Cybersecurity CS Thinking Example 2
Follow the full solution, then compare it with the other examples linked below.
Example 2
mediumExplain three methods of protecting against cyber attacks: encryption, authentication, and firewalls.
Solution
- 1 Step 1: Encryption scrambles data so only authorised parties with the correct key can read it. Even if data is intercepted, it is unreadable without the key.
- 2 Step 2: Authentication verifies user identity before granting access. Methods: passwords, two-factor authentication (2FA), biometrics (fingerprint, face recognition).
- 3 Step 3: Firewalls monitor and filter network traffic, blocking unauthorised connections. They act as a barrier between a trusted internal network and untrusted external networks.
Answer
Encryption (scrambles data), Authentication (verifies identity), Firewalls (filter network traffic). Multiple layers of defence are needed.
Defence in depth โ using multiple security measures โ is a core cybersecurity principle. No single measure is sufficient; security relies on layers working together.
About Cybersecurity
The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity encompasses three core goals: confidentiality (only authorized users can access data), integrity (data is not tampered with), and availability (systems remain operational).
Learn more about Cybersecurity โMore Cybersecurity Examples
Example 1 easy
Name three common cyber threats and describe how each works.
Example 3 mediumExplain what social engineering is and give two examples. Why is it effective even against systems w
Example 4 hardA company suffers a data breach exposing customer emails and hashed passwords. Explain why hashing p