examples of cyber threats for beginners

Basics of Cyber Security and Common Terms

Basics of Cyber security and all common terms explained for beginners!

Actually its my second day of learning all the basic of cyber security in my diploma. First step to start is to understand all the theoretical part & basics terms.

Introduction & Key Concepts

 What is Cyber security?

Cyber security is protecting computers, mobile phones, networks, and data from being stolen, damaged or misused. In simple security of digital world is called as cyber security. For example if you are living in a house (your computer), you have doors and windows (internet and apps). You lock them to stop thieves from entering, Cyber security is that lock but for digital house.

Importance of Cyber security (Why it matters)

  • To keep data safe (like passwords, bank info etc.)
  • To stop viruses and scams.
  • To protect your identity
  • To protect businesses from getting hacked.

CIA Triad:


CIA stands for Confidentiality, Integrity & Availability

  • Confidentiality

Confidential mean private, to keep data safe and private, mean only the right people can see it. For example your whatsapp chats only you and receiver can see it.

  • Integrity

Integrity means to keep the data correct and unchanged. Keep it in real form. Like no one can change your data without your permission. For example a hacker must not change your bank balance from 1000 to 0.

  • Availability

Availability means keep the systems online & working. A user should be able to access his data when needed. For example a website or app should not do down during cyber-attacks.

Types of Cyber security

There are different areas of cyber security depending on what you are protecting:

  • Network Security, to protect data while travelling across the networks like Wi-Fi, internet, firewall, routers, VPNs.
  • Application Security, to protect software, apps and websites from hackers like making sure login systems, payment gateways etc. are secure.
  • Cloud Security, to protect data that’s stored on cloud like Google drive, AWS. Securing access to cloud files, backups.
  • Physical Security, to protect the hardware like computers, servers from being stolen or damaged. Locked server rooms security cameras.

Cyber security Terminologies

The few commonly used terminologies as basics of cyber security are,

  • Threat, is anything that can cause harm to your system. For example hackers, malware, phishing emails.
  • Vulnerability is a weak point in your system that can be attacked. For example a password like 12345 is vulnerability.
  • Exploit, is a method that attackers used to take advantage of vulnerability. For example, a hacker uses a software bug to break in.
  • Risk, is the chance that a threat will use as vulnerability to cause damage. For example, if your software has bugs and no antivirus, risk is high.
ConceptMeaning in Simple Words
ConfidentialityKeep things private
IntegrityDon’t let things be changed
AvailabilityKeep things working
ThreatThe danger (like hacker)
VulnerabilityWeak point (like bad password)
ExploitHow the hacker attacks your weak point
RiskChance of something bad happening

Types of Cyber Threats & Attack

Malware

                  Is a malicious software that is harmful software used to steal data or disrupt systems.

Types of Malware:

  • Virus, attaches to a clean files and spreads when file runs and it requires human action, for example infected USB.
  • Worm, is a self-replicating malware that spreads without human action, for example through networks.
  • Trojan, is the software designed as legit but used to steal data, for example fake game installer.
  • Ransom ware, locks your files and data and then demands for payment to get your data back, for example WannaCry attack. You can check the complete case study of wannacry attack which was a real example of ransomware attack.
  • Spyware, secretly monitor our activates on our system, for example keyloggers. (Its like all the key you press on your system will automatically hacker saved them and then used accordingly. So stay safe it dangerous.


Phishing & Social Engineering

  • Phishing, is a cyber-attack of fake emails with link to ask fr reset password or website tricking users to give their personal info and passwords, for example your locked bank account, if attack is by phone call called as “Vishing” (Voice Phishing) but if attack is by harmful link via email or text or website then it’s called as phishing.
  • Phishing → Fake emails/links (e.g., “Click to reset password”).
  • Vishing (Voice Phishing) → Fake calls (e.g., “Tell me your OTP”).
  • Smishing (SMS Phishing) → Fake texts (e.g., “Your package is held; click here”).
  • Social Engineering, is manipulating people to reveal their secrets, for example act as fake IT support, or bank agent.
  • Insider Threats are the threats caused by the insiders like employs or trusted people of the company who misuse access to leak data or harm systems (intentionally or unintentionally).
  • DDoS (distributed denial of services) Attacks, overloading a website or server with fake traffic to crash, for example botnet flooding a site. Botnets is actually a fake computers of attacker from where he did this attack and flood a website with fake traffic to make it down or crash. This type of attack is called a Distributed Denial of Service (DDoS) attack. Its also very common form of attack.
  • Brute Force & Password Attacks, guessing easy passwords by trying all combinations is called brute force & easy passwords attack for example 1234 are called as password attacks.
  • Zero-Day Exploits means hackers attack on vulnerability before a developer release a fix.
  • For more Read basics on OWASP Top 10 Vulnerabilities.
Threat TypeHow It WorksExample
VirusInfects files & spreads when executedInfected USB with virus
WormSpreads automatically over networksThrough Wi-Fi, networks
TrojanFake software act as legitPirated game with spyware
RansomwareEncrypts/lock files or data for ransom, ask for payment to unlock dataWannaCry, LockBit
SpywareSecretly monitors activityKeylogger stealing passwords
PhishingFake emails/sites stealing data“To Update your PayPal account click on link”
Social EngineeringManipulating people to reveal infoFake CEO email asking for money. Or Friend id asking for money
Insider ThreatEmployee leaking dataWorker selling data for money
DDoS AttackOverloads server with fake trafficBotnet attacking a website
Brute ForceGuessing passwords repeatedlyHacking weak passwords
Zero-Day ExploitAttacks unknown software flaws before fix release.Hackers exploiting unpatched Operating systems.

Actually its all are my notes which I prepared during my class and now am sharing here as blog for people who is learning or just starting with Cyber Security, it might helps someone, i explained all the basics of cyber security, basic terms hope everyone can understands.

Please share your Valuable comments if you like it. Thank you, see yaaa!!!!

READ DAY 1 Blog for better understanding!https://munazajameel.site/career-switch-to-cyber-security-day-1/

Related Posts

Elevate Your Brand with Stunning Websites & Engaging Content.

Support

Help Center

Report an Issue

FAQ

Contact

Live Chat

Contacts

+92346-9704576
munazajamil56@gmail.com 

© 2025 Munnaza Jameel. All Rights Reserved.