Protect Yourself against computer and cyber attacks
Follow along as the program engagingly teaches computer security concepts by relating them to sports!
Author: Rocco Nardozzo
Follow along as the program engagingly teaches computer security concepts by relating them to sports!
Author: Rocco Nardozzo
Welcome! In today's age, everyone uses a variety of computers every day in their personal life and at work. However, the large use and reliance of computers opens the door for many different security threats and attacks. As a result, it is crucial for users of computers to understand the threats and risks of using computers, as well as learn how to properly protect from the threats, through computer security awareness programs.
Unfortunately, such awareness programs are extremely technical and may be too complex for the average computer user to fully understand. To combat this difficulty, I have created a computer security awareness program that relates all the technical concepts of computer security to different aspects of sports, forming a more interesting and comprehensible program since the majority of users are fans of, or at least familiar with, different sports!
Through the awareness program, I will identify and provide an in-depth, technical, explanation on the different topics required to most effectively protect yourself from computer attacks. Then, I will relate each technical concept directly to a feature of sports to make it easier to understand. Lastly, I will provide some practice questions and games to help viewers master computer security!
To view a quick rundown of the information that will be provided, click here.
Computer security is the protection of assets, such as data, software, hardware, and emails, on computers. Cybersecurity, while similar, protects networks of computers from threats and attacks. Overall, computer security and cybersecurity work together to prevent, detect, and respond to threats that could potentially intercept, interrupt, or modify the assets on computers. To do this effectively, it is crucial to understand ways to lower the chances of successful attacks, stop threats while they are occurring, and respond to attacks after they happened to ensure your assets are safe and protected.
Since the use of computers have become extremely prominent, more and more attacks and threats have popped up that can have lasting effects on individuals and companies, like financial loss, legal trouble, or reputation damage. For example, attackers have the ability to gain access to or delete confidential and private data like financial and health records, as well as private photos. In addition, cyberattacks can disrupt operations of businesses and breach customer information or intellectual property. As a result, understanding how to protect your own personal assets, as well as your company's assets, is as important as ever due to how much computers have, and will continue, to become used. In addition, an aspect of computer security is deciding what risks, impacts and likelihood of attacks, you should allow, as there are not unlimited resources. To do so, it is important to examine what assets are the most valuable to you and your company.
Take for example, the common adage, "defense wins championships". To win championships in sports, teams must plan to and successfully protect their endzone, goal, or hoop from their opponents. Similarly, computer and cybersecurity protect their assets from attackers and malware. Like players of a team, all members of a family or organization must do their part in understanding how attacks work to secure assets from being compromised in order to "win the championship" or reach personal and company goals. In sports, one player's poor performance can have major impacts on a game. Computer security is no different, as one employee's poor computer security practices can have major negative impacts on a company. Therefore, it is important for every computer user to learn the components of computer security to keep the technological environment safe and effective.
While there are many different components to computer and cybersecurity, their core is based on the CIA Triad. The CIA Triad forms the basis for securing computer assets and systems by focusing on protecting their confidentiality, integrity, and availability. As the offense, defense, and special teams are the three aspects that work together to win football games, the confidentiality, integrity, and availability are the three aspects that work together to ensure the security and effectiveness of computer assets.
Confidentiality ensures that only confidential users can view or have access to computer assets. Confidentiality is crucial because the unauthorized access to information and systems can release private information like credit card information, health records, or company plans, all of which can create major problems. For example, sports teams must make sure that the opposing team does not gain access to their plays and plans since the unauthorized access will give the opposing team an advantage to win the game.
Integrity refers to the trustworthiness of assets, making sure everything is accurate and has not been altered by unauthorized parties. Integrity is crucial since the unauthorized modification of assets may have major impacts on individuals and companies, as the modifications of health records, financial records, and company operations will have many negative and potentially dangerous effects. For example, it is extremely important in sports that the score of a game is accurate and unmodified to ensure the winner actually deserved to win.
Lastly, availability ensures that authorized parties have the ability to use the assets. Availability is important since it prevents disruptions that could possibly block crucial assets, like needed information or business operations. Availability protection is crucial to companies, as disrupted operations will majorly impact profit. To understand availability, examine how sports games must proceed without disruptions like power outages or protests in order to complete successfully.
It is important to note, however, that there will never be enough resources available to fully protect the availability, integrity, and confidentiality of every asset. Therefore, individuals and businesses must examine their goals and decide what assets are the most important, focusing on fully protecting the prioritized assets first. Sports teams, for example, must prioritize what positions are most important to their game plan since the salary cap limits how much money they can spend. As a result, the important positions like quarterback will occupy a lot of money, while the backup quarterback will not.
While it may seem basic, one of the most important aspects of computer security is ensuring proper password security, as poor password habits are one of the leading causes of breaches. Strong and complex passwords protect the confidentiality and integrity of assets by acting as the first line of defense against unauthorized access. Attackers attempt to use brute force or doxing to break passwords, so it is important to follow certain practices to make sure your passwords are complex and strong, reducing the likelihood of success from the attacker.
