top of page

Cyber Security Introduction - Cyber Security Basics

What is cyber security?

"Cyber security is primarily about people, processes, and technologies working together to encompass the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, etc."


Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

  • The term cyber security refers to techniques and practices designed to protect digital data.

  • The data that is stored, transmitted or used on an information system.

  • It is made up of two words, one is cyber and other is security.

  • Cyber is related to the technology, which contains systems, network and programs or

Why is cyber security important?

Listed below are the reasons why cyber security is so important in what’s become a predominant digital world:

  • Cyber attacks can be extremely expensive for businesses to endure.

  • In addition to financial damage suffered by the business, a data breach can also inflict

  • Cyber-attacks these days are becoming progressively destructive. Cybercriminals are

  • Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.

  • Because of the above reasons, cyber security has become an important part of the business and the focus now is on developing appropriate response plans that minimize

  • But, an organization or an individual can develop a proper response plan only when he has a good grip on cyber security fundamentals.

Cyber security Fundamentals - Confidentiality

Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep the identity of authorized parties involved in sharing and holding data private and anonymous.

Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle (MITM) attacks, disclosing sensitive data. Standard measures to establish confidentiality include:

  • Data encryption

  • Two-factor authentication

  • Biometric verification

  • Security tokens


Integrity refers to protecting information from being modified by unauthorized parties. Standard measures to guarantee integrity include:

  • Cryptographic checksums

  • Using file permissions

  • Uninterrupted power supplies

  • Data backups


Availability is making sure that authorized parties are able to access the information when needed.

Standard measures to guarantee availability include:

  • Backing up data to external drives

  • Implementing firewalls

  • Having backup power supplies

  • Data redundancy

6 views0 comments
bottom of page