Hello world! Why cybersecurity matters, and what we are going to do about it

Every time you unlock your phone, send a message, make an online payment or log in to a service with your credentials, you are trusting digital systems with information about you: your identity, your money, your private communications, your physical location. Cybersecurity is the discipline devoted to protecting that information — and the systems that process it — from anyone who would access, alter or destroy it without authorization.

This is not a topic reserved for specialists or large corporations. Every person connected to the Internet is a potential target, and every organization — from a one-person shop to a nation’s critical infrastructure — depends on the security of its digital systems to function. Understanding the fundamentals of cybersecurity is no longer an optional skill: it is an everyday necessity, like knowing how to lock your front door.

This lesson is the starting point of your journey. It will give you a big-picture view of the discipline: what it protects, from whom, across which professional domains and with what mindset. Every topic introduced here will be explored in depth in the lessons that follow.

Prerequisites

No specific prerequisites. Basic familiarity with everyday computer and Internet use is sufficient: browsing the web, using email, installing applications.

What Cybersecurity means

Definition Cybersecurity is the body of practices, technologies, processes and skills designed to protect computer systems, networks, software and data from unauthorized access, damage, disruption or attack.

That definition, while accurate, may sound abstract. To make it concrete, think about three fundamental questions the discipline asks continuously:

  • what do we protect? Personal data, business information, digital infrastructure, intellectual property, industrial control systems, essential services such as hospitals, transportation networks and power grids;
  • from whom do we protect it? From cybercriminals, organized crime groups, hostile nation-state actors, malicious insiders (insider threats), but also from accidental errors and technical failures;
  • how do we protect it? Through technical tools (firewalls, encryption, detection systems), organizational processes (policies, procedures, staff training) and a legal and regulatory framework (laws, international standards, compliance requirements).

A crucial point to internalize from the outset: cybersecurity is not a product you buy and install. It is not a piece of software, not a device, not a one-time fix. It is a continuous process that involves people, technology and procedures in an ongoing cycle of prevention, detection, response and improvement.

A helpful analogy Think about the security of a physical building. Installing a lock on the front door is not enough: you also need reinforced windows, an alarm system, surveillance cameras, a guard service, rules about who can enter and when, an emergency evacuation plan, and someone who periodically checks that everything is working. Cybersecurity works the same way: it is an ecosystem of coordinated defenses, not a single tool.

The Scope of the Discipline

When people hear “cybersecurity,” they often picture hackers and viruses. In reality, the scope is far broader. Cybersecurity is concerned with protecting:

  • data: information at rest (stored), in transit (traveling across a network) or in use (being processed);
  • systems: computers, servers, mobile devices, network appliances, embedded systems (the small computers built into devices like routers, cameras and industrial sensors);
  • networks: the communication infrastructure that connects systems to each other and to the Internet;
  • applications: the software programs and services that users interact with, from websites to mobile apps to enterprise management platforms;
  • people: users themselves, who are often the most vulnerable link in the security chain and who need training, support and protection from social engineering (psychological manipulation techniques used to deceive people into granting access to information or systems);
  • processes: the organizational procedures that govern how systems are managed, updated, monitored and how incidents are handled.

Why Cybersecurity matters to everyone

You might be thinking: “I have nothing to hide” or “Who would be interested in my data?” These are understandable thoughts, but they rest on a false assumption: that cyberattacks are targeted and selective, like a burglar carefully choosing a wealthy mansion. In reality, the vast majority of cyberattacks are automated and indiscriminate: criminals cast wide nets and hit whoever is vulnerable, regardless of who they are.

Real-world Impact Scenarios

For individuals: a phishing attack — a fraudulent email impersonating your bank — can trick you into entering your credentials on a fake website. Within hours, your account is drained. A ransomware infection — malware that encrypts your files and demands payment — can wipe out years of photos, documents and digital memories. Identity theft can generate debts in your name or damage your reputation.

For businesses: a network intrusion can expose the data of thousands of customers, leading to lawsuits, regulatory fines, loss of trust and financial damage severe enough to bankrupt a company. Industry reports consistently show that the average cost of a data breach runs into millions of dollars when you factor in lost business, legal fees, regulatory penalties and recovery costs.