Recommendations for strong passwords include:
Relate using a strong password to the top defenses in soccer. By using complex gameplans, changing their plans every week, utilizing layers of defense, and creating playbooks, defenses will be able to prevent the opposing team from scoring much more effectively than if they used the same, basic plan with no layered defense every game. Passwords are no different. It is essential to use complex passwords, different passwords for each account, and multi-factor authentication to prevent unauthorized access to assets.
In today's world, email has become the primary method for communication, both personally and professionally. As a result, it has become targeted by attackers as it serves as the gateway to compromise systems, steal information, and transfer dangerous software, compromising all aspects of the CIA Triad. Since attackers try to exploit emails in a variety of ways, it is crucial to understand how to properly use emails to protect your assets.
For example, attackers use a method called phishing to send fake emails pretending to be from a trusted source attempting to trick you into clicking dangerous links or providing them with sensitive information like passwords or company secrets. Phishing emails tend to have certain features including:
Phishing emails can be related to your opponent sending you an email pretending to be your coach, asking if you could send them the plays. If you do send them your plays, the other team will know what your team will be trying to run and will be able to stop it and win the game. It is crucial to examine all emails that have an attachment or ask for information to see if there are any indications that it is phishing. If you are not sure, make sure you directly ask the person who sent you the email if it is valid to ensure you do not fall for the attacker's trick.
To help prevent yourself from falling for phishing emails, you can use spam and malware filters that will detect and block suspicious emails and attachments before they reach your inbox. For example, owners of sports teams most likely use spam folders to block emails that do not contain to their team, preventing the possibility of opening harmful emails.
Social engineering is a technique used by attackers to trick individuals into providing confidential information, granting unauthorized access, or performing harmful actions, similar to phishing attacks. These attacks can be done over any type of communication, including in-person, email, or phone call. Since this type of attack targets humans directly, it is important for all computer users to understand and identify social engineering attacks to protect the confidentiality, integrity, and availability of their assets. Besides phishing, other common social engineering attacks that you should look out for include:
Social engineering exploits the human element of computer security to allow the attacker to compromise assets. Even if there are perfect security measures in place, like passwords and prevention software, attackers can still gain unauthorized access to data or install dangerous code through social engineering. Therefore, it is important to look out and be aware of such attacks. For example, even if the locker room requires passwords to get in, the custodian in the prior example managed to bypass it by using a social engineering attack. If anything seems suspicious, verify with your managers or other co-workers instead of automatically falling for the attack. In addition, you should follow all business security policies, use multi-factor authentication to gain access to assets, and limit access to sensitive information to prevent possible social engineering attacks.
To protect your devices, such as computer, tablet, and smartphone from unauthorized access, malicious code, and other attacks, it is important to mitigate the possibility of successful attacks by implementing proper security technologies. The most effective practices to ensure your device is secure includes:
Overall, ensuring that your devices are implemented with these practices is one of the most effective ways to prevent successful attacks.
In today's age, everyone relies heavily on the internet to learn information and communicate with others. While the internet provides many luxuries, it is often exploited by attackers. Therefore, it is essential to follow safe internet practices to prevent any threat and attack. The most effective ways to safely use the internet include:
Overall, you must be very careful when using the internet. If you do not browse the web carefully, you may be providing a pathway for an attacker to gain unauthorized access or download dangerous code.
As stated in prior sections, malware, short for malicious software, refers to harmful programs that are designed to damage, disrupt, or gain unauthorized access to computer systems. Attackers use a variety of different malware types, as well as different entry points, to successfully attack and compromise systems.
While viruses are malicious files that spread from one computer to another inside files, and worms can spread itself to other computers in the network without files, they both are extremely dangerous as they spread harmful code to different systems. Take for example, one player on a sports team becomes sick. However, he spreads the sickness to a teammate, and then the sickness eventually spreads to the whole team, preventing them from playing in their next game.
Another type of malware is spyware, which can track login credentials and steal data once it is installed on a device. This is very harmful as it compromises privacy and assets on the system. For example, imagine that a player who is mad about their playing time takes all of the secret game plans for the next game and gives it to the opponent, giving them a major advantage.
There are many more types of malware, however, you can take certain steps to attempt to prevent malware including:
Overall, malware is one of the most dangerous and used tools by attackers. As a result, it is crucial to understand the dangers of malware, and most importantly, implement security practices to prevent malware.
We are now all living in a world where it is common to work remotely from home. While it may bring some conveniences and comfort, it also creates several dangerous computer security risks for companies. By allowing employees to work from home, companies are forfeiting a lot of the control and security measures set up to protect its assets from attacks. As an employee, it is crucial to follow proper practices while working from home to keep everything secure. Proper remote work practices include:
While working remotely may sound nice, it is important to continue to follow all the security policies, as well as ensure your home environment will not create additional vulnerabilities.
