What is the Goal of Cyber Security?
The goal of cyber security is to protect electronic information and systems from unauthorized access or damage. Cyber security includes the prevention of unauthorized access, use, disclosure, interception, or destruction of data.
It also includes the prevention of unauthorized access to computer systems, networks, and devices. Cybersecurity measures can be implemented at the individual, organizational, and national levels.
Look Here: What are the Best Laptops For Cyber Security Students? (Updated 2023)
What are the Three Pillars of Cyber Security?
There are different types of cyber security goals, but the three most important ones are confidentiality, integrity, and availability.
Confidentiality means that information is only accessible to authorized users. This is usually accomplished through encryption and access control measures. Here are methods to ensure Confidentiality:
- Encryption: Encryption is a process of transforming readable data into an unreadable format. This is done using a key, which is a piece of information that is used to encrypt and decrypt data. The key can be a password, a phrase, or a random string of characters.
- Access control: Access control measures are put in place to ensure that only authorized users can access information. This can be done through user authentication, which is the process of verifying the identity of a user.
Integrity means that information cannot be altered without authorization. This typically requires checksums or digital signatures. Here are methods to ensure Integrity:
- Checksums: A checksum is a mathematical function that is used to detect changes in data. It is typically used to verify the integrity of data that has been transmitted.
- Digital signatures: A digital signature is a mathematical function that is used to verify the authenticity of a message. It is used to ensure that the message has not been altered in transit.
Availability means that information is always accessible to authorized users. This can be accomplished through redundancy and performance optimization. Here are methods to ensure Availability is:
- Redundancy: Redundancy is the duplication of data or components. This is done in order to ensure that information is available even if one component fails.
- Failover: Failover is the process of switching to a backup system in the event of a failure. This is done in order to ensure that information is available even if one system fails.
Relationship between Confidentiality, integrity, and Availability
The relationship between confidentiality, integrity, and availability is often referred to as the CIA triad. This model is used to classify information security goals.
Importance of CIA in Cyber Security Goals?
The CIA triad is a model for classifying information security goals. It includes confidentiality, integrity, and availability.
The CIA triad is important because it helps organizations identify and prioritize their security goals. It is also a useful framework for thinking about the relationships between different security controls.
- For example, encryption can improve confidentiality, but it can also impede availability if it is not properly implemented.
What are some Cyber Security Threats?
There are many different types of cyber security threats. Some of the most common include:
- viruses
- worms
- Trojans
- phishing attacks
- SQL injection attacks