Page 5 - CyberSecurityEssentialsEnglish
P. 5
Contents
P R E F A C E ........................................................................................................................................................................6
Acknowledgements ............................................................................................................................................................8
Acronyms ............................................................................................................................................................................9
Chapter 1 ......................................................................................................................................................................... 10
Introduction ..................................................................................................................................................................... 11
Historical Background .................................................................................................................................................. 11
Cyber Hacking .................................................................................................................................................................. 12
Cybersecurity ................................................................................................................................................................... 13
Definition ..................................................................................................................................................................... 13
Terminologies .............................................................................................................................................................. 13
CIA Triad Model ............................................................................................................................................................... 14
This model has three pillars: ........................................................................................................................................ 14
Confidentiality: Means protecting private information from unauthorised people that should not have access to
it. .............................................................................................................................................................................. 14
Integrity: Refers to data integrity. This involves ensuring data is consistent, reliable and accurate. .................... 14
Availability: Refers to data being consistently and reliably available to those authorised. ................................... 14
National Cybersecurity Bodies..................................................................................................................................... 14
Egyptian Computer Emergency Readiness Team (EG-CERT) ....................................................................................... 14
The Egyptian Supreme Cybersecurity Council (ESCC).................................................................................................. 14
Cybercrimes, attacks & services ...................................................................................................................................... 15
Cybercrimes ................................................................................................................................................................. 15
Cyberattacks ................................................................................................................................................................ 16
Malware ....................................................................................................................................................................... 18
Cyber Services .................................................................................................................................................................. 19
Primary Online Safety Guidelines .................................................................................................................................... 20
Keep your Accounts Secure: ........................................................................................................................................ 20
Secure Your Mobile Phone: ......................................................................................................................................... 21
Maintain Personal Privacy and a Robust Online Reputation:...................................................................................... 21
Backup your data: ........................................................................................................................................................ 21
Stay Away from Malware: ........................................................................................................................................... 21
Handle Securely Removable Devices (USBs): .............................................................................................................. 22
Fight Phishing: ............................................................................................................................................................. 22
CHAPTER 2 ....................................................................................................................................................................... 23
Digital Access Threats ...................................................................................................................................................... 23
Email-related threats ................................................................................................................................................... 23
3

