Cybersecurity
Автор: madina.s • Октябрь 28, 2025 • Лекция • 5,129 Слов (21 Страниц) • 30 Просмотры
Class 7
- Topic: Cybersecurity
- Objective: Developing students' understanding of the key aspects of cybersecurity, including the classification of information security threats, protective measures, legislative acts, and technical standards in the field of information security.
3. Learning Objectives: After studying this topic, students will:
- know the main types of information security threats and their classification;
- understand the role of the cybersecurity industry and Internet governance in data protection;
- navigate different types of malware and methods for detecting them;
- have an understanding of information security measures and tools used in modern systems;
- be familiar with key standards and specifications in the field of information security;
- know the legislative acts of the Republic of Kazakhstan regulating the legal aspects of information security;
- be able to configure the Windows 10 firewall;
- recognize phishing emails;
- conduct password analysis;
- create infographics.
4. Key Topics:
1. Information security threats and their classification
2. The cybersecurity industry
3. Cybersecurity and Internet governance
4. Malicious software
5. Information protection measures and tools
6. Information security standards and specifications
7. Legislative acts of the Republic of Kazakhstan regulating legal aspects of information security
8. Electronic digital signature
9. Encryption
Theoretical Overview
1. Information security threats and their classification
Information security threats refer to any potential actions or events that could compromise the confidentiality, integrity, or availability of information.
Confidentiality is the protection of information from unauthorized access.
Integrity ensures the accuracy and completeness of data.
Availability ensures that information is accessible when needed.
The classification of threats includes:
- internal and external threats: internal threats may come from employees within an organization, while external threats are posed by hackers or other outside actors.
- natural and man-made threats: natural threats include disasters such as earthquakes and floods, while man-made threats include hacking, viruses, and hardware failures.
2. The cybersecurity industry
The cybersecurity industry encompasses a wide range of technologies and services designed to protect data and systems from attacks. This includes the development of antivirus software, encryption tools, and firewalls (e.g., Kaspersky Lab offers comprehensive antivirus solutions; Cisco Systems develops network protection solutions). Additionally, there is a growing demand for cybersecurity professionals (threat analysts, network security engineers, cryptographers) as the number of cyberattacks increases annually.
- Cybersecurity and Internet governance
Cybersecurity is closely linked to Internet governance because cyberattacks can disrupt the stability and safety of online resources. International organizations such as ICANN (Internet Corporation for Assigned Names and Numbers) and IETF (Internet Engineering Task Force) work on creating global standards for Internet security management to prevent threats like cyberattacks on infrastructure.
On a national level, countries develop laws and policies to protect their national networks and critical infrastructure from cyberattacks (e.g., China’s Great Digital Wall).
4. Malicious software
Malicious software (malware) is software created to perform unwanted actions on a computer. It includes:
- viruses – self-replicating programs that damage files;
- trojans – disguised as legitimate applications but perform malicious actions;
- ransomware – encrypts data and demands a ransom;
- worms – independently spreading programs that do not require user interaction;
- spyware – collects data without the user’s knowledge.
5. Information protection measures and tools
Various measures are used to protect information, including:
- Antivirus software
Antiviruses are designed to detect, block, and remove malware (viruses, trojans, spyware, and other types of malicious software). They work based on updated threat databases and analyze files and processes on computers or mobile devices to prevent infections.
- Firewalls
A firewall is a security system that controls and filters incoming and outgoing network traffic based on established security rules. Firewalls help prevent unauthorized access to the system by creating a barrier between internal networks (e.g., corporate networks) and external sources (e.g., the internet). They can be either software or hardware-based and offer the ability to block suspicious connections and protect information from network attacks.
- Encryption
Encryption is the process of encoding data so that only users with a specific key can read or decrypt it. It is used to protect confidential information such as financial data, personal data, and trade secrets during transmission or storage.
- Authentication and access control
Authentication is the process of verifying the authenticity of a user or device before granting access to information or systems. One common method of authentication is using passwords. However, more secure methods include two-factor authentication (2FA) and biometric methods (fingerprint scanning, facial recognition).
...