Cyber Security 100
Cyber Security 100
Cyber:
The term "cyber" originates from the Greek word "Kubernetes," meaning "steersman"
or "governor." It was first used in the context of "cybernetics," a field of study that
examines regulatory systems and communication in animals and machines.
In modern usage, "cyber" relates to computers, information technology, and virtual
reality, typically referring to the digital environment of the internet and networks.
Security:
"Security" refers to the state of being free from danger or threat. It involves measures
taken to protect against unauthorized access, damage, theft, and other threats to assets,
information, and people.
Cyber Security:
1. Early Beginnings:
o 1960s: The foundation of cyber security was laid with the development of
ARPANET, the precursor to the internet. Early security efforts focused on
physical security and basic access controls.
2. Emergence of Threats:
o 1970s-1980s: The first computer viruses, like the "Creeper" virus, appeared,
leading to the creation of antivirus software. This period saw an increasing
need for protecting data and software as computer usage spread.
3. Commercialization of the Internet:
o 1990s: As the internet became widely used for commercial purposes, cyber
threats grew in complexity and frequency. Firewalls and intrusion detection
systems (IDS) were developed to counter these threats.
4. Modern Era:
o 2000s-Present: The evolution of sophisticated threats such as Advanced
Persistent Threats (APTs), ransomware, and state-sponsored cyber attacks has
made cyber security a critical field. The focus has expanded to include
proactive threat detection, advanced analytics, and machine learning to combat
evolving cyber threats.
CIA Triad:
1. Confidentiality: Ensures that information is accessible only to those authorized to
access it. This includes protecting data from unauthorized access and disclosure.
2. Integrity: Ensures that information is accurate and reliable, and that it has not been
altered or tampered with by unauthorized individuals.
3. Availability: Ensures that information and resources are available to authorized users
when needed. This includes maintaining the functionality of systems and networks.
Threats to CIA:
1. Confidentiality Threats:
o Phishing Attacks: Attempts to steal sensitive information through deceptive
emails or websites.
o Data Breaches: Unauthorized access to confidential data.
2. Integrity Threats:
o Malware: Malicious software that can alter or destroy data.
o Man-in-the-Middle Attacks: Interception and alteration of communication
between two parties.
3. Availability Threats:
o DDoS Attacks: Distributed Denial of Service attacks that overwhelm systems,
making them unavailable to users.
o Ransomware: Malware that locks users out of their systems or data until a
ransom is paid.
Cyber security is essential in today's digital age to protect data, systems, and networks from cyber
threats. Understanding its origins, importance, and basic concepts is critical for anyone looking to
safeguard their personal information or pursue a career in this vital field. Cyber security not only
prevents financial and reputational damage but also ensures compliance with legal requirements and
contributes to national security. With the increasing complexity of cyber threats, continuous learning
and adaptation are necessary to stay ahead in this ever-evolving field.