top of page

What is Cybersecurity?

Cyber Security refers to the technologies, processes and practices designed to protect networks, devices, app and data from any kind of cyber-attacks. Cyber security may also known as information technology (IT) security.

Coding Station

 Cybersecurity is the technology and process that is designed to protect networks and devices from attacks, damage, or unauthorized access. Cybersecurity is essential for a country’s military, hospitals, large corporations, small businesses, and other organizations and individuals since data is now the cornerstone of any organization. If that data is exploited, then there are a lot of risks. Now, we have understood what cybersecurity is, let’s see what the CIA triad is and how it is related to cybersecurity.

​

CIA Triad

​

The security of any organization starts with three principles: Confidentiality, Integrity, Availability. And next in this cyber security for beginners tutorial we will learn about the CIA Triad, which has served as the industry standard for computer security since the time of first mainframes.

Confidentiality

 The principles of confidentiality assert that only authorized parties can access sensitive information and functions. Example: military secrets.

Integrity

The principles of integrity assert that only authorized people and means can alter, add, or remove sensitive information and functions. Example: a user entering incorrect data into the database.

Availability

The principles of availability assert that systems, functions, and data must be available on-demand according to agreed-upon parameters based on levels of service.

Confidentiality

The principles of confidentiality assert that only authorized parties can access sensitive information and functions. Example: military secrets.

Intergity

The principles of integrity assert that only authorized people and means can alter, add, or remove sensitive information and functions. Example: a user entering incorrect data into the database.

Availability

The principles of availability assert that systems, functions, and data must be available on-demand according to agreed-upon parameters based on levels of service.

Information security aims to protect the users' private information from unauthorized access, identity theft. It protects the privacy of data and hardware that handle, store and transmit that data. Examples of Information security include User Authentication and Cryptography.

Network security aims to protect the usability, integrity, and safety of a network, associated components, and data shared over the network. When a network is secured, potential threats gets blocked from entering or spreading on that network. Examples of Network Security includes Antivirus and Antispyware programs, Firewall that block unauthorized access to a network and VPNs (Virtual Private Networks) used for secure remote access.

Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.

Application security includes all tasks that introduce a secure software development life cycle to development teams.

Types of CyberSecurity

bottom of page