Monday 30 January 2017

Introduction to Cybersecurity

Introduction to Cybersecurity


The Evolution of Cybersecurity Computer security. Network security. Information security. Cybersecurity. All of these terms are used to describe the protection of information assets. Why have there been so many changes in the way we refer to security?


Safeguarding information has been a priority for as long as people have needed to keep information secure and private. Even simple encryption techniques such as Caesar ciphers were created to ensure confidentiality. But as time and technology move forward, so do the demands of security. Today, the objective of information security is threefold, involving the critical components of confidentiality, integrity and availability. All three components
are concerned with the protection of information. Confidentiality means protection from unauthorized access, while integrity means protection from unauthorized modification, and availability means protection from disruptions in access.


In current discussions of security, there are references to both “cybersecurity” and “information security.” The terms are often used interchangeably, but in reality cybersecurity is a part of information security. Marketing, vendors and analysts often use the term “cyber” too broadly, due to the increasingly complex nature of information  in the digital age. Additionally, the interconnected nature of critical infrastructure systems has introduced a host of new vulnerabilities with far-reaching implications. All of these factors have influenced the shift from information security to cybersecurity. Generally, cybersecurity refers to anything intended to protect enterprises and individuals from intentional attacks, breaches, incidents and consequences. More specifically, cybersecurity can be defined as “the protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems.”

No comments:

Post a Comment