For society: critical infrastructure — hospitals, power grids, water treatment plants, transportation systems, telecommunications — is increasingly digitized and interconnected. A cyberattack on a hospital can shut down operating rooms; an attack on a power grid can black out an entire region; a breach in air traffic control systems can endanger human lives.

Impact of Cyberattacks: three levels Individual • Identity theft • Loss of personal data • Banking fraud • Privacy violations • Extortion (ransomware) Damage: personal and direct financial loss Business • Data breach • Service disruption • Regulatory fines • Reputational damage • Corporate espionage Damage: financial, legal and reputational Society • Attacks on hospitals • Power grid blackouts • Election interference • Transportation shutdowns • Water supply compromise Damage: collective, potentially lethal

The Domains of Cybersecurity

Cybersecurity is a broad discipline made up of several interconnected specialty areas. You do not need to master all of them right away — many will be the subject of dedicated lessons — but having a map of the landscape from the start will help you navigate the course and understand how the pieces fit together.

The Domains of Cybersecurity Cyber Security Network Security Protecting communications Application Security Securing software Identity & Access Controlling who gets in Threat Intelligence Studying the adversary Incident Response Reacting to attacks Compliance & Privacy Regulations and standards Linux & System Security Hardening platforms Digital Forensics Investigating incidents

Network Security

This domain focuses on protecting communication infrastructure: local area networks, Internet connections and the data traffic that flows between systems. It includes tools such as firewalls (devices or software that filter network traffic according to predefined rules), Intrusion Detection Systems (IDS) and VPNs (Virtual Private Networks — encrypted tunnels that protect communications). If you have ever heard of “network attacks,” “packet sniffing” or “man-in-the-middle,” you are in network security territory.

Application Security

This domain deals with protecting software: web applications, mobile apps and APIs (the interfaces through which programs communicate with each other). It focuses on writing secure code and on finding and fixing vulnerabilities before an attacker can exploit them. If you have ever heard of SQL injection, cross-site scripting (XSS) or a website being “hacked,” you are in application security territory.

Identity and Access Management

This domain ensures that only the right people can access the right resources, in the right way, at the right time. It covers authentication (verifying that you are who you claim to be), authorization (determining what you are allowed to do) and credential management. Passwords, Multi-Factor Authentication (MFA), Single Sign-On — all of these fall under identity and access management.

Threat Intelligence

This domain is dedicated to studying attackers: who they are, what techniques they use, what objectives they pursue and how they organize. It collects and analyzes threat information in order to anticipate and prepare for attacks. One of the most important tools in this space is the MITRE ATT&CK framework, a publicly available knowledge base that catalogs the tactics and techniques used by real-world attackers — you will encounter it frequently throughout this course.

Incident Response

This domain defines how an organization reacts when an attack actually happens. Because, despite all defenses, incidents do occur. Incident response is the process that allows you to contain the damage, eliminate the threat, restore systems and learn from what happened so it does not happen again.

Digital Forensics

This is the science of digital investigation: collecting, preserving and analyzing digital evidence after an incident or a cybercrime. The forensic analyst reconstructs what happened, when, how and — when possible — who did it. Because findings often need to hold up in court, the work demands rigorous and well-documented methods.

Linux and System Security

This domain covers the protection of operating systems and the platforms on which everything else runs. Linux is the dominant operating system for servers, cloud infrastructure and cybersecurity tooling: most security tools run on Linux, which makes proficiency in this operating system an essential skill for anyone working in the field.

Compliance and Privacy

This domain deals with meeting regulatory and security-standard requirements: GDPR (the European Union’s General Data Protection Regulation), ISO 27001, the NIST Cybersecurity Framework (CSF) and many others. It is not just a legal checkbox: regulations define minimum security requirements that concretely protect organizations and their users.

Important note These domains are not isolated silos. A real-world attack almost always crosses multiple domains: a phishing email (social engineering) leads to stolen credentials (identity & access), which grants access to the corporate network (network security), where malware is installed (threat intelligence), which exfiltrates data (compliance/privacy), triggers a response (incident response) and an investigation (forensics). Cybersecurity is inherently interdisciplinary.

Cybersecurity Career Paths

Cybersecurity offers a remarkable variety of career paths. There is no single “cybersecurity expert”: there are dozens of specialized roles, each with distinct skills, responsibilities and career trajectories. Here are the major ones.

