Understanding Cyber Security
Understanding Cyber Security
Understanding Cyber Security
Cyber security is a crucial aspect of modern technology that involves protecting computer systems,
networks, and data from digital attacks, unauthorised access, and damage. With the increased
prevalence of digital technologies, the importance of cyber security cannot be overstated. It ensures
that the confidentiality, integrity, and availability of information and resources are safeguarded.
What Is Cyber Security?
Importance of Cyber Security
Key Elements of Cyber Security
Cyber security includes a range of practices and technologies designed to
protect digital systems from various threats. It is essential for maintaining
the safety and functionality of information systems in the face of ever-
evolving cyber threats.
- Preventing Data Breaches: Protects personal and financial information from being stolen or
compromised, which can lead to identity theft and financial loss.
- Securing Business Operations: Ensures that businesses can operate smoothly without
interruptions caused by cyber attacks, which can lead to damage of a business' finances and
reputation.
- Protecting National Security: Safeguards critical infrastructure and government data from cyber
espionage and attacks that could undermine national security and public safety.
- Enhancing Consumer Trust: Builds trust among consumers and clients through a commitment to
protecting their data and privacy.
Cyber threats come in a variety of forms, each presenting unique challenges to security.
Understanding these threats helps in developing effective defence strategies.
Malware
Phishing
Ransomware
DDoS Attacks
Social Engineering
Cyber security has evolved significantly over the decades, adapting to the growing complexity and
sophistication of cyber threats. Understanding the historical development of cyber security helps
provide context for current practices and future advancements.
Early Beginnings
Growth of Network Security
Emergence of the Internet
Creeper Virus (1971): One of the first known viruses, Creeper, was created
as an experiment, leading to the creation of the Reaper programme to delete
it, marking the beginning of antivirus development. As computer networks
expanded, so did the scope and scale of security threats, necessitating more advanced security
measures.
1980s: The rise of personal computers and the spread of networks saw an increase in cyber threats.
The introduction of the first antivirus software aimed to combat the increasing number of computer
viruses.
Morris Worm (1988): The Morris Worm, one of the first widespread internet worms, caused
significant disruptions and highlighted the need for network security protocols. The widespread
adoption of the internet in the 1990s brought new challenges and opportunities for cyber security.
1990s: The commercialization of the internet led to the proliferation of e-commerce, making cyber
security a critical concern for protecting financial transactions and personal information.
Firewalls: The development of firewalls provided a barrier between internal networks and external
threats, becoming a fundamental security tool.
Integrity ensures that information is accurate and trustworthy. It protects data from being altered by
unauthorized individuals, maintaining its original state.
Hashing: Generate a unique hash value for data, which changes if the data is modified, allowing for
the detection of alterations.
Digital Signatures: Use digital signatures to verify the authenticity and integrity of a message or
document, ensuring it has not been tampered with.
Checksums: Calculate checksums for data to detect errors or alterations, ensuring the data
received is the same as the data sent.
Audit Trails: Maintain logs of all access and changes to data, allowing for the tracking and
verification of data integrity.
Availability ensures that information and resources are accessible to the authorised users whenever
needed. It involves maintaining the functionality of systems and services to prevent disruptions.
Failover Mechanisms: Use failover mechanisms that automatically switch to a standby system if
the primary system fails, ensuring continuous availability.
Load Balancing: Distribute workloads across multiple systems to prevent any single system from
becoming a bottleneck, ensuring smooth operation.
Regular Maintenance: Perform regular maintenance and updates to systems to prevent outages
and address vulnerabilities that could impact availability.
Availability ensures that information and resources are accessible to the authorised users whenever
needed. It involves maintaining the functionality of systems and services to prevent disruptions.
Redundancy: Implement redundant systems and backups to ensure availability in case of
hardware/software failures.
Failover Mechanisms: Use failover mechanisms that automatically switch to a standby system if
the primary system fails, ensuring continuous availability.
Load Balancing: Distribute workloads across multiple systems to prevent any single system from
becoming a bottleneck, ensuring smooth operation.
Regular Maintenance: Perform regular maintenance and updates to systems to prevent outages
and address vulnerabilities that could impact availability.
Authorization is the process of determining whether an authenticated user
has permission to access a resource or perform an action. It ensures that all
users have appropriate access levels.
- Log Management: Collecting and managing logs that record user activities, system events, and
access attempts. Logs are essential for auditing and forensic analysis.
- Audit Trails: Maintaining detailed records of system activities, which can be reviewed to ensure
compliance with security policies and investigate incidents.
- Usage Monitoring: Continuously monitor system usage to detect unusual patterns or unauthorised
activities that may indicate a security breach.
- Reporting: Generating reports from logs and audit trails to provide insights into user activities,
access patterns, and potential security issues.