0% found this document useful (0 votes)
200 views33 pages

Cybersecurity Foundations Overview

CYB801 Week 01

Uploaded by

rashini.lanchana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
200 views33 pages

Cybersecurity Foundations Overview

CYB801 Week 01

Uploaded by

rashini.lanchana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

CYB801: Foundations of Cybersecurity

Week 1 - Introduction
Part 1
Overview
▸ Intended Learning Objectives of the Subject

▸ Topics Covered

▸ Assessment Tasks

▸ Trends and Surveys of Cybersecurity Incidents

▸ Significant Incidents in the last 20 years


Intended Learning Objectives
■ Compare, contrast and critically reflect on the systems, management, physical, legal, ethical and
human perspectives of cybersecurity as they apply to the contemporary contexts of individuals,
organisations and society
■ Critically analyse the applicability and utility of a diverse range of cybersecurity principles, models,
management practices and technologies as they relate to organisations
■ Critically analyse cybersecurity challenges for organisations in defending assets, controlling risk
and developing strategies, individually or as a member of a team
■ Critically reflect on the theory and practice of cybersecurity by interpreting research and
professional literature to communicate developments in scholarship and practice
Topics covered in this subject
■ Introduction to the unit and cybersecurity incidents
■ Adversarial Thinking and the Threat Landscape
■ The Engineering Perspective of Cybersecurity
■ The Management Perspective of Cybersecurity
■ The Physical and Human Factors Perspective of Cybersecurity
■ Legal, Ethical and Professional Issues in Cybersecurity
■ Foundational Security Principles (covers C,I,A)
■ Foundational Security Models
■ Introduction to Security Practices
■ Intro to Application of Security Technologies
■ Cyber Careers
Assessment
■ Assessment 1: Reflective Journal (1,000 words, 20%)
■ Assessment 2: Seminar Paper (1,500 words, 30%)
■ Assessment 3: Peer Review of Seminar Paper (500 words, 10%)
■ Assessment 4: Scenario Analysis and Strategy Report (2,000 words, 40%)
Survey
Survey
Significant
Incidents last
20 years
Significant
Incidents last
20 years
Significant
Incidents last
20 years
Significant
Incidents last
20 years
Significant
Incidents last
20 years
Significant
Incidents last
20 years
What is Cyber Security

https://youtu.be/GT0daScxO18?si=weyd0ZL0B8pnhcfH
Why Cyber Security?
Why Cyber Security?
Why Cyber Security?
Why Cyber Security?
Example of CIA triad
Threats to CIA
Threats to CIA- CyberCrime
Types of CyberCrime
Business Scenario
Business Scenario
Business Scenario
Business Scenario
Motives behind Cybercrimes
Types of Hackers
Types of Hackers
Most common attacks in Cybersecurity
How does Cybersecurity works?
Summary
▸ Information security is a “well-informed sense of assurance that the information risks and controls
are in balance.”

▸ Computer security began immediately after first mainframes were developed

▸ Successful organizations have multiple layers of security in place: physical, personal, operations,
communications, network, and information.

▸ Security should be considered a balance between protection and availability

▸ Information security must be managed similar to any major system implemented in an organization
using a methodology like SecSDLC

▸ Implementation of information security often described as a combination of art and science

Principles of Information Security, 2nd Edition

You might also like