0% found this document useful (0 votes)
792 views

Cybersecurity and Operating Systems Management

Cybersecurity and operating systems management are necessary to protect privacy and confidential information as technology continues to develop and more information is shared online. There are two main threats: intruders who access information without permission, and malicious software like viruses. A cybersecurity system uses planning, policies, and technologies to secure information confidentiality, availability, and integrity by limiting unauthorized access, preventing cyber attacks, handling incidents, backing up data, and using tools like firewalls, encryption, and digital signatures. Proper cybersecurity management is essential to safely use technology and share information while protecting individuals and organizations.

Uploaded by

Jo Galang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
792 views

Cybersecurity and Operating Systems Management

Cybersecurity and operating systems management are necessary to protect privacy and confidential information as technology continues to develop and more information is shared online. There are two main threats: intruders who access information without permission, and malicious software like viruses. A cybersecurity system uses planning, policies, and technologies to secure information confidentiality, availability, and integrity by limiting unauthorized access, preventing cyber attacks, handling incidents, backing up data, and using tools like firewalls, encryption, and digital signatures. Proper cybersecurity management is essential to safely use technology and share information while protecting individuals and organizations.

Uploaded by

Jo Galang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybersecurity and Operating Systems Management

Galang, Monette P. – BSA Bridging Program Batch 1.1

Cybersecurity and Operating Systems Management

Our world is now revolving around the computer and internet, this brought us good benefits

to make our life easier but it also gives us threats that invade our privacy and confidentiality. As

we continue to development our technologies, the intruders, hackers and software viruses double.

The life of this generation has been posted all throughout the social media site and imagine the

stress that will you feel if someone is invading and manipulating your life without your consent

and will. People mind thinks differently we cannot control others to stop doing unnecessary and

illegal things, what we need to do is to properly manage and control the information we put in

internet, that’s why cybersecurity together with the technology is necessary to development to

avoid abominable things.

Before we develop our cybersecurity system we must first know the systems threats. There

are two general categories of it such as Intruders and Malicious software. Intruders are those

individuals who try to access the information without authority (Masquerader), or the one who has

authority to access and use the system but misuse it purpose (Misfeasor) and the one that takes

control and manage the system without authority (Clandestine User). Malicious Software are

programs that exploit vulnerabilities in computing systems, it has two types the parasitic is a kind

of malware that cannot exist independently and Independent Malware are scheduled programs like

bots and worms. These are some list of schemes that intruders or hackers do to access and control

the information system. First, social engineer where they deceive an individual to get the personal

information to access and control the account. The next scheme is password cracking. People

think putting up a password is a kind of security but hackers have ways to encrypt it by using

system and methods such as dictionary approach, hybrid algorithm, rule-based cracking paradigm

and brute force. Scanners are also type of intruders schemes where they attacked the weakest point
Cybersecurity and Operating Systems Management
Galang, Monette P. – BSA Bridging Program Batch 1.1

of the systems. IP (Internet Protocol) Spoofing is a schemes where the source of information has

been changed that will lead to system breakdown. And the last known schemes are call Trojan

Horses, it is a system that disguise as something useful but ended up as a virus that makes the

system stop. Intruders or Malicious Software are made by person, it also has weakest point that

may avoid or stop and this is the purpose of cybersecurity exist.

Cybersecurity came from the word cyber which means things related to information

technology and security which means to protect or secure somethings. Cybersecurity is the systems

where information technology is being manage, control and secure. The purpose of cybersecurity

is to secure the confidentiality, availability and integrity of the information. As the number of user

and information we put in a system or internet increase throughout the time, cybersecurity and

operating management play vital roles keep the information private, safe and confidential. A

cybersecurity management system must have planning, policy and technologies.

In managing a system, planning is required to attain our primary objective which is to

protect the corporate assets such as system, networks, data and application. These are things we

must invest in developing our cybersecurity system, first we must have knowledge on how we will

implement and use the system, second we must train and direct the people who will handle the

tools and system that will be used and the technologies itself.

After planning, a policy must be drive of. Policy will be the guide to manages the risk of

cyber-attacks by putting in depth defense. Policies will cover the password management,

proprietary information, anti-virus, incident handling and back and recovery. Password

management is the first line of defense where its controls who has the right to access the systems.

Anti-virus is a pre-defense mechanism that prevent cyber-attacks before it may cause problems.

Incident handling will focus on how the organization will manage when the incident occurs.
Cybersecurity and Operating Systems Management
Galang, Monette P. – BSA Bridging Program Batch 1.1

Backup is the process of having a copies of information in case the original data loss and recovery

system is the process of retaining the old data. And Proprietary Information is the process of how

the information will be handle and manage through time. Regular evaluation is necessary so we

can tell the policy we are implementing is effective and efficient and our objective has been

achieved.

Technologies are the center of cybersecurity system. Technologies such as perimeter

defense, backup and recovery, encryption and digital signature are example of cybersecurity

system. Perimeter defense limits the outgoing or ingoing information in the system. This was set

to protect the resources of the information, the host of the system and the system itself. These

solution includes the following firewalls, routers, intrusion detection and virtual private networks.

Backup and recovery system are responsible in saving and availability of the information in case

the system have corrupted. Encryption is a technique applied cryptographic algorithms such as

passwords, usernames, digital signatures and etc. that will provide the access, confidentiality,

integrity, authenticity of the information.

Technologies comes up with many positive things in our life, where sometimes we rely our

life on it. Putting up confidential information in a system where everyone has access may danger

a life of an individual or an organization, so it is essentials to put up a defense mechanism like

cybersecurity management system that provides protection in our data, network, applications and

system.

You might also like