to avoid them.

Malware

Ransomware

Trojans

Botnets

Adware

Phishing

IoT Attack

The Role of Human Error in Cyber Security Breaches

Did you know The top cause of cybersecurity incidents isn’t malicious employee actions, sabotage or hacking. It’s employee error.

According to a study by IBM, human error is the main cause of 95% of cybersecurity breaches. In other words, if human error was somehow eliminated entirely, 19 out of 20 cyber breaches may not have taken place at all! Therefore it is important to engage in cyber training to stay ahead of the increasingly sophisticated methods used by cybercriminals.

Read about the most common mistakes that employees make and why they make them, in the article provided below.

Many cybersecurity threats arise from human error. Click the link below to identify security violations that may lead to a cybersecurity issue. You have 2 minutes to find all 5 violations.

How Does Cyber Security Work?

As noted before, cybersecurity is the practice of protecting your computer networks and user data from unauthorized access or theft. There are many different types of cybersecurity, and each one is important to understand. To best answer the question “What is cyber security” and "How does cyber security work," we must divide it into a series of subdomains:

Critical Infrastructure Security

Critical infrastructure security is concerned with the protection of systems, networks, and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public's health and/or safety. Examples would be water companies, traffic lights, shopping centers, hospitals, electricity grid. Visit the Cybersecurity and Infrastructure Security Agency website to learn more.

Application Security

Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. Types of application security are antivirus programs, firewalls, and encryption programs.

Network Security

There are many types of network security, but the three most common are firewalls, intrusion detection systems (IDS), and antivirus software. Firewalls are designed to stop unauthorized access to your network. Intrusion detection systems are designed to detect unauthorized activity on your network. Antivirus software is designed to protect your computers from malware and other viruses.

Cloud Security

Cloud security is the process of protecting data, applications, or services that are housed on cloud platforms. There are three main types of cloud security: physical security, logical security, and operational security. Each type of cloud security is important to protect your data and applications.

Identity Management and Data Security

This specific area focuses on the activities, frameworks, and processes involved in verifying and authorizing legitimate individuals to access an organization's information systems. These measures include implementing robust storage mechanisms to ensure the security of data, both during transmission and while stored on servers or computers. Furthermore, this area emphasizes the utilization of authentication protocols, such as two-factor or multi-factor authentication, to enhance security measures.

Mobile Security

Mobile security has gained significant importance due to the increasing reliance on mobile devices. This particular area of focus aims to safeguard both organizational and personal information stored on mobile devices such as tablets, cell phones, and laptops from various threats. These threats include unauthorized access, device loss or theft, malware, viruses, and more. In addition to protective measures, mobile security also utilizes authentication and education to reinforce security measures and promote user awareness.

Disaster Recovery and Business Continuity Planning

Not all threats originate from human sources. The Disaster Recovery and Business Continuity focuses on procedures, notifications, surveillance, and strategies aimed at assisting organizations in preparing for the continuous operation of their business-critical systems during and after various incidents, such as widespread power outages, fires, or natural disasters. It also involves the restoration and recovery of operations and systems that may have been compromised or lost in the aftermath of such incidents.

Top Target Industries for Cyber Attacks

According to RedTeam Security, every organization is at risk of a data breach, systems hack, malware, or ransomware attack by cybercriminals illicitly accessing their network's processing power.

From 2014 through the first half of 2018, the greatest number of data breaches affected businesses and medical/healthcare organizations. - RedTeam Security

According to Forbes, every industry is in danger of cyberattacks. Still, some industries are more vulnerable than others. Read the articles and watch the videos provided below to learn how these industries can be affected.

Look at the following videos to learn how

Reflect on recent cyber attacks mentioned in the video and identify the financial and societal impact of the attacks.

Careers in Cybersecurity

Watch the videos below and take notes on key points of interest for each career.

Information Security Analyst

Information security analysts plan and carry out security measures to protect an organization's computer networks and systems.

Pen Tester and Ethical Hacker

Ethical hackers and penetration testers both identify vulnerabilities in IT environments and work to prevent different types of cyberattacks.

Security Engineer

Cyber Threat Intelligence Analyst

More Cyber Attacks Expected Amidst Tech Shortage

Want to know more about one or more of these careers? Research them at the link below.

Activity Time

Activity #1

Lesson Review

If necessary, review the content provided in this lesson. Then, answer the questions provided below.

  1. Why do you think cybersecurity is necessary?
  2. What are the consequences of cyber attacks?
  3. How do cyber attacks affect individuals?
  4. How do cyber attacks affect organizations?
  5. Would you consider a career in cybersecurity? Why or why not?
  6. How can keeping current with cybersecurity issues help protect you and your employer?

Activity #2

Impact of Cybersecurity

Watch the videos, then answer the questions provided below the video.

  1. How many accounts were affected by this data breach?
  2. What were people with Yahoo! accounts being advised to do to protect themselves?
  3. What was the most surprising aspect of this video for you?
  4. Read the Cybersecurity article provided in the link below. Then answer the following questions:

Activity #3

Fighting Cybercrime

Watch the video, then answer the questions provided below the video.

  1. What information do cyber criminals steal?
  2. What do cyber criminals do with stolen information?
  3. Which organizations were affected?
  4. What role did Malware play in this situation?
  5. What was the most surprising aspect of the video for you?

Activity #4

Cyber Security Simulations

Take cybersecurity into your own hands and defend and defend a company against cyber attacks by playing one or more of the following game simulations.

Explore the K12 Career Education Navigator

The K12 Career Technical Education (CTE) Navigator helps you explore high school courses and career pathways offered across San Bernardino and Riverside Counties. Browse by industry sector, county, school district, and more to find options that match your interests and career goals and see how these pathways can prepare you for college, certifications, apprenticeships, or the workforce.

CREATED BY
Workforce SBCSS

Credits:

Created with images by everythingpossible - "Business team meeting. Photo professional investor working new start up project. Finance task.Digital tablet docking keyboard laptop computer smart phone using, filter film effect" • Ali Yahya - "untitled image" • Vitalii - "Special program found virus in binary code of the program. Concept of cybercrime, hacker attack" • Pixel-Shot - "Modern monitor computer on table in room. Concept of computer viruses" • Alex Kotliarskyi - "Programming " • Unknown - "News | OpenStand" • Rawpixel.com - "Hacker working on computer cyber crime" • InfiniteFlow - "Cyber security technology and online data protection in innovative perception . Concept of technology for security of data storage used by global business network server to secure cyber information ." • Gift Habeshaw - "new graduate student "