Cybersecurity Fundamentals: 20 Essential Concepts Defined

Cybersecurity Fundamentals: 20 Essential Concepts

1. Defining Cyber Security

Cyber Security refers to the practices, technologies, and processes designed to protect computers, networks, programs, and data from unauthorized access, attacks, and damage.

2. The CIA Triad Explained

The CIA Triad is the core model of information security and cyber defense, focusing on three critical components:

  • Confidentiality: Protecting sensitive data from unauthorized access and disclosure.
  • Integrity: Ensuring that data
Read More

Machine Learning Concepts: Supervised, Unsupervised & Models

Unit 4: Machine Learning

1. Supervised Learning

Supervised learning is a machine learning approach in which the model is trained using labeled data. Each training example has an input and a corresponding correct output. The goal of the model is to learn a relationship or mapping between input features and the target output, so that it can predict outcomes for new unseen data.

Important Points

  • Involves classification (output is a category) and regression (output is a number).
  • The learning process is guided
Read More

Operating System Concepts: Processes, Threads, and Scheduling

CH 3 – Processes

Definition:


Process = program in execution (active); program = passive file.

Process layout:


Text (code) | Data (globals) | Heap (dynamic alloc.) | Stack (function frames).

States:


new → ready → running → waiting → terminated.

PCB (Process Control Block):


state, PC, registers, priority, memory info, I/O status, accounting.

Schedulers:


Long-term (job) → admit to memory (degree of multiprogramming); Short-term (CPU) → choose next ready process; Medium-term → swap in/out

Read More

You are notified” and “failing which” and “legal proceedings

DOMAIN 4 28%

🔐 4.1 Security Administration on Computing Resources

🔹 Secure Baselines

  • A baseline is a predefined configuration for a system, meant to represent a “known good state”.

  • For the exam, understand that this is often created during system deployment and updated after major patches or config changes.

  • Example questions:


    May ask about what’s considered a baseline or how it’s used in hardening.

🔹 Hardening Systems

  • Key concept:

    Reduce attack surface

    Disable anything not needed.
  • Common missed

Read More

Essential Security Practices for Computing Resources

🧩 4.1 Security Administration on Computing Resources

🔹 Secure Baselines

  • Define secure configurations (disable unused ports, enforce strong passwords, patch systems).

  • Deploy via configuration tools (Group Policy, Ansible, SCCM).

  • Maintain through regular audits and updates.

🔹 System Hardening

TargetKey Techniques
Workstations/ServersDisable Telnet/FTP; patch OS/apps; use AV + firewall; limit admin privileges.
Mobile DevicesUse MDM, enforce encryption, PIN/biometrics, remote wipe, containerization.
Read More

Machine Learning Model Types and Data Preprocessing

Machine Learning Model Types and Descriptions

1. Geometric Models

Geometric models represent data as points in a multidimensional space. Learning involves finding geometric structures like hyperplanes, clusters, or nearest neighbors that can separate or classify the data. These models rely on the distance between data points, vector spaces, and geometric transformations.

  • Examples: Linear Classifiers (Perceptron, Logistic Regression, SVM), Nearest Neighbor Classifiers (k-NN), Clustering Models (K-means)
Read More