grace idowu Profile
amy grant
Chapter 1. Cyber security Concepts and Principles Lab 1.1 – Exploring Cybersecurity Threats and Mitigation Strategies Objectives: • Understand common cybersecurity threats, including malware, phishing, and social engineering. • Analyse real-world examples of cyber threats and develop basic mitigation strategies. • Learn to identify and respond to vulnerabilities in a controlled environment. Background / Scenario Cybersecurity threats and vulnerabilities significantly impact the integrity, confidentiality, and availability of systems. Malware, phishing, and social engineering are among the most prevalent threats in today's digital landscape, often exploiting technical and human vulnerabilities. In this lab, participants will study the characteristics of these threats, analyse real-world case studies, and apply basic defensive measures. The activity combines theoretical knowledge with practical steps to prepare for real-world cybersecurity challenges. Required Resources • A computer with internet access. • Access to cybersecurity resources or articles for research. Instructions Part 1: Identify and Analyze Cybersecurity Threats 1. Research Common Threats: a. Open your web browser and find articles or reports on cybersecurity incidents involving: o Malware (e.g., WannaCry ransomware). o Phishing attacks. o Social engineering scenarios. b. Document key aspects of these incidents: o Type of threat. o How the attack occurred. o Impact on the affected system or organization. 2. Document Real-World Examples: a. Create a simple table to summarize findings:
andrae crouch
Part 2: Develop Mitigation Strategies 1. Design Strategies for Each Threat: o Based on your research, propose at least two mitigation strategies for each type of threat. Use the following as guidelines: ▪ For Malware: ▪ Regular software updates. ▪ Installation of anti-malware tools. ▪ For Phishing: ▪ User education and awareness training. ▪ Implementation of multi-factor authentication (MFA). ▪ For Social Engineering: ▪ Employee security training. ▪ Verification procedures for sensitive requests. 2. Compare Strategies: o Discuss the advantages and potential challenges of each mitigation strategy with peers or record your reflections. Reflection 1. What are the most common traits shared by cybersecurity threats like malware, phishing, and social engineering? 2. How do human factors contribute to the success of attacks such as phishing or social engineering? 3. Discuss the importance of continuous user training and awareness programs in mitigating these threats. Lab 1.2 – Understanding Cybersecurity Threats and Applying Mitigation Strategies Objective: ● Recognize and classify common cybersecurity threats: malware, phishing, and social engineering. ● Analyse how these threats exploit vulnerabilities in systems and human behaviour. ● Develop practical approaches to mitigate the risks associated with these threats. Background / Scenario Cybersecurity threats, including malware, phishing, and social engineering, are persistent challenges in protecting systems, networks, and data. Understanding their characteristics and behaviour is crucial for designing effective defence mechanisms. In this lab, participants will examine these threats, explore real-world case studies, and identify best practices to minimize risks. By simulating attacks and devising defences, participants will gain hands-on experience in securing digital environments.
Bill gaither
1. Design Strategies for Each Threat:
Bill gaither2
o Based on your research, propose at least two mitigation strategies for each type
CeCe 2
of threat. Use the following as guidelines:
dee doris
▪ For Malware:
mercy chinwo
▪ Regular software updates.
dorinda Clark cole1
▪ Installation of anti-malware tools.
eben
▪ For Phishing:
ebuka songs
▪ User education and awareness training.
Frank Edwards
▪ Implementation of multi-factor authentication (MFA).
funmi aragbaye
▪ For Social Engineering:
grace idowu
▪ Employee security training.
James Cleveland
▪ Verification procedures for sensitive requests.
Jamie Grace
2. Compare Strategies:
kirk Franklin
o Discuss the advantages and potential challenges of each mitigation strategy
Michael smith
with peers or record your reflections.
Michael smith2
Reflection
Michael smith3
1. What are the most common traits shared by cybersecurity threats like malware,
Walter Hawkins
phishing, and social engineering?
Document