RoleWhat they doKey skills
Security AnalystMonitors systems, triages security alerts, identifies suspicious activity and contributes to incident responseLog analysis, SIEM, networking, operating systems
Penetration TesterSimulates cyberattacks under authorization to find vulnerabilities before criminals doAttack techniques, programming, networking, operating systems
Incident ResponderSteps in when a security incident occurs: contains the threat, assesses the damage, coordinates recoveryForensics, malware analysis, crisis management, communication
Security EngineerDesigns and implements security architectures: configures firewalls, authentication systems, hardened infrastructureNetwork architecture, automation, cloud security, hardening
Forensic AnalystConducts digital investigations: collects and analyzes electronic evidence, reconstructs the timeline of an incidentForensic analysis, chain of custody, forensic tools, documentation
Threat Intelligence AnalystStudies emerging threats, attacker groups, attack trends and produces reports to guide defensive strategyOSINT, malware analysis, MITRE ATT&CK framework, geopolitics
CISOThe Chief Information Security Officer is responsible for an entire organization’s security strategyRisk management, leadership, communication, compliance, strategic vision

The field by the numbers Cybersecurity is one of the sectors with the highest demand for professionals worldwide. The shortage of qualified personnel is chronic and growing, which means real opportunities for anyone who enters the field with solid skills. A four-year computer science degree is not the only path in: many successful professionals come from vocational programs or non-traditional technical backgrounds, and industry certifications — such as CompTIA Security+, Certified Ethical Hacker (CEH), OSCP and CISSP — carry significant weight in the job market.

Thinking like a Defender (and understanding how an Attacker thinks)

Technical skill alone is not enough. Cybersecurity demands a specific mindset: the ability to look at a system not just for how it was designed to work, but for how it could be used in unintended, forced or abusive ways.

The Defender’s Mindset

The defender (also called a blue teamer) must protect a system in its entirety. They must consider every access point, every configuration, every interaction between components. The job is frustrating in its asymmetry: the defender has to be right about everything, all the time. A single mistake, a single open port, a single weak password can undo all the rest.

For this reason, the defender’s mindset is systematic and constructively paranoid:

  • it assumes that any component can fail and prepares alternatives;
  • it verifies its own assumptions instead of trusting appearances;
  • it documents everything, because what is not documented cannot be audited;
  • it thinks in terms of “when we will be attacked,” not “if we will be attacked.”

The Attacker’s Mindset

The attacker (or red teamer, when operating under authorization) looks for a single flaw. They do not need to defeat every defense: they only need to find one that is weak. They think creatively, laterally, unconventionally. They ask: “What would happen if I did something the designer never anticipated?”

Understanding the attacker’s mindset does not mean becoming a criminal: it means understanding how the adversary thinks so you can anticipate their moves. Every good defender knows how to reason like an attacker, just as a safe designer studies the techniques of safe crackers.

Ethics and legality: a clear line The difference between a security professional and a cybercriminal does not lie in their technical skills — which can be identical — but in authorization and intent. A penetration tester uses the same techniques as an attacker, but does so under a written agreement, within a defined scope and with the goal of improving security, not undermining it. In this course, we will cover offensive techniques solely in the context of defense and authorized testing. Using these skills without explicit authorization is illegal and subject to criminal prosecution.

The Fundamental Asymmetry

A concept you will encounter often and that is worth internalizing right now is the asymmetry between attack and defense: the defender must protect the entire perimeter, while the attacker only needs to find a single weak spot. This asymmetry explains why cybersecurity is a field where perfection does not exist and risk management — deciding where to focus limited resources for the greatest protection — is a core competency every bit as important as technical skill.

What we will cover in this Course

This course will guide you progressively through the fundamentals of cybersecurity, building skills one on top of another. Here is an overview of the major topics we will address:

  • core principles: the CIA Triad (Confidentiality, Integrity, Availability), risk management, the concepts of vulnerability, threat and countermeasure;
  • network security: how networks work, how they are attacked and how they are defended;
  • operating systems and Linux: why Linux is the go-to operating system for cybersecurity and how to use it for security;
  • application security: how software vulnerabilities are discovered and exploited, and how to write secure code;
  • threats and malware: attack types, anatomy of an incident, social engineering techniques;
  • identity management: authentication, authorization, encryption and access control;
  • incident response and forensics: what to do when something goes wrong;
  • compliance and regulations: GDPR, industry standards and the legal framework of cybersecurity.

