SOLID STATE PRESS
← Back to catalog
Cybersecurity and Encryption Basics cover
Coming soon
Coming soon to Amazon
This title is in our publishing queue.
Browse available titles
Computer Science

Cybersecurity and Encryption Basics

A High School & College Primer on Keeping Data Safe

You have a test on cybersecurity next week — or your CS class just hit encryption and nothing is clicking. Maybe you need to explain to your kid why passwords get "hashed" instead of just stored. Either way, this guide gets you there fast.

**TLDR: Cybersecurity and Encryption Basics** covers everything a high school or early college student needs to understand how data is actually protected online. Starting with the foundational CIA triad (Confidentiality, Integrity, Availability), the book walks through the attacks you hear about in the news — phishing, malware, man-in-the-middle — and shows exactly how they work. Then it builds up the three pillars of modern cryptography: symmetric encryption (AES, with the Caesar cipher as a stepping stone), asymmetric encryption and digital signatures (RSA explained without graduate-level math), and cryptographic hashing for passwords and file integrity. The final section traces a real HTTPS handshake so you can see how all three pieces fit together in the browser you use every day.

This is a cybersecurity concepts guide for beginners — not a 400-page textbook. Every term is defined the first time it appears. Every idea comes with a concrete example or worked numbers. The whole book is designed to be read in one focused sitting before a class, exam, or tutoring session.

If you want a short, honest intro to how encryption works for beginners, pick this up and start reading today.

What you'll learn
  • Define the CIA triad (confidentiality, integrity, availability) and use it to classify security goals
  • Recognize common attack types: phishing, malware, password attacks, and man-in-the-middle
  • Explain the difference between symmetric and asymmetric encryption and when each is used
  • Describe how hashing differs from encryption and why it's used for passwords and integrity checks
  • Trace what happens during an HTTPS connection, including the role of certificates and key exchange
  • Apply basic security hygiene: strong passwords, MFA, and recognizing suspicious links
What's inside
  1. 1. What Cybersecurity Actually Protects
    Introduces the CIA triad and the basic vocabulary of threats, vulnerabilities, and attackers.
  2. 2. Common Attacks and How They Work
    Walks through phishing, malware, password attacks, and man-in-the-middle attacks with concrete examples.
  3. 3. Symmetric Encryption: Shared Secrets
    Explains how symmetric encryption works using AES and the Caesar cipher as a stepping stone, and why key distribution is the hard part.
  4. 4. Asymmetric Encryption and Digital Signatures
    Introduces public/private key pairs, RSA at a conceptual level, and how digital signatures prove authenticity.
  5. 5. Hashing: One-Way Functions for Integrity and Passwords
    Covers what cryptographic hashes are, how they differ from encryption, and how they're used for passwords (with salting) and file integrity.
  6. 6. Putting It Together: HTTPS and Everyday Security
    Traces a real HTTPS handshake to show how all three primitives combine, then gives practical hygiene takeaways.
Published by Solid State Press
Cybersecurity and Encryption Basics cover
TLDR STUDY GUIDES

Cybersecurity and Encryption Basics

A High School & College Primer on Keeping Data Safe
Solid State Press

Who This Book Is For

If you are a high school student looking for cybersecurity basics, a freshman working through an intro to cybersecurity course, or a student preparing for the AP Computer Science exam and trying to get a handle on cybersecurity concepts, this guide was written for you. It also works for self-studiers, tutors, and parents helping a student build a foundation before a test or project.

This is a computer science security primer covering how threats like phishing and man-in-the-middle attacks operate, how encryption works for beginners step by step, and how symmetric and asymmetric encryption are explained side by side so the difference actually sticks. It also covers hashing, digital signatures, and how HTTPS and TLS work explained through a real browser connection. About 15 pages, no filler.

Read straight through once to build the mental map, then slow down on the worked examples and trace each step yourself. Finish with the practice problems at the end to confirm what held and what needs another pass.

Contents

  1. 1 What Cybersecurity Actually Protects
  2. 2 Common Attacks and How They Work
  3. 3 Symmetric Encryption: Shared Secrets
  4. 4 Asymmetric Encryption and Digital Signatures
  5. 5 Hashing: One-Way Functions for Integrity and Passwords
  6. 6 Putting It Together: HTTPS and Everyday Security
Chapter 1

What Cybersecurity Actually Protects

Every time you log into a school account, send a message, or buy something online, some system somewhere is trying to ensure three things: that only the right people can see the data, that the data hasn't been tampered with, and that the data is actually reachable when you need it. Security professionals call this the CIA triad — not the intelligence agency, but a framework with three pillars: confidentiality, integrity, and availability.

Confidentiality means keeping information visible only to authorized people. Your medical records, your bank balance, your private messages — these should be readable only by you and whoever you've permitted. When confidentiality fails, private data leaks to people who shouldn't have it.

Integrity means keeping information accurate and unaltered. If someone intercepts your bank transfer and changes the destination account number, the data arrived — but it arrived wrong. Integrity protections detect or prevent that kind of tampering. A system can be confidential but still lack integrity: an attacker might not read your message but could change it in transit without you knowing.

Availability means systems and data are accessible when legitimate users need them. A hospital whose patient records are locked by ransomware hasn't had its data stolen — but the records are unreachable at a moment when lives may depend on them. Availability is often the overlooked third pillar, but attacks that simply knock services offline are among the most disruptive.

Every security decision you'll encounter in this book maps back to one or more of these three goals. When you ask "why does this matter?", the CIA triad is usually the answer.

Threats, Vulnerabilities, and the Attack Surface

To talk precisely about security, you need three more terms that people often blur together.

A vulnerability is a weakness in a system — a flaw in software, a misconfigured server, a password that was never changed from its default. Vulnerabilities exist whether or not anyone exploits them; they're latent problems.

A threat is a potential event that could harm a system. Threats are the "what could go wrong" — a thief who might pick a lock, a flood that might destroy a server room, a hacker who might exploit a vulnerability. Threats become dangerous when they meet vulnerabilities.

Keep reading

You've read the first half of Chapter 1. The complete book covers 6 chapters in roughly fifteen pages — readable in one sitting.

Coming soon to Amazon