DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Related

  • Efficient ITSM Incident Resolution: Leveraging Azure AI Services for Quick Solutions
  • A Framework for Maintaining Code Security With AI Coding Assistants
  • Unlocking the Power of Configuration Management Database (CMDB)
  • Enhancing Code Clarity With Python Namedtuples

Trending

  • Behavior-Driven Development (BDD) Framework for Terraform
  • Advanced-Data Processing With AWS Glue
  • RRR Retro and IPL for Rewards and Recognition
  • Minimum Viable Elevator [Comic]

The Fundamentals of Cybersecurity

Learn more about the basics of cybersecurity and the CIA triad.

By 
Archana Choudhary user avatar
Archana Choudhary
·
May. 15, 19 · Presentation
Like (2)
Save
Tweet
Share
9.2K Views

Join the DZone community and get the full member experience.

Join For Free

Adoption of the IoT by businesses and enterprises has made mobile banking, online shopping, and social networking possible. While it has opened up a lot of opportunities for us, its not altogether a safe place because its anonymity also harbors cybercriminals. So, to protect yourself against the cyber threats of today, you must have a solid understanding of cybersecurity. This article will help you get a grip on cybersecurity fundamentals.

Let’s take a look at the topics covered in this cybersecurity fundamentals article:

  1. The history of cybersecurity
  2. What is cybersecurity?
  3. Why is cybersecurity important?
  4. The CIA Triad

The History of Cybersecurity

About forty years ago, words like worms, viruses, trojan-horse, spyware, malware weren’t even a part of conventional information technology (IT) vocabulary. Cybersecurity only came into existence because of the development of viruses. But how did we get here?

The history of cybersecurity began as a research project. In the 1970s, Robert Thomas, a researcher for BBN Technologies in Cambridge, Massachusetts, created the first computer “worm.” It was called The Creeper. The Creeper, infected computers by hopping from system to system with the message “I’M THE CREEPER: CATCH ME IF YOU CAN.” Ray Tomlinson, the inventor of email, created a replicating program called The Reaper, the first antivirus software, which would chase Creeper and delete it.

Late in 1988, a man named Robert Morris had an idea: he wanted to test the size of the Internet. To do this, he wrote a program that went through networks, invaded Unix terminals, and copied itself. The Morris worm was so aggressive that it slowed down computers to the point of being unusable. He subsequently became the first person to be convicted under the Computer Fraud and Abuse Act.

From that point forward, viruses became deadlier, more invasive, and harder to control. With it came the advent of cybersecurity.

What Is Cybersecurity?

Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.

The term cybersecurity refers to techniques and practices designed to protect digital data — the data that is stored, transmitted, or used on an information system. After all, that is what a criminal wants: data. The network, servers, and computers are just mechanisms to get to the data. Effective cybersecurity reduces the risk of cyber-attacks and protects organizations and individuals from the unauthorized exploitation of systems, networks, and technologies.

Robust cybersecurity implementation is roughly based around three key terms: people, processes, and technology. This three-pronged approach helps organizations defend themselves from both highly organized attacks and common internal threats, such as accidental breaches and human error.

The attacks evolve every day. As attackers become more inventive, it is critical to properly define cybersecurity and understand cybersecurity fundamentals.

Why Is Cybersecurity Important?

Listed below are the reasons why cybersecurity is so important in what’s become a predominantly digital world:

  • With each passing year, the sheer volume of threats is increasing rapidly. According to the report by McAfee, cybercrime now stands at over $400 billion, while it was $250 billion two years ago.
  • Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage suffered by the business, a data breach can also inflict untold reputational damage.
  • Cyber-attacks, these days, are becoming progressively destructive. Cybercriminals are using more sophisticated ways to initiate cyber attacks.
  • Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.

Because of the above reasons, cybersecurity has become an important part of the business, and the focus, now, is on developing appropriate response plans that minimize the damage in the event of a cyber attack. But, an organization or an individual can develop a proper response plan only when he has a good grip on cybersecurity fundamentals.

Now that we know what cybersecurity is and why it is important, let’s take a look at fundamental objectives of cybersecurity.

The CIA Triad

Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide companies and organizations to form their security policies. Technically, cybersecurity means protecting information from unauthorized access, unauthorized modification, and unauthorized deletion in order to provide confidentiality, integrity, and availability.

Let’s explore these components and some of the information security measures which are designed to assure the safety of each component.

ConfidentialityCIAtriad - Cybersecurity Fundamentals - Edureka

Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep the identity of authorized parties involved in sharing and holding data private and anonymous. Often, confidentiality is compromised by cracking poorly encrypted data, man-in-the-middle (MITM) attacks, and disclosing sensitive data.

Standard measures to establish confidentiality include:

  • Data encryption
  • Two-factor authentication
  • Biometric verification
  • Security tokens

Integrity

Integrity refers to protecting information from being modified by unauthorized parties. It is a requirement that information and programs are changed only in a specified and authorized manner. Challenges that could endanger integrity include turning a machine into a “zombie computer,” embedding malware into web pages.

Standard measures to guarantee integrity include:

  • Cryptographic checksums
  • Using file permissions
  • Uninterrupted power supplies
  • Data backups

Availability

Availability is making sure that authorized parties are able to access the information when needed. Data only has value if the right people can access it at the right time. Information unavailability can occur due to security incidents such as DDoS attacks, hardware failures, programming errors, and human errors.

Standard measures to guarantee availability include:

  • Backing up data to external drives
  • Implementing firewalls
  • Having backup power supplies
  • Data redundancy

All cyber attacks have the potential to threaten one or more of the three parts of the CIA triad. Confidentiality, integrity, and availability all have to work together to keep your information secure. So, it’s important to understand what the CIA Triad is and how it is used to plan and implement a quality security policy, while understanding the various principles behind it.

Data redundancy IT

Published at DZone with permission of Archana Choudhary, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Efficient ITSM Incident Resolution: Leveraging Azure AI Services for Quick Solutions
  • A Framework for Maintaining Code Security With AI Coding Assistants
  • Unlocking the Power of Configuration Management Database (CMDB)
  • Enhancing Code Clarity With Python Namedtuples

Partner Resources


Comments

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: