240 likes | 2.44k Views
This document is about cyber security. In this, I describe about the cyber security basics for beginner. You'll learn about the Introduction to cyber security, key concepts and the need of cyber security.
E N D
An Introduction to CYBER SECURITY Basics For Beginner
The word "cyber security" refers to the protection of your online information provided by internet services. With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also. What is Cyber Security? The most serious issue is cybersecurity, as cyber threats and attacks are on the rise.
Cyber attacks are a broad word that refers to a variety of issues, but some of the most common are: 1. Tampering systems and data stored within 2. Exploitation of resources 3. Unauthorized access to the targeted system and accessing sensitive information 4. Disrupting the normal functioning of the business and its processes 5. Using ransomware attacks to encrypt data and extort money from victims
Need of Cyber Security Let's take a look at the many types of threats and attacks to better appreciate the necessity for Cyber Securityprocedures and practices.
Ransomware Botnet Attacks Social Engineering Attacks Cryptocurrency Hijacking Phishing
Cyber security is a wide term that is founded on three core concepts known as “The CIA Triad”. Key Concepts of Cyber Security
It establishes the rules that govern information access. Confidentiality refers to the safeguards in place to prevent cyber criminals and hackers from accessing sensitive information. Confidentiality
This ensures that the data remains consistent, accurate, and reliable throughout time. It means that data in transit should not be changed, altered, deleted, or accessed in an unauthorized manner. Integrity
All relevant components, such as hardware, software, networks, devices, and security equipment, should be maintained and upgraded to ensure availability. Availability
To implement an effective Cyber Security strategy, an organization's people, processes, computers, networks, and technology, whether large or little, should all share equal responsibility. Conclusion If you want to learn more, take this comprehensive Cyber Security Course in Noidafrom CETPA Infotech.
Any Queries? Contact: +91 9212172602 query@cetpainfotech.com https://www.cetpainfotech.com/