Keselamatan Siber: Asas

px tanpa tajuk

1) WHAT IS THE DEFINITION OF CYBERSECURITY?

Online communications take place in cyberspace, which is described as an electronic medium of computer networks. Hundreds of thousands of networked computers, servers carrying large amounts of data, routers, modems, and switches make up this vast network. These are linked by tens of thousands of powerful optical fiber cables that run both on land and under the water, known as submarine cables. As a result, maintaining these networks is everyone’s responsibility, both individually and collectively.

Keeping this network safe for individuals, companies, and governments have now become a massive undertaking that necessitates a significant investment in both manpower and infrastructure. Cybersecurity has quickly become a fascinating and rewarding career for students to pursue.

2) CONCEPTS OF CYBER SECURITY

Individuals, small enterprises, large organizations, and government agencies are increasingly focusing on securing their systems against all types of cyber threats as a result of the rising number of cyber threats. Cybersecurity, in layman’s terms, is the act of defending standalone computers, a network of interconnected computers, individuals, organizations, and highly sensitive government and national security data against harmful cyber attacks. Adopting a number of Cybersecurity principles to meet the needs of the users is part of this approach.

Cyber Security principles and concepts for a novice include knowing how to protect yourself against email scams, malware, viruses, wi-fi security, financial scams, phishing scams, and safe use of internet resources like social media, among other things. Smartphones are becoming an increasingly important part of our daily lives and require some basic protection. To protect themselves, beginners must comprehend some basic ideas in cybersecurity and subscribe to anti-virus software for personal computers and small business networks.

Regular 2 or 3 step auto or manual backups of corporate data must be provided for in business premises in case of data loss due to a computer crash or hacking.

3) COURSES IN CYBERSECURITY

There are numerous basic Cybersecurity courses offered by various universities to help beginners understand concepts and feel comfortable with concerns that may appear complex at first.

A beginner can prepare for a course by reading a few materials such as

‘Cyberthreat, Know the Threat to Beat the Threat,’ by Bob Gourley.

NIST’s ‘Cybersecurity Framework.’

‘The five most common cyber-attacks is a list of the most common cyber-attacks. from the CSO

Attending a basic course can help beginners grasp what Cyber Security Basics are in simple words. Secure Wi-Fi/router/modem connections, anti-virus software, safe internet browsing, the dangers of clicking on unknown links, detecting phishing sites, common fraudster methods, SIM switching scams, safe use of credit cards, and digital payment apps, and more are covered in the basics. These are some of the fundamentals of cyber security for beginners that must be grasped before stepping into cyberspace. However, before delving deeper into this fascinating sector, the novice should be well-versed in the fundamentals of Cybersecurity and be aware of the dynamic nature of the ever-increasing difficulties that must be faced on a regular basis.

There are various organizations and websites that give trustworthy materials for understanding the fundamentals of cyber security. Many US agencies offer incredibly helpful tips, assistance, and up-to-date materials for both newcomers and veterans in the sector.

  • The National Security Agency (NSA) offers advice on how to keep a home network secure.
  • The FBI, or Federal Bureau of Investigation, offers advice on how to protect your computer from online scams.
  • US-CERT provides vital assistance for a newcomer setting up his computer and connecting to the internet for the first time.
  • The United States Computer Emergency Readiness Team (US-CERT) provides important information about viruses and online browser security.
  • The federal communication commission’s (FCC) website has Wi-Fi security suggestions.

Basic Cybersecurity topics can be studied through courses given by a variety of IT organizations. The beginner can choose the level of sophistication based on how he wants to proceed from here. If the goal is to learn merely the basics for personal computer use, home networking, and data security, the beginner can choose from a few of the free online courses now accessible.

If the goal is to make Cybersecurity a career choice, then medium to long-term diploma or certificate courses can be selected afterward with the help of IT specialists who can advise on the options. What matters here is your basic education level as well as your age when you begin as a novice. Starting with Cyber Security basics when you’re fresh out of school is a terrific way to get a foot in the door of this hard and fascinating subject.

In recent years, there has been a slew of new types of cyber-attacks. Many of them engage in denial of service attacks by sending huge spam emails or messages intended to bring down organizations’ servers and websites.

Ransomware is a newer threat in which an encrypted program is installed on the target company’s system, prohibiting them from accessing their files and programs. If the demanded ransom sum is not paid, their files will be deleted and their system will be crashed. If the ransom money is deposited into their account, they will be given access to a decryption key that will allow them to unlock their system. Some may employ this as a revenge assault to settle old scores and bring down an organization’s systems, with no intention of stopping the attack even if a ransom is paid.

Botnet attacks are carried out via a network of real and fake computers scattered across various continents to conceal their source. They can be used to send out social media messages and emails to a specific person or organization, as well as denial of service and data theft.

Learning about basic Cybersecurity ideas and vulnerabilities is catching on around the world, given the threats lying in cyberspace. To get a foothold in this industry and make a career out of it, beginners should begin with some fundamental Cybersecurity training.

4) CYBERSECURITY PRIMARY AREA

The CIA trinity, or core areas of cybersecurity, are confidentiality, information, and availability.

Everything revolves around information. All of this is contingent on the secrecy of information pertaining to an organization. Each person needs only a specific type and level of information, and the amount of information available rises as one progresses up the corporate ladder. Through a password and other security methods, each employee is properly trained to secure and maintain the confidentiality of all information available to him. A dedicated department is in charge of the organization’s entire cybersecurity, which is protected by an adequate firewall.

This is critical for data integrity since it ensures the accuracy, dependability, and consistency of data. It should not be vulnerable to unauthorized access, corruption, manipulation, or disclosure. If this occurs, there should be a well-defined procedure in place to detect and isolate the threat, as well as recover the data. Information accessibility is enabled by thorough risk assessments and the integration of appropriate hardware and software. It is tailored to the type of company, the sensitivity of the information housed, the overall risk profile, and all potential weaknesses.