Basics of Cybersecurity
Basics of Cybersecurity
Cybersecurity
Introduction to Cybersecurity
In this module, you will
● Understand what cyber security is about
● Know the types of security
● Know the history of cybersecurity and the need for it
● Understand what the CIA triad is.
What is Cybersecurity?
● It can be defined as the protection of information assets by addressing
threats to information processed, stored and transported by internetworked
information system.
● It is the application of technologies, processes and controls to protect
systems, networks, programs, devices and data from cyber attacks.
● It aims to reduce the risk of cyber attacks and protect against the
unauthorized exploitation of systems, networks and technologies.
● Cybersecurity is the practice of protecting critical systems and sensitive
information from digital attacks.
Types of Security
● Network security
● Application security
● Cloud security
● Phishing
● Denial-of-service
● Malware
● Man-in-the-middle
● Sql Injection
History of Cybersecurity
● With the internet becoming available to the public, more people began
putting their personal information online. Organised crime entities saw this
as a potential source of revenue and started to steal data from people and
governments via the web. By the middle of the 1990s, network security
threats had increased exponentially and firewalls and antivirus programmes
had to be produced on a mass basis to protect the public.
● New virus and malware numbers exploded in the 1990s, from tens of
thousands early in the decade growing to 5 million every year by 2007. By
the mid-‘90s, it was clear that cybersecurity had to be mass-produced to
protect the public. One NASA researcher developed the first firewall
program, modeling it on the physical structures that prevent the spread of
actual fires in buildings.
2000s: Threats diversify and multiply
The CIA triad is a model designed to guide policies for information security within
an organization. It can be broken down into:
● Confidentiality
● Integrity
● Availability
● Non-repudiation
Confidentiality