Even though our main goal is to prevent all attacks from occurring, the sad fact is that no matter what we do, some attacks will occur. However, it is just as crucial to prepare for and deal with attacks once they happen. While the scale and impact of attacks may differ from personal systems to business systems, knowing exactly how to respond to an attack will minimize the effects. For example, if a player gets hurt during the game, it is well known to stop the play and let the trainers tend to the player. However, teams prepare for injuries by training backups who could take the spot of the injured player.
If your personal computer is attacked, you can do the following:
If your business device is attacked, you can do the following:
Overall, responding to an incident properly is just as important to preventing incidents. By correctly responding to any attack, you can drastically limit the negative impacts, as well as learn from any mistakes.
One of the key aspects of computer security is compliance, which ensures that all security practices align with legal, regulatory, and best practice standards. Following compliance guidelines helps protect sensitive information and reduce the risk of cyber-attacks. While compliance is important in both personal and business environments, they tend to play a different role in each.
Compliance laws tend to help individuals understand and have confidence that their data collected by businesses is protected under law. For example, data privacy laws like the General Data Protection Regulation and the California Consumer Privacy Act help individuals protect their personal data from any misuse. In addition, compliance standards provide individuals many recommendations on how to protect their data and prevent different types of attacks. By reviewing and paying attention to compliance standards, individuals can improve their computer security skills and do a better job at preventing attacks. For example, many professional sports leagues have compliance standards on how to play without receiving major injuries. Many players view the compliance standards and change their game to match the standards with the hope that injuries become less likely.
Compliance is also critical to businesses, as they must adhere to all compliance acts to protect their customer data and ensure their systems are properly ran. As an employee at a company, you must understand all of the compliance laws that the company needs to follow to ensure that you are not doing anything that could go against the regulations. Following compliance regulations is extremely important, as going against such guidelines may result in the loss of customer data and major fines. By following all compliance regulations while at work, you can ensure that the company is following all rules to protect its customers. For example, sports leagues have created rules that must be followed during every game. The failure to follow such rules will result in fines or suspensions. In addition, a business that is known to follow compliance guidelines, like ISO, may attract new customers and partners. Take for example, a sports team that is known to treat their players extremely well. During free agency, more players might want to sign with that team since it is known that they treat their players well.
In computer security, access control is crucial in ensuring that only authorized individuals or systems can access specific information or perform a certain action, protecting all three pillars of the CIA Triad. The primary aspects of access control include:
In conclusion, access control is a crucial part of preventing attacks to the assets of a computer due to unauthorized access. It is extremely important to ensure the access control is properly set up, as well as to make sure everyone is following the rules.
Now that we have discussed many different components of successfully protecting your computer assets, it is time to talk about our last topic, defense-in-depth. Defense-in-depth is a strategy that utilizes multiple layers of security measures to most effectively protect data and systems from a variety of different threats. While all of the security measures discussed mitigate the chance of successful attacks, no single security measure can provide complete protection. Instead, a layered approach reduces the likelihood of a successful attack and lowers the impact if one layer is breached. Defense-in-depth closely resembles how the defense in football operates. Defenses use a layered approach, forcing the opposing team to get past the linemen, line backers, and then defensive backs in order to score points against them.
The key principles of defense-in-depth include:
Overall, all users of computers must utilize defense-in-depth as it addresses the complexity and evolving nature of cyber threats. By combining multiple security measures, it provides a more comprehensive defense that lowers the risk of successful and damaging attacks.
We have made it to the end of the computer security awareness program! Throughout the program, we have discussed a large number of security measures that should be taken to help protect yourself and your company against computer attacks. Just how all the players of a sports team must work together in order to win the game, all of the aspects on computer security that we discussed need to work together to create the most robust and complete computer security.
In addition, it is important to continue to learn as much about computer security as you can! Computer security attacks are constantly changing and evolving, as well as creating counter measures to security measures. Therefore, it is important to always remain alert and ready to create new security measures. Computer security is similar to a tennis rally where the ball quickly gets hit back and forth over the net. Every time you create a security measure to mitigate an attack, attackers will improve their attacks to beat your countermeasure. As a result, it is critical to constantly monitor and improve your computer system security.
Now that we have finished discussing the different topics of computer security, you can master computer security by thinking about and answering the review questions by clicking here. To examine possible solutions, click here.
In addition, you can further practice your computer security knowledge by playing the crossword puzzle and wordsearch that can be found by clicking here. To check your answers to the games, click here.
To ensure you understand the main concepts, check the key takeaways here!
I hope you have enjoyed this sports related computer security awareness program and have learned ways to protect yourself and company from computer and cyber attacks! If you have any questions or suggestions, please feel free to email me at rocco.nardozzo@sportscybertraining.org