Skip to main content

What is Cybersecurity....?

what is Cybersecurity..? 

 In simple term, cybersecurity is the protection of your cyber (or digital) assets or information system from attacks or unauthorised access that are aimed for exploitation. In other word, it means keeping everything 
you to do online safe, so no one steals your financial and personal to use for their own gain. The panama Papers, yahoo hack and Ashley Madison data breaches are to name a few of the recent high profile cyber attacks which have caused a great deal of damage to organization and common people 

The term 'cybersecurity' was coined in 1988 as a result of one of the first ever registered online virus: The Morris worm. The worm caused many computers connected to the Internet at the time to slow down to the point that they wear unusable. more recently, cybersecurity has come to signify a form of protection      from attacks designed to paralyse websites, financial network and other computer systems; by flooding them with data from outside computer 

Protecting your cyber assets involves three simple principles:Confidentiality,Integrity  and Availability  

Figure shows the cybersecurity triad:


1. Confidentiality: It means securing your Information so that only authorised users will be able to access and view them. This can be as simple as being aware of your surrounding to make sure that nobody is peeping on your screen from behind which is know as shoulder suffering. 
You may also use a privacy filter on your computer to minimise the chance of shoulder suffering. Other example include setting access controls such as login accounts with strong password
2. Integrity : Integrity simply means ensuring the information stay in its original form and its modified when transmitted over a network. This includes measure such as your protecting your system and data from unauthorised access and running integrity checks to ensure the critical data is not change.
3. Availability : Availability means ensuring that your system stay available 
to perform its intended function when required. The reason why this is the most 
important principle is because our unlimited goal is to secure our IT assets. It is not 
meaningful to have a security system which is always down. Measuring to increase 
your system availability include having backup and redundancies.  

Comments

Popular posts from this blog

Introduction of First Internet Network

 Iam deva borde and Iam a hacker certified by star certifiction   The Internet was not originally built to be what it is today. It was developed when computers  were hugs  and so expensive to own that only university, big business and a few governments had them. Originally, the the internet was designed to facilitate these massive computers to  communication each other by sending information (mainly text) back and forth. with the internet, the network began to take shape. It was only in 1969, the advanced Research Project Agency  Network (ARPANET)-------the first computer network was built.                                                             The Internet gradually grew, until the emergency og personal computer in the 1980s, and then it became widespread.  ABOUT ARPANET : The  ARPANET ...

Exploring Electronic Mail

Introduction   Email is the most commonly used mode of communication today. Information is communicated over email in different forms such as text, images, audio, and video. It is the main resource for business communication. As it has become an undetachable medium of communication, it attracts criminals or persons having malicious intent. Cybercriminals use email for sending spam, threats, phishing emails, propagating malicious software like viruses and worms, distributing illegitimate material like child pornography, and hoaxes, and using it for other criminal activities. Therefore, it is necessary to secure our email system and to identify criminals, collect evidence against them and bring them to justice in a court of law. Emails suffer from multiple threats and there are several tools available in the market for fighting such threats. To secure emails, we need a multi-pronged approach. Multiple safety measures need to be implemented to have a safe online experience. In th...