Introduction to Cyber Security
 |
| Cybersecurity |
Today I discussing what exactly cybersecurity is and how it affects our day to day work life but before we being with the details of cybersecurity let's consider this as an example in an office one day Quinn who is following his daily routine working on his computer trying to crunch the numbers work his data through but in the background, without his knowledge, there is a hacker who is trying to access the confidential files located on Quinn's computer through a vulnerability the hacker is able to access those files and he or she then transfers those files back to the hacker's computer so what can happen due to this legal ramification to the business loss of company secrets leakage of information maybe industrial espionage which basically means a competitor is trying to analyze a company a company's secrets and trying to gain access to their data or they could hold the company for ransom and ask them for money or sell it to criminals who can further dilute the information or misuse that information for the criminal activities anything is possible so it's very bad scenario if a hacker gets access to the company secrets so what is it that we're going to discuss in this article to start off with we're going to talk about
- What is cybersecurity?
- Why cybersecurity?
- How cybersecurity works?
- Who is a cybersecurity expert?
- Course and certification required
What is cybersecurity?
Cybersecurity is the technology and process that is designed to protect and devices from attack, damage, or unauthorized access.
The advantages of Cybersecurity
Protect your Business like in the previous example we just talk about an individual and his files being accessed what if the company server got compromised or their web applications got compromised and the databases leaked out so we want to protect our businesses from hackers.
which will result in increased productivity because people would then be in a very controlled environment concentrating on their work than worrying about cybercriminals it would inspire customer confidence where if I as an organization I'm going to audit myself I'm going to ensure that I'm complying to certain regulation my clients would feel more confident about sharing their information with me as an organization it will help me making my applications and websites more stable protect them from external threats and would also protect my customers or clients from cyber-attacks because I would be holding some amount of data for my customers and clients as well so I have to think about not only my organization the data that my organization owns but what I held or what I hold for my customers and clients as well so essentially what we want to achieve out of here is a design which we want to implement in a manner which will allow all these factors to in a standardized manner so why we do want and what would be the advantages of implementing cybersecurity
Now first
cybersecurity salary in India
cybersecurity course in India
cybersecurity salary
cybersecurity course
cybersecurity in India
why cybersecurity?
There are three main pillars of cybersecurity that we deal with since the inception of computers and they're known as confidentiality Integrity and availability tried also known as CIA not to be confused with the American intelligence agency but here we're looking at three different pillars where we want our data to remain confidential, the integrity of the data to be intact and the data to be made available at all points in time so let's talk about these three aspects
CIA
- The principles of confidentiality assert that information and functions can be accessed only by authorized parties Example:- military secrets
so for example even if you password protect your file what is that you're trying to do you're trying to prevent other users from accessing your data and peeping into your files so that your data remains confidential it is only shared with people who know the password
2. Integrity
- The principle of integrity asserts that information and functions can be added, altered, to removed only by authorized people and means
Example:- incorrect data entered by a user in the database this is where the trustworthiness of that data comes into the picture, where if the data is going to be changed.
for example, you have a spreadsheet that has a lot of information about users and their login activities and whatnot and you want to ensure that, that data is not modified by any unauthorized use so you're going to verify that the information is correct and is not modified by anybody, who is unauthorized.
3. Availability
This data is made available to all authorized users when and where they want it, right the principles
- The principle of availability assert that systems, functions, and data must be available on-demand according to agreed-upon parameters based on levels of service
Now this is where your service level agreement should come if
for example, when we log on to Gmail we always assume that Gmail is going to work and it's going to be available online at no point in time or very few times has it ever occurred that you've gone on to the internet typed in gmail.com and the website is not available in fact if the website doesn't open we figure out the internet is not working right but Gmail as a service is always made available
Now when we talk about threats to CIA the confidentiality integrity and availability we talk about them in two different parameters
- Cybercrime
- Hacking
Threats to CIA- Cybercrime
- What is Cybercrime?
Cybercrime is any criminal activity or any unauthorized activity that would involve the use of any computing device which would result in a security incident at the victim's
most cybercrimes are carried out in order to profit from them criminals would try to do phishing attacks to steal your money out of your bank accounts or who try to con you into giving out your credentials thus compromising your email accounts or your social media accounts and try to gain access to your identity cybercrime are generally carried out against computers or devices directly to damage or disable spread malware secret and steal secret information etc.
So it's talk about the motivation part of cybercrime, what would be the motivational aspect for a person to conduct such as activity right so basically to cause damage like wannacry happened in 2017 the perpetrators that used wanna cry probably gained a lot in the ransom that they demanded that data to be decrypted but it also cost the world a lot of money in profits that were lost.
Type of cybercrime?
- Computer-assisted crimes
confidentially, Integrity, and Availability have served as the industry standard for computer security since the time of the first mainframes
| Cybercrime is any criminals |
Introduction to UiPath:- UiPath is a leading Robotic Process Automation vendor providing a complete software platform to help the organization efficiently automate business. UiPath also offers a community edition to people who want to learn and implement RPA |