PERFECT 2Introduction.

Cybersecurity is also known as computer security, electronic information technology, or information technology security (IT Security). It is the protection of systems connected through internets such as hardware and software data, networks, and programs from cyber or digital attacks such as theft, damage, misdirection, or disruption of services provided.

Cybersecurity consists of two parts in the computing context – cyber and physical security. These two are usually used by enterprises to protect themselves against unauthorized access from hacking their data centers and other computerized systems.

For cybersecurity to be successful, it must have a lot of protection layers to cover the computers, networks, or data. To create a secure and effective defense against cyberattacks, an organization must have a great rapport between the people of the organization, the processes, and the technology. They must complement each other:

  • Every employee needs to know what to do with cyber threats to be protected. Every cybersecurity staff needs frequently updated on the most recent risks, solutions, and qualifications.
  • In every documented process, there should be clearly defined roles, responsibilities, and procedures. There is a constant evolvement of cyber threats. Therefore, processes need to be reviewed from time to time.
  • Technology can reduce cyber risk, from access control to installing antivirus software.

We can divide cybersecurity into common categories:

Network security.

Network security is a practice in which a secured computer network prevents access from intruders, be it targeted attackers or opportunistic malware.

Application security.

This kind of protection is used to keep software and devices free from every type of threat. When an application is compromised, it can provide access to data that it is supposedly protected in the first place. The success of security is dependent on its design stage, well before a device or program gets deployed.

Information security.

Information security is used to protect both the privacy and the integrity of data while in storage and transit. Operational security  Operational security comprises of all the processes and decisions used in protecting and handling data assets. The permissions that are provided to users when accessing a network determine how and where data may be shared/stored.

Disaster recovery and business continuity.

Disaster recovery consists of ways an organization responds when faced with a security incident or any other issue that causes loss of data or operations. Disaster recovery is responsible for how the organization gets back its services and information to return to the same capacity it was operating at before the issue. Business continuity is the backup plan which the company falls back on while trying to run their operations with specific resources.

End-user education.

End-user education is meant for instances when the most unpredictable cybersecurity arises.  Anyone can, by accident, introduce a virus to a usually secure system by not following good security practices. There are vital steps involved in keeping up the security of any organization. Teaching users not to plug in unidentified USB drives, delete suspicious email attachments, and many other vital lessons they might need.

Cybersecurity has three principles:


This consists of any information that is sensitive and should only be known by a certain number of people. For example, if your credit card information ends up with criminals, your reputation and your credit score would most likely suffer a great deal.


This has to do with keeping information from being tampered. For instance, when malware installs itself into a hospital’s computer systems, it can wreak havoc. Malware can scatter patient records, lab results, and hinder hospital staff from gaining access to a patient’s allergies or drug interaction data.


It is the last principle of cybersecurity. It has to do with making sure that those who rely on accurate information can access it anytime they want to. Availability is usually related to integrity, but it can also include things like cyberattacks hindering people from accessing specific computers or from accessing the internet.

Source of Information: Susan Knolls. How to Protect You and Your Company from a Hacker: A Guide to Cybersecurity.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.