Skip to content

Chapter 1 – Understanding IT Security

Before we dive into specific tools and techniques, it’s important to understand the foundation:
What is IT security, and why does it matter for everyday users?

In this chapter, you'll learn the three core principles of information security (confidentiality, integrity, availability) and get an overview of common threats.
We'll also explore what can go wrong and why regular users like you are just as much a target as large companies.

Clear foundational lessons help you build real security awareness without needing technical expertise.


1.1 The Three Pillars of IT Security (CIA Triad)

Pillar Meaning Security-Relevant Example
Confidentiality Only authorised people can read the data. Medical records transmitted over an end-to-end-encrypted patient portal.
Integrity Data remain correct and unaltered. A software update verified by a digital signature before installation.
Availability Systems and data are reachable when needed. An online-banking platform stays online during a DDoS attack because traffic is absorbed by a cloud-based mitigation service.

Why these three pillars matter

All three are required for a system to be secure.
If one fails, attackers might read, change, or block your data.


1.2 Common Threats You Should Know

  • Malware – e.g., ransomware, viruses
  • Phishing emails and fake login pages
  • Unsecured Wi-Fi – especially in hotels, airports, cafés
  • Social engineering – psychological tricks to get your credentials

These threats don’t require advanced hacking

Most attacks succeed because people trust too quickly, reuse passwords, or delay updates.


1.3 "I'm Not a Target, Right?"

Actually, you are – most attacks are automated:

  • Hackers scan the internet for outdated devices
  • Leaked passwords are reused in credential-stuffing attacks
  • Phishing is mass-mailed – whoever clicks, loses

Nobody is too small to be targeted

If you have a device, internet access, or a bank account, you are a potential target.


1.4 Real-Life Consequences

Scenario What could happen
Email account hacked Attacker resets passwords on Amazon, PayPal, etc.
Ransomware attack All files encrypted – pay ransom or lose everything
Public Wi-Fi access Login data intercepted without encryption

These are not just 'IT problems'

A single breach can affect your identity, finances, and even relationships.


1.5 Self-Check: How Safe Are You?

  • I use unique passwords for each of my accounts
  • I have enabled two-factor authentication (2FA) for important services like email or banking
  • My devices and apps are regularly kept up to date


Start with your email account

It’s the key to resetting other accounts—protect it with a strong password and 2FA first.


  • If all boxes are checked: You're already ahead of most people—keep it up!
  • If some are still open: No problem. This guide will walk you through every step.