Cyber Security Preliminary Course Notes (first four lessons)

Table of contents

Table of contents

foreword

Note content mind map

1. Into the Hacker

1.1 Preview Instructions

1.2. Hacker classic movies

1.3 Homework:

1.3.1 Impression 1:

1.3.2 Impression 2:

2. Network security incidents

2.1 Domestic security incidents:

2.2 Foreign security incidents:

2.3. How to search for network security incidents:

2.4 Homework:

3. Walk into network security

3.1. Current status of network security

3.1.1 Status quo 1

3.1.2 Status quo 2

3.2 Development of Network Security

4. The Internet is a double-edged sword

4.1 Content

4.2 Homework:

5. Summary


foreword

personal information;

Sophomore in soft engineering

an ordinary undergraduate student

Passionate about cybersecurity and programming

Currently undergoing cybersecurity training

Looking for like-minded friends to learn and improve together! ! !

Today is the study notes of the first four preview lessons, and I will summarize them.

At the bottom of the article are the materials for the first four lessons.

Note content mind map

1. Into the Hacker

1.1 Preview Instructions

Have some understanding of network security

Learn the basics of what is needed

1.2. Hacker classic movies

hacker classic movie
                                                                           hacker 
                                                                         who I am   
                                                                       The Matrix
                                                                      hacker tracking order 
                                                                    Hackers have absolute control
                                                               No system is absolutely safe

1.3 Homework:

You can watch two movies by yourself, and then write your impressions and summarize the attack methods in them. 

I watched these two movies "Hackers Absolute Control" and "The Matrix":

1.3.1 Impression 1:

The film "Absolute Control by Hackers" tells the confrontation between a genius hacker and a group of criminal groups. They use various high-tech means to launch an unprecedented battle for control. I have a deeper understanding of the importance of network security and personal information protection, and I also hope to strengthen network security awareness in real life and improve my own prevention capabilities.

attack methods of hackers. Through network penetration technology , various high-security systems and important servers in the country have been invaded. Using 0day vulnerabilities and phishing attacks to steal a lot of confidential information.

Clever use of social engineering to obtain the personal information of the target person in real life and use this information to conduct online fraud and identity fraud. They seek profit by forging identities , impersonating others , and exploiting each other's weaknesses .

  The ability of hackers to exploit IoT technology to carry out attacks. They can control urban infrastructure, transportation systems and power networks by invading various smart devices, causing all kinds of chaos and disasters. I have concerns about the security of the Internet of Things .

1.3.2 Impression 2:

"The Matrix" arouses my thinking about the important relationship between reality and virtuality by showing hackers' attack methods and absolute control over the virtual world. I felt the technical genius and courage of the hackers, and thought about the challenges of human free will and the threat of machine control. The film has brought me profound inspiration and awakened my reflection on the importance of technological progress and personal freedom.

Hackers demonstrate absolute control over their means of attack. They used their extraordinary technical abilities to invade, find out the truth of the real world by cracking codes , manipulating programs and interfering with systems , and launched a life-and-death duel with machines.

Hackers use social engineering and network penetration techniques to break the control of machines over humans in the real world. By contacting people in the real world, they change their thinking and beliefs, awaken their understanding of the matrix, and organize themselves to resist the rule of machines.

2. Network security incidents

2.1 Domestic security incidents:

4.5 billion data breaches

4.5 billion pieces of personal information leaked? On the 9th, black ash was produced, "destroying data" became invisible (baidu.com) https://baijiahao.baidu.com/s?id=1757975017745144013&wfr=spider&for=pcNorthwestern Polytechnical University was attacked by the US National Security Agency

Details announced! Northwestern Polytechnical University was attacked by the National Security Agency of the United States (baidu.com) https://baijiahao.baidu.com/s?id=1743146557968548259&wfr=spider&for=pc Chaoxing Xuetong information leakage incident

Tracking of Xuexuetong student information leakage incident: A seller sold it overnight, claiming to be bought out by the gold owner (baidu.com) https://baijiahao.baidu.com/s?id=1736351263568061650&wfr=spider&for=pc

2.2 Foreign security incidents:

US medical center discloses data breach: over 1.3 million people affected!

US medical center discloses data breach: over 1.3 million people affected! Enterprises to protect data security? (baidu.com) https://baijiahao.baidu.com/s?id=1742239994260741788&wfr=spider&for=pc The US prison collapsed after being attacked by ransomware, and the prisoners were forced to stay in the room

U.S. prisons collapsed after being attacked by ransomware, and prisoners were forced to stay in their rooms Over 510,000 people's information hacked by cyber attack (baidu.com) https://baijiahao.baidu.com/s?id=1722516921737463878&wfr=spider&for=pc

2.3. How to search for network security incidents:

1. You can learn about some network security incidents by searching for network security incidents through WeChat.

2. Search network security incidents directly through the browser.

2.4 Homework:

Collect some recent security incidents at home and abroad, and students with basic knowledge can learn about the loopholes caused by these security incidents? and related vulnerabilities.

I don't know much about vulnerabilities, so I can only collect and read:

1. US medical center disclosed data breach: over 1.3 million people affected! .

2. Network security | Invisible mutation of harmful content, Internet chaos involving minors "makeover".

3. The Wuhan Earthquake Monitoring Center was targeted by the cyber attack "behind the scenes" and the mysterious American reconnaissance system is about to be exposed.

4. The LockBit gang demanded a ransom of 70 million US dollars, and TSMC has admitted that the network has been attacked.

5. Microsoft warning: Russian hackers launched a large-scale credential theft attack.

3. Walk into network security

3.1. Current status of network security

3.1.1 Status quo 1

Network security is everywhere in life, and the network is a double-edged sword.      

3.1.2 Status quo 2

                                   It is very important for network security to rise to the national level.

3.2 Development of Network Security

           With the development of all walks of life, network security issues will increase year by year, and network security is developing rapidly in various industries. 

         The white paper on cyber security issued by the state and the new level of protection in recent years are all manifestations of the rapid development of cyber security.

4. The Internet is a double-edged sword

4.1 Content

In our daily life, we will come into contact with sensitive information in all aspects. In the process of using it, doing it well will bring benefits to the enterprise or related industries, and doing it poorly, such as viruses, will cause harm to enterprises and even society. Before that, we need to read the legal provisions related to network security to avoid starting in three years.

Some legal provisions to read, you can go to the browser to search:

September 2022 "Data Security Law"
July 2020 "Data Security Law (Draft)" April
2020 "Network Security Review Measures"
October 2019 "Encryption Law of the People's Republic of China"
September 2019 "On Promoting Internet Guiding Opinions on the Development of the Security Industry (Draft for Comment) "
May 2019 "Network Security Level Protection Technology Version 2.0"
May 2019 "Key Points of Educational Informatization and Network Security Work in
2019" February 2019 "Basic Requirements for Leveled Security Protection"
September 2018 "Internet Security Supervision and Inspection Regulations by Public Security Organs"
June 2018 "Network Security Level Protection Regulations (Draft for Comment)"
April 2018 "Guidelines on Promoting Capital Markets to Serve the Construction of a Powerful Network Country" Opinions
January 2018 "Network Security Practice Guidelines-CPU Meltdown and Specter Vulnerability Prevention Guidelines"
June 2017 "Network Security Law of the People's Republic of China"

4.2 Homework:

Take the time to read the relevant legal literature to avoid violating the law in the process of digging related loopholes

5. Summary

        Through the study of these few lessons, I found that network security is ubiquitous in my life. Of course, I also encountered many problems in my studies. For example, it is difficult to search for movies. Yes, the legal texts are difficult and boring to read, but I still checked and read it. It is more like a kind of exercise and improvement for me. I believe I will continue to study for the things I love.

A word of the day: Everyone has his own forest. Those who are lost are lost, and those who meet will meet again.

 Materials for the first four preview lessons:

Alibaba cloud disk sharing https://www.aliyundrive.com/s/cowxCP3gEg9

Guess you like

Origin blog.csdn.net/weixin_72543266/article/details/132382938