Introduction Of Cyber Security

High level overview of cyber security

Thilina Madushan
3 min readMay 25, 2021

What is cyber security

cyber security refer to protect the networks, devices, programs, and data from attack, damage, or unauthorized access.

CIA triad

CIA triad, is a model to guide policies for information security.

  • Confidentiality: do not disclose private and confidential information to the unauthorized persons
  • Integrity: Data and system are free from unauthorized manipulation.
  • Availability: Data and services are available to the authorized users.

IAAA principles

Generally system security works on IAAA principle. Identification, Authentication, Authorisation, Accountability are the component of this.

  • Identification: using username, ID or ect to the identify user.
  • Authentication: authenticate user using password, token, biometric information.
  • Authorisation: manage different access models like administrator, buyer, seller.
  • Accountability: traceable to prove responsibility other vice it’s like a audit.

Types of cyber threats

There are three type of threats are countered,

  • Cyber crime: targeting systems for financial gain or to cause disruption.
  • Cyber-attack: often involves politically motivated information gathering.
  • Cyber terrorism: this is intended to undermine electronic systems to cause panic or fear.

Attackers use some common methods used to threaten cyber-security,

  • Malware: Attackers have created to disrupt or damage a legitimate user’s computer.malware may be used by cybercriminals to make money or in politically motivated cyber-attacks.
  • Virus: Self-replicating program that attaches itself to clean file and spreads throughout a computer system, infecting files with malicious code.
  • Trojan: Trojans are a type of malware that often pretends to be legitimate software. Trojan horses can be used by cyber thieves and hackers trying to access the system. Users are often tricked by some form of social engineering to load and run Trojans into their systems. When activated, Trojans allow cybercriminals to spy on users, steal confidential data and gain backdoor access to systems.
  • Spyware: It is a program that secretly records what users are doing so that cybercriminals can use this information. For example, spyware can capture credit card information.
  • Ransomware: Malware that locks a user’s files and data and threatens to delete them if they don’t pay the ransom.
  • Adware: Advertising software which can be used to spread malware.
  • Phishing: Phishing is when cybercriminals target victims with emails that appear to come from legitimate companies requesting confidential information. Phishing attacks are often used to trick people into giving up credit card details and other personal information.

Use following tips to minimise the cyber attacks.

Update your software and operating system.

Use anti-virus software.

Use strong password: don’t use guessable thing like dictionary word, your birthday etc.

Do not open email attachments from unknown senders.

Do not click on links in emails from unknown senders or unfamiliar websites.

Avoid using unsecured WiFi networks in public places.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Thilina Madushan
Thilina Madushan

Written by Thilina Madushan

Software Engineering undergraduate at University of Kelaniya

No responses yet

Write a response