Every lesson will be concrete and hands-on, with exercises you can run in your lab environment (an Ubuntu LTS virtual machine that you will learn to set up in the very first lessons).

Hands-on Exercises

Guided Exercises

Exercise 1: Map your digital footprint

The goal is to build awareness of your digital exposure.

Step 1: list every online service where you have an account (email, social media, streaming platforms, e-commerce, banking, games, school services). Try to reach at least 10.

Step 2: for each service, note what type of personal data you provided (real name, date of birth, phone number, home address, credit card, government ID).

Step 3: for each service, indicate whether you use a unique password or one that is shared with other services.

Step 4: count how many services have access to your location, your camera or your microphone.

Expected outcome: you should end up with a list that shows how much personal information is spread across dozens of services. If many passwords are shared, you have just identified your first concrete security problem. This exercise requires no technical skills, but it develops awareness — which is the first tool of defense.

Exercise 2: Spot a phishing email

Read the two emails below carefully and determine which one is legitimate and which is a phishing attempt. Explain what clues led you to your conclusion.

Email A:

From: support@myb4nk-security.com
Subject: URGENT: Suspicious activity on your account

Dear Customer,
We have detected suspicious activity on your bank account.
For security reasons, your account will be LOCKED within 24 hours
if you do not verify your identity immediately.

Click here to verify your account:
http://myb4nk-security.com/verify-now

Best regards,
The Security Team

Email B:

From: noreply@examplebank.com
Subject: Your monthly account summary — March

Dear Jane Smith,
Your monthly summary for checking account
ending in ***4521 is now available.

You can view it by logging into your account
at examplebank.com or through our mobile app.

If you need assistance, call us at 1-800-XXX-XXXX
or visit your nearest branch.

Best regards,
Example Bank, N.A.

Solution: Email A is the phishing attempt. The red flags are numerous: the sender’s domain is suspicious (“myb4nk-security.com” substitutes the number “4” for the letter “a” — a technique known as typosquatting); the tone is alarmist and urgent (“URGENT,” “LOCKED within 24 hours”), a classic tactic designed to make the victim act impulsively without thinking; the email asks you to click a direct link instead of inviting you to log in through the official website on your own; and it contains no specific information about the recipient (name, partial account number). Email B, by contrast, uses a consistent domain, a neutral tone, includes partial account data (last four digits) and directs you to official channels without providing suspicious links.

Exercise 3: Identify the cybersecurity domain

For each of the following scenarios, identify which cybersecurity domain (or domains) is involved. Use the domain map presented earlier in the lesson.

  • Scenario A: an employee uses the same password for their corporate account and their personal social media profile. The social media profile gets compromised, and the attacker successfully uses the same password to access the corporate network;
  • Scenario B: a company discovers that its website has been defaced by an attacker who replaced the homepage with a political message;
  • Scenario C: after a ransomware attack, a team of specialists examines the hard drives of the affected servers to determine how the attacker got in and what data was stolen.

Solution:

  • Scenario A: Identity & Access Management (weak and reused password), with implications for Network Security (unauthorized access to the corporate network);
  • Scenario B: Application Security (the website had a vulnerability that allowed the defacement), with possible involvement of Incident Response (reacting to the incident) and Compliance (if the site processed personal data);
  • Scenario C: Digital Forensics (post-incident forensic analysis) and Incident Response (response and recovery after the ransomware attack).

Independent Exercises

Exercise 4: choose a real-world cyberattack that received significant media coverage (you can search for it online). Write a brief report (roughly 200 words) that answers the following questions: who was targeted? What type of attack was used? What security principles were violated? What consequences did the attack have? Which cybersecurity domain could have prevented or mitigated it?

Exercise 5: think of an organization you are familiar with (your school, a company where you interned, a shop in your neighborhood). Imagine you are responsible for its cybersecurity. List at least five cybersecurity risks the organization could face and, for each one, suggest a reasonable countermeasure.

