Introduction to Cybersecurity

Objectives: By the end of this topic, you will be able to…

  • Define cybersecurity and its importance in the current context
  • Explain the three fundamental principles of the CIA triad
  • Recognize the difference between offensive and defensive cybersecurity
  • Understand the practical approach of this course

What is cybersecurity

Cybersecurity is the set of practices, technologies, and processes designed to protect computer systems, networks, programs, and data against attacks, unauthorized access, or damage.

In a digitized world where nearly all personal and professional activities depend on technology, cybersecurity becomes essential to guarantee three fundamental principles:

  • Confidentiality — Only authorized parties can access the information
  • Integrity — Data is not altered without authorization
  • Availability — Information and services are accessible when needed

Current importance

  • Companies and governments suffer attacks daily: ransomware, phishing, data breaches
  • Individuals are constantly exposed to identity theft or fraud
  • Cybersecurity skills are increasingly demanded across all sectors
  • The attack surface grows with every new connected device, cloud service, and web application

Course approach

This course focuses on practical cybersecurity, emphasizing the techniques, tools, and approaches used by both defenders and attackers. Each topic combines theory and hands-on labs so you develop a critical, applied understanding of the field.

Throughout the semester you will work with real tools in Kali Linux, analyze vulnerable systems, execute controlled security tests, and document findings professionally.


Key concepts

TermDefinition
ConfidentialityProperty that information is only accessible to authorized entities
IntegrityProperty that information has not been modified without authorization
AvailabilityProperty that systems are accessible when required
MalwareMalicious software designed to damage or compromise systems
PentestingAuthorized security assessment that simulates real attacks

Test yourself

  1. CIA Triad: An attacker modifies the amount of a bank transfer before it reaches the server. Which CIA triad principle was compromised? What technical control would have prevented this?

  2. Professional importance: Research a recent cybersecurity incident. Which principle was compromised? What engineering failures contributed?

  3. Course approach: What is the difference between an offensive and a defensive approach in cybersecurity? Why is it important to understand both?


Navigation: Home | Next