Posts

🔐 Week 5: Zero Trust Security — Why "Trust No One" Is the New Rule in Cybersecurity

Image
  Hey everyone! 👋 Welcome back to the Cyber Secure Weekly Blog ! This week, we’re talking about something really important in the world of cybersecurity: Zero Trust Security . 🌐 What Is Zero Trust Security? Zero Trust is a new way of protecting networks. The old way was to trust people or devices inside your network and only check outsiders. But today, hackers are getting smarter, and attacks can come from anywhere  even inside your company. So, Zero Trust says: "Never trust, always verify." This means you should check everyone and everything before giving access to your systems or data no matter where they are. 🔑 Key Ideas of Zero Trust Here are some of the main ideas behind Zero Trust: ✅ Verify every time – Don’t trust users or devices just because they’re in the network. 🔐 Give only what’s needed – People should only have access to what they need to do their job. 🚨 Assume breaches happen – Always be ready in case someone gets in. 🧱 Break ...

The Dark Web: What It Is and Why It Matters in Cybersecurity

Image
What It Is: The Dark Web is a hidden part of the internet that you can’t find using normal search engines like Google. To access it, you need special software like the Tor browser. This browser hides your identity and location, so people can go online without being tracked. That’s why the Dark Web is known for anonymous communication. Some people use it for privacy, but others use it for bad reasons. Why It Matters in Cybersecurity: The Dark Web is important in cybersecurity because it’s often used by cybercriminals. They sell stolen data like usernames, passwords, and credit card numbers. You can also find hacking tools and malware there. Cybersecurity experts monitor the Dark Web to find out about new threats before they happen. This helps protect people, businesses, and organizations. It also helps law enforcement track down and stop criminals who use the Dark Web to plan or carry out attacks. In short: Even though the Dark Web is not always bad, it’s often linked to dangerous ...

6 Common Types of Phishing Attacks

  This week, I focused on learning about phishing attacks , and it opened my eyes to just how sneaky and dangerous they can be. Phishing isn’t just one thing.  There are several different forms that cybercriminals use to trick people. Here are the most common types I discovered, and how to recognize them:  🎣 1. Email Phishing The most common type. Scammers send fake emails that look like they’re from trusted companies, trying to get you to click a malicious link or enter your login info. 🛑 Example: “Your bank account is locked. Click here to fix it.” 🎯 2. Spear Phishing More personalized and targeted. These emails use your name, job, or other details to look more believable. 🛑 Example: “Hi please review this document for your class project.” 🐋 3. Whaling Aimed at “big fish” like company executives or managers. These attacks often involve fake invoices or urgent business requests. 🛑 Example: “Urgent from CEO: Send payment to this vendor immediately.” ...

Week 2: What is a Ransomware Attack?

Image
    This week, I learned about ransomware . Ransomware is a type of virus that locks your computer or files. Then the hacker asks for money (a ransom) to unlock them. This is very dangerous because it can stop people from using their computers. Many hospitals, schools, and companies have been attacked with ransomware. Here is an article I read: 🔗 What Is Ransomware? | IBM What I learned: I learned that ransomware can come from bad emails or fake websites. If you click on a bad link, the virus can start. To stay safe, we should not click strange links and always back up our files.

Cybersecurity Ethics: Why Doing the Right Thing Matters?

Image
Why Doing the Right Thing Matters?  In our digital world, we use computers and the internet every day. Cybersecurity is all about keeping these systems and information safe. But it’s not just about technology it’s also about ethics or  knowing what is right and doing the right thing. What Are Cybersecurity Ethics? Cybersecurity ethics means following rules about honesty, privacy, and respect when working with digital information. It’s about protecting people’s data and making sure no one gets hurt. Why Are Ethics Important in Cybersecurity? Building Trust : People trust cybersecurity experts to keep their private information safe. Being ethical means keeping that trust strong. Stopping Harm : Bad actions like hacking, stealing data, or spreading viruses can hurt people and businesses. Ethics help prevent this. Following Laws: Cybersecurity workers have to follow laws and rules. Ethics help them stay on the right path. Creating a Safe Environment: When everyone c...

What I Hope to Learn About Cybersecurity This Semester

As I begin this Computer Security course ( CYBR 332), I’m really excited because it will teach me how to keep information safe from hackers and other threats. In this class, I’ll learn about lots of important things like: Different types of security problems and how to stop them How to control who can access important information How encryption ( secret codes) helps protect data Why privacy matters and the rules we should follow How to keep computer files and networks safe from attacks What I like most is that this course has hands- on labs, so I can practice the skills instead of just reading about them. I hope by the end of the semester, I will know how to protect computers and networks better and be ready for a job in cybersecurity. I’m excited to share what I learn and some cool articles about security with everyone here!