An intro lesson to a cybersecurity course, gives the 3 main sectors of cybersecurity as well as some roles in each path. Moves on to explain the pillars of cybersecurity - Confidentiality, Integrity and Availability - the CIA triad and gives real-world scenarios to help the student understand and in...
An intro lesson to a cybersecurity course, gives the 3 main sectors of cybersecurity as well as some roles in each path. Moves on to explain the pillars of cybersecurity - Confidentiality, Integrity and Availability - the CIA triad and gives real-world scenarios to help the student understand and internalize the material.
Size: 9.24 MB
Language: en
Added: Oct 27, 2025
Slides: 22 pages
Slide Content
Information System Security Training Nguh Prince
Table of contents Identify which pillar was impacted by attacks Basic definition offensive, defensive, GRC Definition and examples 01 04 02 03 Intro to cybersecurity Career paths in cybersecurity Game: Identify the breached pillar The CIA triad - core concept
Intro to Cybersecurity Basic definition, ISS vs Cybersecurity 01
What is ISS Information system security deals with The protection of all information within an organization (physical or digital) By applying policies and processes to ensure its confidentiality, integrity and availability
ISS != Cybersecurity While information system security and cybersecurity are related, they are not the same. Information system security protects both physical and digital assets/information It involves technology, and procedures put in place to protect these assets. Cybersecurity on the other hand aims at protecting digital assets. A simple way to think about it is that cybersecurity is a subset of information system security While it is important to have this distinction in mind, for the remainder of this program, we will use the terms interchangeably
Career paths in ISS Defensive, offensive and GRC careers 02
In my opinion, this subfield of cybersecurity has the most opportunities for beginners especially. This sector revolves around protecting systems, detecting threats and responding to incidents. Some roles here include SOC Analyst (Tier 1 and Tier 2) Threat Hunter Security Engineer Defensive Security
Common tasks performed here include: log monitoring, analyzing malware alerts, responding to phis hing incide nts, SIEM managem ent. Defensive Security
Offensive Security Also known as ethical hacking. The hackers simulate attacks to expose vulnerabilities in the system. Some roles include Penetration Tester Security Researcher Red Team Operator Common tasks include: web app testing, phishing simulations, wireless hacking
GRC - Governance, Risk and Compliance They ensure organizations follow security best practices, standards, and laws. Some roles include Risk Analyst Security Policy Writer / Auditor Assistant Common tasks include perfor ming risk assessments, maintaining compliance documentation, conducting internal audits.
The CIA Triad Confidentiality, Integrity and Availability 03
Resources should only be accessible authorized actors. It ensures that only authorized actors are able to read a particular resource. Enforced digitally using encryption Confidentiality
Every day examples include Locking a door with a key that only authorized people have Speaking in a language only few understand Communicating with codes Why is confidentiality not enough for security? Confidentiality
Integrity Protects against unauthorized modification of resources G uarantees the trustworthiness of the information. Integrity checks are important because even though the data might be confidential, it could still be modified.
Integrity Let’s take an example of a woman that is saving her coins in a piggy bank. The money inside can only be gotten if the bank is broken, so she thinks she is safe. A thief came into the house, bought an identical bank, broke the old one and put half of the coins into the fake bank When the woman came home, she saw the piggy bank exactly where she left it and wasn’t aware that she had been robbed
Integrity Another example could be a student that gets a report card with bad grades. He modifies the grades before showing his parents. Yet another common example is fake bills, Governments embed integrity markers into bills It could be a stamp or specific quality that only original bills possess
Availability It stipulates that a service should always be available for the authorized users within the authorized hours of usage. There’s no point applying security to a service when it is unaccessible most of the time
Availability Which of the following is a breach of availability? A bank is closed at 8:00 PM You go to a hospital at midnight and can’t find a nurse Your boss calls you at 8 PM and you’re unavailable
Games Identify the breached pillar 04
Identify the breached pillar Your teacher fails to show up for the class he is supposed to teach You activate a data bundle but the Internet is not working You go to the pharmacy and the pharmacist is screaming out the name of your medication and your illness You break a TV in a hotel room, and replace it with another TV from another room in the hotel, without telling the manager about the incident.
What have we covered? Simple definition of information system security Difference between ISS and cybersecurity The CIA Triad Real-world examples involving the CIA triad
Assignment Create LinkedIn accounts Write a post about the lesson you just had today Create accounts on quizlet Create a flash card set for this first week, Put definition of the terms and scenarios we just covered Install Obsidian and create a folder for this program