This document provides an overview of IT infrastructure components and cybersecurity threats. It defines common security terms like authentication, malware, firewalls, and phishing. It describes network components such as NICs, switches, hubs, routers, and modems. The document outlines organizational infrastructure loopholes and common cybersecurity threats to businesses like phishing, ransomware, and accidental data sharing. It provides recommendations for preventing these threats, including using two-factor authentication, limiting access to servers and data, and ensuring all software and hardware is kept updated.
Related topics: