Cybersecurity Career Paths and CIA Triad.pptx

NguhPrince1 4 views 22 slides Oct 27, 2025
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

An intro lesson to a cybersecurity course, gives the 3 main sectors of cybersecurity as well as some roles in each path. Moves on to explain the pillars of cybersecurity - Confidentiality, Integrity and Availability - the CIA triad and gives real-world scenarios to help the student understand and in...


Slide Content

Information System Security Training Nguh Prince

Table of contents Identify which pillar was impacted by attacks Basic definition offensive, defensive, GRC Definition and examples 01 04 02 03 Intro to cybersecurity Career paths in cybersecurity Game: Identify the breached pillar The CIA triad - core concept

Intro to Cybersecurity Basic definition, ISS vs Cybersecurity 01

What is ISS Information system security deals with The protection of all information within an organization (physical or digital) By applying policies and processes to ensure its confidentiality, integrity and availability

ISS != Cybersecurity While information system security and cybersecurity are related, they are not the same. Information system security protects both physical and digital assets/information It involves technology, and procedures put in place to protect these assets. Cybersecurity on the other hand aims at protecting digital assets. A simple way to think about it is that cybersecurity is a subset of information system security While it is important to have this distinction in mind, for the remainder of this program, we will use the terms interchangeably

Career paths in ISS Defensive, offensive and GRC careers 02

In my opinion, this subfield of cybersecurity has the most opportunities for beginners especially. This sector revolves around protecting systems, detecting threats and responding to incidents. Some roles here include SOC Analyst (Tier 1 and Tier 2) Threat Hunter Security Engineer Defensive Security

Common tasks performed here include: log monitoring, analyzing malware alerts, responding to phis hing incide nts, SIEM managem ent. Defensive Security

Offensive Security Also known as ethical hacking. The hackers simulate attacks to expose vulnerabilities in the system. Some roles include Penetration Tester Security Researcher Red Team Operator Common tasks include: web app testing, phishing simulations, wireless hacking

GRC - Governance, Risk and Compliance They ensure organizations follow security best practices, standards, and laws. Some roles include Risk Analyst Security Policy Writer / Auditor Assistant Common tasks include perfor ming risk assessments, maintaining compliance documentation, conducting internal audits.

The CIA Triad Confidentiality, Integrity and Availability 03

Resources should only be accessible authorized actors. It ensures that only authorized actors are able to read a particular resource. Enforced digitally using encryption Confidentiality

Every day examples include Locking a door with a key that only authorized people have Speaking in a language only few understand Communicating with codes Why is confidentiality not enough for security? Confidentiality

Integrity Protects against unauthorized modification of resources G uarantees the trustworthiness of the information. Integrity checks are important because even though the data might be confidential, it could still be modified.

Integrity Let’s take an example of a woman that is saving her coins in a piggy bank. The money inside can only be gotten if the bank is broken, so she thinks she is safe. A thief came into the house, bought an identical bank, broke the old one and put half of the coins into the fake bank When the woman came home, she saw the piggy bank exactly where she left it and wasn’t aware that she had been robbed

Integrity Another example could be a student that gets a report card with bad grades. He modifies the grades before showing his parents. Yet another common example is fake bills, Governments embed integrity markers into bills It could be a stamp or specific quality that only original bills possess

Availability It stipulates that a service should always be available for the authorized users within the authorized hours of usage. There’s no point applying security to a service when it is unaccessible most of the time

Availability Which of the following is a breach of availability? A bank is closed at 8:00 PM You go to a hospital at midnight and can’t find a nurse Your boss calls you at 8 PM and you’re unavailable

Games Identify the breached pillar 04

Identify the breached pillar Your teacher fails to show up for the class he is supposed to teach You activate a data bundle but the Internet is not working You go to the pharmacy and the pharmacist is screaming out the name of your medication and your illness You break a TV in a hotel room, and replace it with another TV from another room in the hotel, without telling the manager about the incident.

What have we covered? Simple definition of information system security Difference between ISS and cybersecurity The CIA Triad Real-world examples involving the CIA triad

Assignment Create LinkedIn accounts Write a post about the lesson you just had today Create accounts on quizlet Create a flash card set for this first week, Put definition of the terms and scenarios we just covered Install Obsidian and create a folder for this program