Module 1 — Introduction to Cybersecurity & the CIA Triad

Welcome to the first module of the Foundational Cybersecurity Course.
Here we explore what cybersecurity really means, why it matters, and how it touches everything — from personal devices to global infrastructure.

You’ll learn key terms like threat, vulnerability, and risk, understand the CIA Triad, and perform your first practical exercise: threat mapping.

💡 Learning Objectives

By the end of this module, you’ll be able to:

  • Define cybersecurity and explain its goals.

  • Describe the three pillars of the CIA Triad.

  • Identify major threat actors and their motivations.

  • Differentiate between threat, vulnerability, exploit, and risk.

  • Perform a basic threat-mapping exercise on a real-world case.

🔍 1. What Is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks.
These attacks aim to:

  • Steal information (confidential data)

  • Disrupt operations (availability)

  • Alter or destroy data (integrity)

In modern life, cybersecurity is no longer limited to corporations. Every connected individual — student, freelancer, or small-business owner — has something valuable to protect: data, reputation, identity, or finances.

🔐 2. The CIA Triad — Foundation of Security

ComponentDescriptionExample
ConfidentialityEnsuring information is accessible only to authorized people.Encryption of passwords, using 2FA.
IntegrityEnsuring data is accurate and unaltered.File hashing, version control.
AvailabilityEnsuring systems and data are accessible when needed.Backups, DDoS protection, redundant servers.

⚔️ 3. The Threat Landscape

Attackers today come in many forms:

Threat ActorMotivationExample
CybercriminalsFinancial gainRansomware / phishing scams
HacktivistsPolitical/social causeWebsite defacements
Nation-state groupsEspionageTargeting government or energy sectors
InsidersRevenge / carelessnessEmployee leaking data
Script kiddiesCuriosity / bragging rightsUsing tools without full understanding

🧩 4. Key Concepts & Terminology

TermDefinition
ThreatAny potential cause of an unwanted incident.
VulnerabilityWeakness in a system that can be exploited.
ExploitThe method or code that takes advantage of a vulnerability.
RiskThe likelihood that a threat will exploit a vulnerability.
MalwareMalicious software designed to damage or steal.
PhishingSocial engineering to trick users into revealing info.

🧠 5. Practical Lab — Threat Mapping Exercise

Goal: Understand how to classify threats and actors.

Steps:

  1. Choose one real incident (e.g., a major ransomware or data-leak case).

  2. Identify:

    • Threat Actor: who was behind it

    • Motivation: financial, political, etc.

    • Attack Vector: how the attack started

    • Impact: data loss, downtime, financial cost

  3. Map these on a simple chart (Threat → Vulnerability → Impact).

  4. Discuss or note defensive controls that could’ve mitigated it.

Tip: You can use examples like WannaCry 2017 or LinkedIn Data Breach 2021.

⚖️ 6. Ethics & Responsible Practice

Ethical boundaries define true cybersecurity professionals.

  • Never attack or scan systems you don’t own or have written permission to test.

  • Always use isolated lab environments (VMs, emulators, or sandbox platforms).

  • Follow laws such as the Information Technology Act (India) and global norms like GDPR.

Ethics build trust — and trust builds careers in cybersecurity.

📘 7. Summary & Next Steps

In this first module, you’ve built a foundation:

  • You understand cybersecurity goals and principles.

  • You can identify threats, vulnerabilities, and risks.

  • You’ve practiced mapping an incident and thinking like an analyst.

Next Up: Module 2 — Digital Self-Defense & Personal Security →

Leave a comment

Index