Intro to Cybersecurity: The Essential First Step for Beginners

What is SOC?

A Security Operations Center (SOC) is a command center that monitors and responds to security threats to an organization's IT infrastructure.

What is Threat Intelligence?

Threat intelligence is the process of gathering, analyzing, and interpreting information about potential cyber threats, including their tactics, techniques, and indicators, to provide actionable insights for organizations to proactively defend against attacks and mitigate risks; essentially, it's evidence-based knowledge about emerging or existing threats that can be used to inform security decisions and responses.

What is DIFR?

Digital Forensics and Incident Response (DFIR) is a cybersecurity field that combines the practices of "digital forensics" (collecting and analyzing digital evidence from a compromised system) with "incident response" (taking immediate action to contain and mitigate a cyberattack), essentially allowing security teams to investigate cyber threats, gather evidence, and respond to incidents effectively while minimizing damage.

What is SIEM?

Security Information and Event Management (SIEM) tool, which gathers security-related information and events from various sources and presents them in one dashboard. If the SIEM finds something suspicious, an alert will be generated.

What is a Computer Virus?

A virus is a piece of code (part of a program) that attaches itself to a program. It is designed to spread from one computer to another and works by altering, overwriting, and deleting files once it infects a computer. The result ranges from the computer becoming slow to unusable.

What is Trojan Horse?

Trojan Horse is a program that shows one desirable function but hides a malicious function underneath. For example, a victim might download a video player from a shady website that gives the attacker complete control over their system.

What is Ransomeware ?

Ransomware is a malicious program that encrypts the user’s files. Encryption makes the files unreadable without knowing the encryption password. The attacker offers the user the encryption password if the user is willing to pay a “ransom.”