Copie de A

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Research plan:

Chapter 1: The concept of cybersecurity

Chapter 2: Types of Cybersecurity

Chapter 3: Cyber security objectives

Chapter 4: Data Protection and Cybersecurity

Chapter 5: The Importance of Cybersecurity

Introduction:

In our time, the Internet has become an essential part of our


daily lives, using it to communicate, shop, learn, entertain,
business, and many other things. However, the internet poses a
major cybersecurity challenge, as cybercrime and hacks have
become very common in recent times ,Cybersecurity is a field
concerned with protecting electronic systems and data from
cyber threats. This includes protections against intrusions,
malware, cyber-fraud, identity theft, and other cyberattacks.
Cybersecurity strategies are based on multiple technologies
such as encryption, password protection, intrusion detection
systems, analysis of normal behaviours, and others, with the
aim of ensuring the safety of information and vital systems of
institutions and individuals Therefore, we ask the following
question: What is cyber security?
Cyber security is defined as security that is concerned with the
application of technologies, processes, and controls; with the
aim of protecting systems, computer networks, programs,
devices, and data from exposure to electronic attacks and is
called information technology security, or electronic information
security .

Cybersecurity has evolved over time:

1- Early stages: In the beginnings of computing, cybersecurity


was limited to protection against viruses and malware. Security
concerns have been limited due to the low number of users and
range of network utilisation.

2- Evolution with the Internet: With the spread of the Internet in


the 1990s, the need to develop more complex security
technologies increased. New challenges have emerged such
as fishing attacks, cyber espionage, and denial-of-service
(DDoS) attacks.

3- Modern times: Currently, cybersecurity includes cutting-edge


technologies such as encryption, cloud security, and artificial
intelligence threat detection. Cyber attacks are becoming more
complex and require sophisticated security responses.
Types of cyber security:there are several types
of cybersecurity:

Network Security: Focusses on protecting networks and


infrastructure from hacking and hacking attacks.Software
Security: It concerns the protection of software, web
applications, and sites from vulnerabilities and software
attacks.Information Security: It concerns the protection of
sensitive data and information from unauthorised access and
leakage.Cyber-attack protection: Includes protecting systems,
networks, and data from various attacks such as viruses,
spyware, and other malware
Cyber security objectives:

Data protection: Ensuring the integrity and confidentiality of


data stored and transmitted over electronic networks.
Preventing intrusions: Minimise or prevent unauthorised access
to electronic systems and networks. Maintaining a balance
between access and security: Provide access to authorised
users while ensuring the integrity of data and
systems.Promoting Security Awareness: Educating Users
about Cybersecurity Risks and How to Address Them.

Data protection and cybersecurity:relate to the application of


policies and technologies aimed at protecting the confidentiality
and integrity of data stored and transmitted over electronic
networks. This includes using encryption techniques to protect
data during transportation and storage, implementing access
policies to control who can access data, and implementing
periodic testing and review procedures to ensure the integrity of
systems and data. This also includes raising awareness about
cybersecurity risks and training employees on good security
practises to maintain data integrity and address potential cyber
threats.
The important of cybersecurity :The importance of
cybersecurity lies in several aspects, the most prominent of
which are:It includes all matters related to data protection from
attackers specialised in stealing information and causing
damage, as these data can be sensitive, government and
industrial information, personal information, personal
identification data, or intellectual property rights. The existence
of cybersecurity programs and electronic Defence mechanisms
is an advanced means of greatimportance in protecting data
and serving the interest of all, as all members of society rely on
critical infrastructure such as hospitals, health care institutions,
and financial services programs that must be
maintained.Reducing the risk of cyberattacks at the individual
level, as these attacks can cause individuals to be exposed to
the theft and blackmail of their identities, thus causing serious
damage to the lives of individuals.

Conclusion:At the conclusion of this detailed


research on cybersecurity, we recognise the
importance of the need to protect ourselves in the
digital space, and that cybersecurity is not only a
technical matter, it is a vital element that intersects
with every aspect of our personal and professional
lives.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy