Overview
Cybersecurity involves protecting data that exists on any computer, especially when they are connected to the internet. Data security allows for online services such as banking, shopping, communicating, etc. A cyberattack seeks to exploit vulnerabilities in a system's security. There are various methods that are utilized when attempting to penetrate a computer's security. Fortunately, there is a great deal of information on how to deal with cyberattacks.
Key Concepts:
CIA Triad
- Confidentiality: Data can only be seen by those authorized to do so.
- Integrity: Data can only be changed by those authorized to do so.
- Availability: Data is available as much as possible.
Malware
- Viruses
- Worms
- Trojans
- Ransomware
Phishing
Attackers attempt to trick individuals into revealing sensitive information by impersonating legitimate entities.Network Security
- Encryption
- Firewalls
- Intrusion Detection and Prevention System (IDPS)