Page 5 - CyberSecurityEssentialsEnglish
P. 5

Contents

       P R E F A C E ........................................................................................................................................................................6
       Acknowledgements ............................................................................................................................................................8

       Acronyms ............................................................................................................................................................................9
       Chapter 1 ......................................................................................................................................................................... 10

       Introduction ..................................................................................................................................................................... 11
          Historical Background .................................................................................................................................................. 11
       Cyber Hacking .................................................................................................................................................................. 12

       Cybersecurity ................................................................................................................................................................... 13
          Definition ..................................................................................................................................................................... 13

          Terminologies .............................................................................................................................................................. 13
       CIA Triad Model ............................................................................................................................................................... 14

          This model has three pillars: ........................................................................................................................................ 14
            Confidentiality: Means protecting private information from unauthorised people that should not have access to
            it. .............................................................................................................................................................................. 14
            Integrity: Refers to data integrity. This involves ensuring data is consistent, reliable and accurate. .................... 14

            Availability: Refers to data being consistently and reliably available to those authorised. ................................... 14
          National Cybersecurity Bodies..................................................................................................................................... 14

          Egyptian Computer Emergency Readiness Team (EG-CERT) ....................................................................................... 14
          The Egyptian Supreme Cybersecurity Council (ESCC).................................................................................................. 14

       Cybercrimes, attacks & services ...................................................................................................................................... 15
          Cybercrimes ................................................................................................................................................................. 15
          Cyberattacks ................................................................................................................................................................ 16

          Malware ....................................................................................................................................................................... 18
       Cyber Services .................................................................................................................................................................. 19

       Primary Online Safety Guidelines .................................................................................................................................... 20
          Keep your Accounts Secure: ........................................................................................................................................ 20

          Secure Your Mobile Phone: ......................................................................................................................................... 21
          Maintain Personal Privacy and a Robust Online Reputation:...................................................................................... 21

          Backup your data: ........................................................................................................................................................ 21
          Stay Away from Malware: ........................................................................................................................................... 21
          Handle Securely Removable Devices (USBs): .............................................................................................................. 22

          Fight Phishing: ............................................................................................................................................................. 22
       CHAPTER 2 ....................................................................................................................................................................... 23

       Digital Access Threats ...................................................................................................................................................... 23
          Email-related threats ................................................................................................................................................... 23

          3
   1   2   3   4   5   6   7   8   9   10