EdTech Innovations Breaking the Mold in Learning and Teaching

Image
  ANALYST COMMENTARY Qualcomm’s ‘AI-First’ Vision for the Future of Smart Devices November 11, 2024 Snapdragon Elite technology is advancing raw performance and enriching the user experience by adding thoughtful, adaptive features that make devices more intelligent, personal, and responsive... ADVERTISEMENT Your Salesforce Data, Your Responsibility Learn best practices to effortlessly protect your Salesforce Data with Rubrik.  Find Out How Tor and Tails Team Up for Better Online Privacy Protections November 5, 2024 The merger of two popular open-source communities could sharpen the focus on bolstering online privacy and web-surfing anonymity. OPINION Apple Addresses Apple Intelligence: What Microsoft Missed With Copilot November 4, 2024 Apple is offering in-store AI experiences with 15-minute sessions, allowing users and potential customers to interact with the technology and become more familiar with it. Neither Microsoft nor Google currently offers a similar effort. OPINION ...

What is CyberSecurity?

 

A robot knight defends against a big attacker wearing a purple robe shooting lightning bolts of 0's and 1's at a tower


We’ll define what cybersecurity is, exactly!

As we become increasingly connected through the Internet by access through the computer, our phones, and even household devices, security has become a hot topic. Attacks can happen from any corner. What happens if someone gains control of your computer or phone? Or someone gains control of just your Google account?

On an enterprise level, attacks on computer systems can also breach millions of pieces of personal data, including credit card information. Governments are also vulnerable to attacks that expose sensitive data.

Cybersecurity involves everyone and every entity - from you and your neighbors, to organizations, to companies, to governments.

A robot knight defends against a big attacker wearing a purple robe shooting lightning bolts of 0's and 1's at a tower

The Internet has completely revolutionized the way we communicate with each other and share information. Many of us spend hours on social media and online group chats. Nearly all institutions have some sort of computer system administration to keep track of accounts, and buying and selling things on the Internet is now the norm. One by one, even medical equipment, transportation systems, and vacuums are connected to the web.

What is Cybersecurity, exactly?

There’s no turning back, even as more connections to the Internet lead to more privacy concerns and security risks. We don’t want strangers to access our accounts, or our credit card numbers. Along with practicing personal security, organizations and businesses also need to do their part to implement the right protections.

Cybersecurity is the field of study and practice that responds to these challenges as technology evolves. In a formal definition by CISCO:

“Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.”

Digital attacks can cover a whole range from fraudulent emails to a targeted shutdown of a website’s traffic. Defenses against these attacks, then, must be learned and implemented at all levels.

The CIA Triad

A basic, overarching model for cybersecurity, particularly as it relates to information, is the CIA Triad. CIA stands for Confidentiality, Integrity, and Availability (not the US Central Intelligence Agency). Nearly all information security policies trace back to this model. Let’s go through each component of this triad.

A triangular diagram shows the three corners Confidentiality, Integrity, and Availability, with Data in the center of the triad.

Confidentiality

This pillar of the triad refers to protecting private information from eyes that shouldn’t have access to it. Confidentiality is the need to enforce access - who can see this, and who shouldn’t? For example, we don’t want to give our social security number to just anyone, but we trust that the institutions we give them to - like tax services - implement the right security measures to keep it secret. So what tools are used to guarantee the right access?

Some of the ways confidentiality is managed are:

  • Keeping levels of access and setting permissions
  • Encrypting data and files
  • Requiring multi-factor authentication

Integrity

Integrity refers to data integrity here. We need security controls that protect data from being changed or deleted. We must also ensure that the damage can be reversed if data was changed accidentally or by the wrong person. Some techniques related to integrity are:

  • Keeping backups of the data in its correct state, and logging versions
  • Using cryptography to securely check for changes
  • Keeping track of digital signatures to prove integrity of data

Availability

This last pillar refers to data being consistently, reliably available to those authorized. For example, when you login to a social media account and want to set your privacy settings, you expect all the correct settings you had set before to appear immediately. The social media company ensures that even with high traffic, information gets to your screen. How is this accomplished?

  • Always monitoring servers and networks
  • Maintaining hardware and software
  • Having a plan for disaster recovery

And on we go!

Again, the CIA triad provides a foundation for information security specifically. We will cover many other security principles and frameworks, and explore techniques deeper.

In this course, you will gain a foundational understanding of the field of cybersecurity. You will learn:

  • how cybersecurity has evolved, including how it’s shaped modern standards and regulations
  • how digital attacks operate, and their different targets and motivations
  • basic knowledge of cryptography and authentication and authorization technologies
  • how to make your personal devices and networks more secure
  • the anatomy of networks
  • what cybersecurity looks like in the era of cloud technology

Let’s dive in!

Comments

Popular posts from this blog

My email has been hacked! What should I do next?

Has Your Email Account Been Hacked? Here's What to Do Next

Apple’s artificial intelligence is firmly rooted in reality