Exercise 6: compare two cybersecurity roles from the ones presented in the lesson. For each, describe: what skills are needed to get started, what training path is recommended, what kind of person is best suited for the role (in terms of aptitudes and interests) and how the two roles collaborate in defending an organization.

Review Questions

Question 1: What is cybersecurity, and why is it described as a “continuous process” rather than a product?

Answer: Cybersecurity is the body of practices, technologies, processes and skills designed to protect systems, networks, software and data from unauthorized access, damage or attack. It is described as a continuous process because threats evolve constantly, technologies change, new vulnerabilities emerge every day and defenses must be continuously updated, tested and improved. It is impossible to reach a state of “permanent security” by installing a product: what is needed is a permanent cycle of prevention, detection, response and adaptation.

Question 2: Explain the difference between a targeted attack and an automated, indiscriminate attack. Why does this distinction matter for understanding your own risk level?

Answer: A targeted attack is aimed specifically at a chosen victim (a company, an individual, an institution) with precise objectives. An automated, indiscriminate attack is launched at scale, hitting anyone who is vulnerable regardless of their importance or the value of their data. This distinction matters because it shows that everyone is at risk: you do not need to be a high-profile target to suffer an attack. Most attacks are indiscriminate, which makes cybersecurity a necessity for every person and organization connected to the Internet.

Question 3: List and briefly describe at least five cybersecurity domains, explaining how they are interconnected.

Answer: The domains include: network security (protecting communication infrastructure), application security (protecting software), identity and access management (controlling who can access what), threat intelligence (studying and analyzing threats), incident response (handling attacks), digital forensics (post-incident investigation), system security (protecting operating systems and platforms), and compliance and privacy (meeting regulatory requirements). They are interconnected because a real-world attack typically crosses multiple domains: for example, a phishing email exploits social engineering, leads to credential theft (identity & access), enables network access (network security) and triggers a coordinated response (incident response) that may involve forensic investigation.

Question 4: What is the asymmetry between attack and defense? What implications does it have for cybersecurity professionals?

Answer: The asymmetry between attack and defense is the principle that the defender must protect an entire system’s perimeter, while the attacker only needs to find a single weak point to succeed. The implications are profound: absolute security does not exist, and the defender’s work must focus on risk management — identifying the most critical assets, allocating resources where they matter most, and accepting that some residual risk will always remain.

Question 5: What is the difference between a penetration tester and a cybercriminal? Why is this distinction fundamental from an ethical and legal standpoint?

Answer: The difference lies not in technical skills, which can be identical, but in authorization and intent. A penetration tester operates under a written agreement, within a defined scope, with the goal of identifying vulnerabilities and improving security. A cybercriminal acts without authorization, with the intent to damage, steal or extort. This distinction is fundamental because unauthorized access to computer systems is a criminal offense, regardless of whether actual damage is caused.

Question 6: Why are people considered “the weakest link” in the cybersecurity chain?

Answer: People are considered the weakest link because they can be psychologically manipulated through social engineering techniques (phishing, pretexting, baiting) into revealing credentials, clicking malicious links, installing malware or violating security policies. Unlike technical systems, human behavior is unpredictable and cannot be “patched” like software. User training and awareness (security awareness) are the primary countermeasure.

Question 7: Choose one of the professional roles presented in the lesson and explain how their work concretely contributes to an organization’s protection.

Answer (example using the Security Analyst): The Security Analyst continuously monitors an organization’s systems and networks using tools such as SIEMs (Security Information and Event Management platforms), which aggregate and correlate logs from multiple sources. They analyze the alerts these tools generate, separating false positives from genuine threats. When they identify suspicious activity, they initiate escalation procedures and contribute to the incident response. Their work is critical because it represents the first line of defense: without continuous, skilled monitoring, an intrusion could go undetected for weeks or months, giving the attacker all the time needed to expand their foothold in the network and maximize the damage.

Next Lesson Preview

In the next lesson we will take a deep dive into the CIA Triad — Confidentiality, Integrity and Availability — the conceptual model on which every cybersecurity decision is built. You will learn to recognize which principle is at stake in any given scenario, to understand how each of the three pillars is concretely protected and to use the Triad as an analytical tool applicable to any context.

1 thought on “Hello world! Why cybersecurity matters, and what we are going to do about it”

Leave a Comment

Scroll to Top