Foundations Deck – Core Principles & Threats
What does CIA stand for in cybersecurity?
Confidentiality, Integrity, Availability
Define “Confidentiality” in cybersecurity
Ensuring information is only accessible to authorized people.
Define “Integrity” in cybersecurity.
Ensuring information is accurate, complete, and unaltered.
Define “Availability” in cybersecurity.
Ensuring information is accessible to authorized users when needed.
Name 4 main types of cyber threats
Malware, Phishing, Insider Threats, DDoS Attacks
Give an example of a malware attack.
Ransomware encrypting company files and demanding payment
What is phishing?
Trick emails or messages designed to steal sensitive info like passwords
What is an insider threat?
When someone inside the organization misuses access to harm systems or data
What is a DDoS attack?
Overwhelming a system with traffic to make it unavailable
What is authentication?
Verifying who someone is (e.g., passwords, biometrics)
What is authorization?
Defining what actions a user is allowed to perform
What is the Principle of Least Privilege?
Giving users only the access they need to do their job
Give an example of a confidentiality breach.
An employee accessing client data without permission
Why are security policies important?
They define rules and procedures to protect information and ensure compliance
Name one framework commonly used in cyber compliance.
ISO 27001, NIST, or GDPR
Deck 2 — Malware & Attack Types
What is malware?
Malicious software designed to harm, exploit, or gain unauthorised access to systems.
What is a virus?
Malware that attaches itself to a file or program and spreads when that program runs.
Key point: Requires user action to spread.
What is a worm?
Malware that spreads automatically across networks without user interaction.
Key point: Self-replicating.
What is ransomware?
Malware that encrypts a victim’s files and demands payment to restore access.
Very common in real-world cyber attacks.
What is spyware?
Malware that secretly collects information about a user’s activity.
Examples:
• Keystrokes • Browsing activity • Passwords
What is a trojan?
Malware disguised as legitimate software that tricks users into installing it.
Example: Fake software download.
What is adware?
Software that automatically displays unwanted advertisements.
Sometimes bundled with free software.
What is a rootkit?
Malware designed to hide its presence and maintain privileged access to a system.
Very difficult to detect.
What is a botnet?
A network of infected computers controlled by an attacker.
Used for:
• DDoS attacks • Spam campaigns • Cryptocurrency mining