Thursday, July 9, 2020
Cybersecurity Fundamentals
Cybersecurity Fundamentals Cybersecurity Fundamentals Introduction to Cybersecurity Back Home Categories Online Courses Mock Interviews Webinars NEW Community Write for Us Categories Artificial Intelligence AI vs Machine Learning vs Deep LearningMachine Learning AlgorithmsArtificial Intelligence TutorialWhat is Deep LearningDeep Learning TutorialInstall TensorFlowDeep Learning with PythonBackpropagationTensorFlow TutorialConvolutional Neural Network TutorialVIEW ALL BI and Visualization What is TableauTableau TutorialTableau Interview QuestionsWhat is InformaticaInformatica Interview QuestionsPower BI TutorialPower BI Interview QuestionsOLTP vs OLAPQlikView TutorialAdvanced Excel Formulas TutorialVIEW ALL Big Data What is HadoopHadoop ArchitectureHadoop TutorialHadoop Interview QuestionsHadoop EcosystemData Science vs Big Data vs Data AnalyticsWhat is Big DataMapReduce TutorialPig TutorialSpark TutorialSpark Interview QuestionsBig Data TutorialHive TutorialVIEW ALL Blockchain Blockchain TutorialWhat is BlockchainHyperledger FabricWhat Is EthereumEthereum TutorialB lockchain ApplicationsSolidity TutorialBlockchain ProgrammingHow Blockchain WorksVIEW ALL Cloud Computing What is AWSAWS TutorialAWS CertificationAzure Interview QuestionsAzure TutorialWhat Is Cloud ComputingWhat Is SalesforceIoT TutorialSalesforce TutorialSalesforce Interview QuestionsVIEW ALL Cyber Security Cloud SecurityWhat is CryptographyNmap TutorialSQL Injection AttacksHow To Install Kali LinuxHow to become an Ethical Hacker?Footprinting in Ethical HackingNetwork Scanning for Ethical HackingARP SpoofingApplication SecurityVIEW ALL Data Science Python Pandas TutorialWhat is Machine LearningMachine Learning TutorialMachine Learning ProjectsMachine Learning Interview QuestionsWhat Is Data ScienceSAS TutorialR TutorialData Science ProjectsHow to become a data scientistData Science Interview QuestionsData Scientist SalaryVIEW ALL Data Warehousing and ETL What is Data WarehouseDimension Table in Data WarehousingData Warehousing Interview QuestionsData warehouse architectureTalend T utorialTalend ETL ToolTalend Interview QuestionsFact Table and its TypesInformatica TransformationsInformatica TutorialVIEW ALL Databases What is MySQLMySQL Data TypesSQL JoinsSQL Data TypesWhat is MongoDBMongoDB Interview QuestionsMySQL TutorialSQL Interview QuestionsSQL CommandsMySQL Interview QuestionsVIEW ALL DevOps What is DevOpsDevOps vs AgileDevOps ToolsDevOps TutorialHow To Become A DevOps EngineerDevOps Interview QuestionsWhat Is DockerDocker TutorialDocker Interview QuestionsWhat Is ChefWhat Is KubernetesKubernetes TutorialVIEW ALL Front End Web Development What is JavaScript รข" All You Need To Know About JavaScriptJavaScript TutorialJavaScript Interview QuestionsJavaScript FrameworksAngular TutorialAngular Interview QuestionsWhat is REST API?React TutorialReact vs AngularjQuery TutorialNode TutorialReact Interview QuestionsVIEW ALL Mobile Development Android TutorialAndroid Interview QuestionsAndroid ArchitectureAndroid SQLite DatabaseProgramming Introduction to Cyberse curity Last updated on May 18,2020 7.1K Views Archana Choudary Bookmark 2 / 5 Blog from Introduction To Cybersecurity Become a Certified Professional Adoption of Internet by businesses and enterprises has made mobile-banking, online shopping, and social networking possible. Whilst it has opened up a lot of opportunities for us, itsnot altogether a safe place because its anonymity also harbors cybercriminals.So, toprotect yourself against the cyber threats of today, you must have a solid understanding of cybersecurity. This article will help you get a grip on cybersecurityfundamentals.Lets take a look at the topics covered in this cybersecurity fundamentals article:The history of CybersecurityWhat is Cybersecurity?Why is cybersecurity important?The CIA TriadThe history of CybersecurityAbout fortyyears ago words like worms,viruses, trojan-horse, spyware, malware werent even a part of conventional information technology (IT) vocabulary.Cybersecurity only came into existence beca use of the development of viruses. But how did we get here?The history of cybersecurity began as aresearch project. Inthe 1970s, Robert Thomas,a researcher for BBN Technologies in Cambridge, Massachusetts,created the first computer worm. It was called The Creeper. The Creeper, infected computers by hopping from system to system with the message IM THE CREEPER: CATCH ME IF YOU CAN.Ray Tomlinson, the inventor of email,created a replicating program called The Reaper, the first antivirus software, which would chase Creeper and delete it.Late in 1988, a man named Robert Morris had an idea: hewanted to test the size of the internet.To do this, he wrote a programthat went through networks, invaded Unix terminals, and copied itself. The Morris worm was so aggressive that it slowed down computers to the point of being unusable.He subsequently became the first person to be convicted underComputer Fraud and Abuse Act.From that point forward, viruses became deadlier, more invasive, and harder t o control. Withit came the advent of cybersecurity.Cybersecurity Fundamentals | Understanding Cybersecurity Basics | EdurekaThis Edureka video on Cybersecurity Fundamentals will introduce you to the world of cybersecurity and talks about its basic concepts. What is cybersecurity?Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.The term cybersecurity refersto techniques and practices designed to protect digital data. The data that is stored, transmitted or used on an information system. After all, that is what criminal wants, data. The network, servers, computers are just mechanisms to get to the data.Effective cybersecurity reduces the risk of cyber-attacks and protects organizations and individuals from the unauthorized exploitation of systems, networks, and technologies.Robust cybersecurity implementation is roughly based around three key terms: people, processe s, and technology.This three-pronged approach helps organizations defend themselves from both highly organized attacks and common internal threats, such as accidental breaches and human error.The attacks evolve every day as attackers become more inventive, it is critical to properly define cybersecurity and understand cybersecurity fundamentals.Why is cybersecurity important?Listed below are the reasons why cybersecurity is so important inwhats become a predominant digital world:With each passing year, the sheer volume of threats is increasing rapidly.According to the report by McAfee, cybercrime now stands at over $400 billion, while it was$250 billion two years ago.Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage suffered by the business, adata breach can also inflict untold reputational damage.Cyber-attacks these days arebecoming progressively destructive. Cybercriminals are using more sophisticated ways to initiate cyber attacks. Regulations such as GDPR areforcing organizations into taking better care of the personal data they hold.Because of the above reasons, cybersecurity has become an important part of the business and the focus now is on developing appropriate response plans that minimize the damage in the event of a cyber attack. But, an organization or an individual can develop a proper response plan only when he has a good grip on cybersecurity fundamentals.Now that we know what cybersecurity is and why it is important, lets take a look at fundamental objectives of cybersecurity.The CIA TriadConfidentiality, integrity, andavailability, also known as theCIA triad, is a model designed to guide companies and organizations to form their security policies. Technically, cybersecuritymeans protecting information from unauthorized access, unauthorized modification, and unauthorized deletion in order to provide confidentiality, integrity, and availability.Lets explore thesecomponents and some of the informat ion security measures which are designed to assure the safety of each component.Cybersecurity Fundamentals ConfidentialityConfidentiality is about preventing the disclosure of data to unauthorized parties. It also means tryingto keep the identity of authorized parties involved in sharing and holding data private and anonymous. Often confidentiality is compromised by cracking poorly encrypted data,Man-in-the-middle(MITM) attacks, disclosing sensitive data.Standard measures to establish confidentiality include:Data encryptionTwo-factor authenticationBiometric verificationSecurity tokensIntegrityIntegrity refers to protecting information from being modified by unauthorized parties. It is arequirement that information and programs are changed only in a specified and authorized manner. Challenges that could endanger integrity include turning a machine into a zombie computer,embedding malware into web pages.Standard measures to guarantee integrity include:Cryptographic checksumsUsing fil e permissionsUninterrupted power suppliesData backupsAvailabilityAvailability is making sure that authorized parties are able to access the information when needed.Data only has value if the right people can access it at the right time.Information unavailability can occur due to security incidents such as DDoS attacks,hardware failures, programming errors, human errors.Standard measures to guarantee availability include:Backing up data to external drivesImplementing firewallsHaving backup power suppliesData redundancyAll cyber attacks have the potential to threaten one or more of the three parts of the CIA triad.Confidentiality, integrity, and availability all have to work together to keep your information secure. So, Its important to understand what the CIA Triad is, how it is used to plan and implement a quality security policy while understanding the various principles behind it.How much does cybersecurity jobs pay?With the widely reported success ofmassive global cyber-attacks, like WannaCry and Adylkuzz, companies are paying more than ever to land highly qualified cybersecurity professionalsto secure their most vulnerable assets. The average salary range for top cybersecurity job roles falls between $100,000 to $210,000.This brings us to the end of this article ond Cybersecurity Fundamentals. I hope you all had something new to learn.If you wish to learn cybersecurity and build a colorful career in cybersecurity, then check out ourCybersecurity Certification Trainingwhichcomes with instructor-led live training and real-life project experience.This training will help you understand cybersecurity in depth and help you achieve mastery over the subject.Got a question for us? Please mention it in the comments section of Cybersecurity Fundamentals and we will get back to you.Recommended blogs for you Top 10 Reasons To Learn Cybersecurity Read Article What Are SQL Injection Attacks And How To Prevent Them? Read Article How to become an Ethical Hacker? Read Artic le Cybersecurity Threats and State of Our Digital Privacy Read Article A Complete Guide to Nmap Nmap Tutorial Read Article MacChanger with Python- Your first step to Ethical hacking Read Article What is Ethical Hacking? An Introduction to Ethical Hacking Read Article Cybersecurity Fundamentals Introduction to Cybersecurity Read Article What Is Penetration Testing Methodologies and Tools Read Article ParrotOS vs Kali Linux: How to choose the Best? Read Article What is Cybersecurity? A Beginners Guide to Cybersecurity World Read Article Everything You Need to Know about DDOS Read Article How To Install Kali Linux? All You Need To Know Read Article All You Need to Know about Ethical Hacking using Python Read Article Steganography Tutorial A Complete Guide For Beginners Read Article A Quick Guide To Network Scanning for Ethical Hacking Read Article What is Computer Security? Introduction to Computer Security Read Article A Beginners Guide To Cybersecurity Framework Read Article Top 50 Cybersecurity Interview Questions and Answers Read Article Advantages And Disadvantages Of Ethical Hacking Read Article Comments 0 Comments Trending Courses in Cyber Security Cybersecurity Certification Course19k Enrolled LearnersWeekendLive Class Reviews 5 (7400)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.