PCI- Principles of Cybersecurity and the Internet Overview

Principles of Cybersecurity and the Internet

Introduction

Think about the data that you create on your computer or network. This is very valuable information and the reason for even having a computer or network created in the first place. That is why it is so important to have protective strategies in place. Although operating systems and applications can always be reinstalled, your data uniquely created if lost may ultimately be irreplaceable.

In this module you will focus on extending beyond the cybersecurity needs for an entity from previous modules to understand more on how you can leverage mechanisms to protect your data and resources.

Module Lessons Preview

Cybersecurity Principles Lesson

You will examine the cybersecurity first principles.

Encryption Principles Lesson

You will learn more about the concepts of encryption and how they are applied to ensure data security.

Internet Lesson

You will learn about the process of how packets and protocols are vital to the exchange of information on the Internet; Basic mechanisms used for protecting data and resources.

Key Terms

Cybersecurity Principles- Basic, foundational propositions regarding what qualities of a system contribute to cybersecurity.

Encryption-The method by which information is converted into secret code that hides the information's true meaning.

Cryptography- Practice of coding information to ensure only the person that a message was written for can read and process the information

Hashing- The practice of taking a string or input key, a variable created for storing narrative data, and representing it with a hash value, which is typically determined by an algorithm and constitutes a much shorter string than the original.

Steganography-Practice of hiding a secret message inside of something that is not secret

Internet Protocol (IP)- Gives each device on a network an IP address and defines layout of a single packet.

 Packets- Units of data sent over the network.

Anti-Malware - Software created to protect systems and individual’s computers from malicious software.

Firewall- Network security device that grants or rejects network access to traffic flows between an untrusted zone and a trusted zone.

Intrusion Detection System- Monitor network for evidence of intrusion.

Virtual Private Network (VPN)- Protected network connection when using public networks, encrypting your internet traffic, and disguising your online identity.

[CC BY 4.0] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION