Basic Concepts in Cybersecurity Blog Post

Gunay

Gunay Alizada

Basic Concepts in Cybersecurity

3 min read
·
Apr 14, 2025
--
Hello everyone 😊 Today, let’s learn about the basic concepts in the field of cybersecurity. The topics we’ll discuss 👇
Red and Blue Teams
Types of Hackers
Malware
Phishing

Let’s begin our discussion ☕

First, let’s look at the difference between the Red Team and the Blue Team. Both teams consist of cybersecurity professionals, but their responsibilities are different. The Red Team ensures security through offense, while the Blue Team does so through defense.
The Red Team tests security by simulating cybercriminal scenarios and helps fix discovered vulnerabilities. The Blue Team, on the other hand, implements preventive measures in advance and continuously monitors and analyzes systems. After an attack occurs, they try to minimize the damage.
In short, both teams aim to protect security — but through different approaches. 🧑‍💻
But are all hackers malicious? No!

Let’s take a look at the different types of hackers:

White Hat Hackers — These are the cybersecurity professionals we discussed earlier. 👩‍💻
Black Hat Hackers — These are cybercriminals. 🥷
Gray Hat Hackers — These individuals can’t be clearly labeled as either cybercriminals or cybersecurity professionals. They may harm systems they choose, for example, targeting enemy states. Or they might access a system without permission and ask for money in exchange for fixing a vulnerability they discovered. Often, these hackers are driven by a desire to show off their skills. 🦹‍♀️
Note: Accessing any system without permission is strictly prohibited and may result in criminal liability under the law.

So, what is Malware?

Malware refers to malicious code written to infiltrate devices, cause harm, and steal data or money.
For example, you might install a program that contains a backdoor, and without your knowledge, that code runs on your device — damaging your system or stealing your sensitive information.
A common example of backdoors is the Trojan Horse 🐴. This name comes from Greek history. During the Trojan Wars, the Greeks built a large wooden horse and sent it to their enemies as a gift. But inside the horse were hidden Greek soldiers.
Without diving too deep into history, let’s get back to the topic 🙂 This type of malicious software works with the same logic (just like the hidden soldiers). A Trojan Horse disguises itself as useful software, and once you install it, it begins to harm you. 🥷

Finally, let’s touch on the topic of Phishing 🎣

Most likely, you’ve all received random links from unknown numbers or emails. You click on those links, enter your personal information, and instantly — that information is stolen.
I hope everything was clear to you 😊
If you have any additional questions, thoughts, or suggestions, feel free to leave your comments below the blog. See you next time 👋
Like this project

Posted Jul 19, 2025

In this article I explained what cybersecurity really is, why it matters, and how the biggest security risks often come from human behavior not just code.

Likes

0

Views

1

Timeline

Apr 14, 2025 - Apr 14, 2025