Cyber Security – Introduction and Objectives

By | November 6, 2023

Cyber Security – Introduction and Objectives

Cyber security, often referred to as information security or IT security, is a multidisciplinary field dedicated to protecting computer systems, networks, and digital data from various forms of threats, attacks, and unauthorized access. It encompasses a wide range of practices, technologies, and measures aimed at safeguarding the confidentiality, integrity, and availability of digital assets. The main objectives of cyber security are as follows:

Cyber Security - Information Security

  1. Confidentiality:
    • Protecting sensitive information from unauthorized access: Confidentiality ensures that only authorized individuals or systems can access and view sensitive data. This is achieved through measures like encryption, access controls, and data classification.
  2. Integrity:
    • Maintaining the accuracy and reliability of data: Integrity focuses on ensuring that data is not tampered with, altered, or modified by unauthorized parties. Techniques like data validation, checksums, and digital signatures are used to maintain data integrity.
  3. Availability:
    • Ensuring that systems and data are accessible when needed: Availability ensures that digital resources are available and operational whenever required. Measures include redundancy, disaster recovery planning, and DDoS protection to prevent or mitigate disruptions.
  4. Authentication:
    • Verifying the identity of users and systems: Authentication methods like passwords, biometrics, and multi-factor authentication (MFA) are used to confirm the identity of individuals or devices accessing a system.
  5. Authorization:
    • Granting appropriate permissions and privileges: Authorization defines what users or systems are allowed to do once they are authenticated. It involves setting up access controls and permissions to restrict or allow specific actions.
  6. Non-repudiation:
    • Ensuring that users cannot deny their actions: Non-repudiation mechanisms, such as digital signatures, help prove the authenticity of actions or transactions, preventing users from denying their involvement.
  7. Accountability:
    • Tracking and logging activities: Cybersecurity aims to maintain an audit trail of actions taken within a system, making it possible to trace back and identify the source of any security incidents.
  8. Privacy:
    • Protecting personal and sensitive data: Cybersecurity plays a crucial role in safeguarding the privacy of individuals by implementing privacy controls, data encryption, and compliance with privacy regulations like GDPR or HIPAA.
  9. Threat detection and prevention:
    • Identifying and mitigating security threats: Cybersecurity measures involve the use of intrusion detection systems, firewalls, and antivirus software to detect and block or mitigate security threats such as malware, phishing, and other cyberattacks.
  10. Security awareness and education:
    • Ensuring that individuals and organizations are informed and trained in cybersecurity best practices to reduce the risk of human errors and vulnerabilities.
  11. Incident response and recovery:
    • Developing and implementing plans to respond to security incidents and recover from them effectively. This involves containment, investigation, and restoration of affected systems and data.

Cybersecurity is an ever-evolving field as new threats and vulnerabilities emerge, requiring continuous monitoring, assessment, and adaptation of security measures. The ultimate goal of cybersecurity is to create a secure and resilient digital environment, protecting the confidentiality, integrity, and availability of information and digital assets.


Leave a Reply

Your email address will not be published. Required fields are marked *