Skip to main content

What is Cybersecurity....?

what is Cybersecurity..? 

 In simple term, cybersecurity is the protection of your cyber (or digital) assets or information system from attacks or unauthorised access that are aimed for exploitation. In other word, it means keeping everything 
you to do online safe, so no one steals your financial and personal to use for their own gain. The panama Papers, yahoo hack and Ashley Madison data breaches are to name a few of the recent high profile cyber attacks which have caused a great deal of damage to organization and common people 

The term 'cybersecurity' was coined in 1988 as a result of one of the first ever registered online virus: The Morris worm. The worm caused many computers connected to the Internet at the time to slow down to the point that they wear unusable. more recently, cybersecurity has come to signify a form of protection      from attacks designed to paralyse websites, financial network and other computer systems; by flooding them with data from outside computer 

Protecting your cyber assets involves three simple principles:Confidentiality,Integrity  and Availability  

Figure shows the cybersecurity triad:


1. Confidentiality: It means securing your Information so that only authorised users will be able to access and view them. This can be as simple as being aware of your surrounding to make sure that nobody is peeping on your screen from behind which is know as shoulder suffering. 
You may also use a privacy filter on your computer to minimise the chance of shoulder suffering. Other example include setting access controls such as login accounts with strong password
2. Integrity : Integrity simply means ensuring the information stay in its original form and its modified when transmitted over a network. This includes measure such as your protecting your system and data from unauthorised access and running integrity checks to ensure the critical data is not change.
3. Availability : Availability means ensuring that your system stay available 
to perform its intended function when required. The reason why this is the most 
important principle is because our unlimited goal is to secure our IT assets. It is not 
meaningful to have a security system which is always down. Measuring to increase 
your system availability include having backup and redundancies.  

Comments

Popular posts from this blog

Exploring Electronic Mail

Introduction   Email is the most commonly used mode of communication today. Information is communicated over email in different forms such as text, images, audio, and video. It is the main resource for business communication. As it has become an undetachable medium of communication, it attracts criminals or persons having malicious intent. Cybercriminals use email for sending spam, threats, phishing emails, propagating malicious software like viruses and worms, distributing illegitimate material like child pornography, and hoaxes, and using it for other criminal activities. Therefore, it is necessary to secure our email system and to identify criminals, collect evidence against them and bring them to justice in a court of law. Emails suffer from multiple threats and there are several tools available in the market for fighting such threats. To secure emails, we need a multi-pronged approach. Multiple safety measures need to be implemented to have a safe online experience. In this chapte

Network Security Threats

Network Security Threats Introduction: Security plays a very critical role in safeguarding networks that are connecting more and more people every day. Information that is being exchanged between networked computers is very vulnerable to attacks. This increases the security challenges for network security  professionals to protect the information and  identity of users connected globally. Network  security is needed in almost every field  and includes small and large organizations,  governmental  entities, homes, and  even countries at large.  Over the last few years, it has been observed that there is a massive increase in hacking and other malicious activities. Moreover, many threats are being created for the sole purpose of acquiring the personal information of users. Therefore, it is important to use a security program that can provide complete proactive protection, i.e., it can safeguard you before you get infected. In this chapter, we look at the categories of network security th