StudY - Technic - LMS-SFC (EN) - Cyber Security - Content

*

"Let's make something!"

Cyber Security - Content

1. - Cyber Security News.
List of links to the articles presented / made by the most prestigious online publications in the field of cyber security (and not only).

2. - Cyro and Cyrene.
A kind of editorial (short, daily articles) that addresses the problems raised by the use of the computer.

2. - The landscape of cyber security threats.
    2.1. Non-malicious threats.
    2.2. Data threats.
    2.3. Threats to integrity and availability.
        2.3.1. - Password attacks.
        2.3.2. - Account Takeover.
    2.4. - Email threats.
        2.4.1. - Phishing.
        2.4.2. - Spear Phishing.
        2.4.3. - E-mail spoofing.
    2.5. -  Attacks on supply chains.
    2.6. - Cryptojacking.
    2.7. - Misinformation - poor information.
    2.8. - Malware.
    2.9. - Ransomware.
            (Malicious attack encrypts data and demands reward for data access)
    2.10. - Spyware.
    2.11. - Distributed denial of service (DDoS).
    2.12. - MitM - Man-in-the-Middle.
    2.13. - Social engineering.
    2.14. - APT - Advanced Persistence Threat.

3. - Cybercrime actors.
    3.1. - State-sponsored actors.
    3.2. - Industrial spies, including cyber espionage.
    3.3. - Cybercrime actors (hackers), including organized crime groups.
    3.4. - Hired hackers.
    3.5. - Malicious actors inside.
    3.5. - Hacktivist.
    3.7. - Terorist.

3. - Introduction (1).
A brief introduction in terms of the requirements of someone who wants to know as much as possible in terms of cybersecurity, possibly to become something like a professional in this field.

4. Introduction (2).
Introduction to the "secrets of cybersecurity" from the point of view of any user of computer devices, both to avoid problems at home and at a service (job) related to them.
- Securing computer devices.
- Securing the network of computers, mobiles, etc.
- Protection against malicious programs.
- Browsing safety.
- Online transaction security.
- Other cyber security issues.

5. - Short organization.

6. - Antivirus.

7. "Early" education - Useful games for "early" and / or fun access to cybersecurity.
Collection of games, from authorized sources, in cyber security for children.

Dorin M - May 9, 2021