Intro To Cyber

Lecture 1 & 2

Date Taken: Fall 2025
Status: Completed
Reference: LSU Professor Joseph Khoury, ChatGPT

Summary

Cybersecurity is the practice of protecting computers, networks, and digital information from unauthorized access, attacks, or damage. It involves preventing, detecting, and responding to threats like viruses, malware, phishing, ransomware, and hacking attempts. The key concepts in cybersecurity are summarized by the CIA Triad: Confidentiality, Integrity, and Availability, which provide a framework for designing and implementing security measures.

Confidentiality

Confidentiality ensures that sensitive information is only accessible to authorized individuals or systems. It prevents unauthorized disclosure of data, protecting privacy and proprietary information.

Integrity

Integrity ensures that data remains accurate, consistent, and trustworthy. Unauthorized modification or corruption of data is prevented, and users can rely on its authenticity. Examples include: Hashing, Digital Signatures, Certificates, Non-repudiation.

Create Digital Signatures Verify Digital Signatures

Availability

Availability ensures that authorized users can access information and systems when needed. Systems must remain operational, resilient, and recoverable from failures or attacks.

General Security Concepts (Lecture 1 & 2)

Security Controls

Security controls are safeguards or countermeasures designed to protect information systems, networks, and assets. They aim to reduce risks by preventing, detecting, or mitigating threats and vulnerabilities. Controls are grouped into three main categories:

Control Categories

Security controls are organized to provide comprehensive protection and include the following categories:

  1. Technical Category: Controls that use technology to reduce risks, such as firewalls, encryption, and intrusion detection systems.
  2. Managerial Category: Controls that focus on management and governance, including risk assessments, security policies, and compliance management.
  3. Operational Category: Controls that implements by people instead of technology, such as security awareness training and incident response procedures.
  4. Physical Category: Controls that protect the physical environment, including locks, guard shacks, fences, and surveillance cameras.

Types of Security Controls

Managing Security Controls

Physical Security

Physical security protects buildings, facilities, equipment, and personnel from unauthorized access, theft, and environmental hazards. It ensures the safety of assets and personnel, preventing damage or disruption to operations.

Key Components:

Examples: