Cybersecurity For Beginners
How do you keep what you love safe? Do you store it in a small container? Do you throw it in a safe and swallow down the key? Do you entrust it to someone you trust or someone you love?
That’s what cybersecurity is all about, keeping things safe. Now, when you add in government documents into that or a company’s information about the products you like best, those are the things we really need to keep safe. So, how do we do that?
In an attempt to better understand a field where things change everyday, a field I’ve chosen to study and devote myself to, I am going to do my best to explain cybersecurity to you.
Why Should I Care:
Firstly, that’s a valid question on your end. It depends how much you should care actually. Do you have an urge to keep your data safe? Are you okay with sharing certain information? Are you not okay with that?
So, how much of your information are you okay with strangers seeing? What about your bank account or passwords? The reality is that data breaches and cyber-attacks are becoming more common, and no one is completely safe. So the question is: How much are you willing to protect? What are you willing to do about it?
By understanding and implementing cybersecurity practices, you're taking steps to protect your personal life, finances, and sometimes even your reputation (depending what secrets you have in your device, laptop or phone etc.). The stakes are high, they have been for a while now. Cybercriminals devote their lives to stealing identities, money, and valuable data. They specifically target individuals who aren’t aware of what’s going in the world of cyber today. Nowadays, the most prestigious companies and even dutiful governments are not as safeguarded as they think they are.
Passwords:
Unfortunately, yes. You do need passwords 6-8 characters (potentially 10) including a lowercase letter, uppercase letter and special character. You can definitely have your google chrome browser create and store one for you. How long will that last though?
If you do that routine continuously, soon you won’t be able to remember a password off the top of your head if you need to. Trust me, you may need to. You need to login into the College Board website to check your AP scores or a friend wants to know if you have an account on a certain website, you’re gonna need to sign in with your username and password.
One of the simplest, yet most effective ways to protect yourself online is by using strong, unique passwords, be creative with it why not?! The problem I see often for people is remembering every password. To that I say:
Common Cyber Threats
My boyfriend’s mom receives suspicious texts from unknown numbers. The staff members at my school have shared that they delete emails that have attachments (links or documents) they are not already familiar with. One day, it’ll happen to you. After reading this article, you’ll be prepared to identify and stay away from common cyber threats:
Recommended by LinkedIn
Do not be fooled. A pop up on your screen can be malware or phishing. A link from a bot on Instagram can really be a link that when you open it, your data on your phone is compromised. That is why we should all have the urge to protect ourselves and our internet persona.
The Big Deal: Companies and Governments
Do you know that people can look you up and most likely get access to your phone number or at least your address (even people related to you)? There are websites dedicated to that. I looked my name up and found
21 records for Simone Gonzalez including addresses, phone numbers, and background reports
Now, sometimes only privileged users of that website can access certain kind of information. Who is to say a hacker can’t access that information though?
Cybersecurity isn’t just about protecting your personal data. It is about protecting your personal data so it isn’t used against you. You might think, Who would want my data? The truth is, hackers are often after personal information they can use for identity theft or fraud. It’s not just your friends who want to know where you shop. If hackers can access information about a company or government, the chances of them finding information about you are quite high.
I would like for you to watch this video:
At least, watch Olivia discuss what happened to her recently. Of course, the cops that interrogated Olivia just got her name wrong. A girl arrested several times was Olivia Rodriguez. What if anyone wanted to appear to be Olivia Rodrigo? They studied the color scheme of her Instagram. They used AI to create convincing alternate images of Olivia. Many people are convinced they can not be fooled but it can happen to anyone.
It happened to me once. Someone had messaged me pretending to be Sofia Carson. They wanted to meet me and asked for my information immediately. I blocked them immediately. You can just never be sure so it’s best not to let your curiosity get the best of you.
In fact, let me share this with you, the Cyber Attack Lifestyle:
The cyber attack lifecycle, often referred to as the kill chain, outlines the stages that attackers follow to infiltrate, compromise, and exploit an organization’s systems. Understanding this lifecycle helps security teams detect, disrupt, and respond to cyber threats more effectively. Here’s a breakdown of each stage in the cyberattack lifecycle:
1. Reconnaissance: Attackers start by gathering as much information as possible about their target, including IP addresses, employee details, and network configurations. This information helps them identify potential vulnerabilities and prepare for the next stages.
2. Weaponization: Using the information gathered, attackers create or choose malicious software (malware like we talked about), such as trojans, worms, or ransomware, designed to exploit the identified vulnerabilities.
3. Delivery: Attackers deliver the weaponized code to the target through various channels, such as phishing emails, infected websites, or malicious attachments. This is the entry point where the malware gains access to the target’s systems.
4. Exploitation: Once inside the system, the malware activates by exploiting a vulnerability. At this point, the attacker gains control over the system’s environment.
5. Installation: To maintain access, attackers install backdoors or other persistent methods of control, allowing them to return to the compromised system even if the malware is detected or removed.
6. Command and Control (C2): Attackers establish a channel to communicate with the compromised system, often connecting it to an external server that allows them to remotely control the device and exfiltrate data.
7. Actions on Objectives: With control over the system, attackers move on to their primary goal, which may include stealing sensitive data, disrupting services, spreading malware further, or holding data hostage (as in ransomware attacks).
This is more on an organizational level but this can affect you. Maybe your parents own a small business. You want to own your own business someday. You are a young person who doesn’t want someone creating an Instagram account pretending to be you. These things can happen, people have the power to do that unfortunately. Cybersecurity should be part of your world, it already is.
You’re right. You shouldn’t have to worry about cyber criminals. You should online shop at your leisure, have a 123456 password and enjoy the internet. The world we live in today always has bad guys in it though. Cybersecurity is like the safe and key example I stated earlier. You can actually keep things safe in a safe and swallow down the key, then the bad guys definitely can’t get the key. If you’re in charge of protecting your own data and even those you love, you’re pretty much a ghostbuster. You have all the special tools available to you, it’s how you use them and the courage you have to fight against and defeat the bad guys.
This article is getting to be a bit long. However, if anyone enjoyed I’d love to publish a part two detailing the work I’ve done in cybersecurity and all I’ve learned so far. Stay safe!
P.S. If you’re interested in cybersecurity courses or trainings I recommend:
This is fantastic information. Thank you for posting.