CYBERSECURITY FOR BEGINNERS AND DUMMIES: DEVELOPING CYBERSECURITY PROGRAMS AND POLICIES

Posted By: TiranaDok

CYBERSECURITY FOR BEGINNERS AND DUMMIES: DEVELOPING CYBERSECURITY PROGRAMS AND POLICIES by LISA H. GREGORY PH.D
English | February 11, 2021 | ISBN: N/A | ASIN: B08W7DPWB4 | 63 pages | MOBI | 0.19 Mb

Cybercrime is a global problem that’s been dominating the news cycle. It poses a threat to individual security and an even bigger threat to large international companies, banks, and governments. Today’s organized cybercrimes far out shadow lone hackers of the past now large organized crime rings function like start-ups and often employ highly-trained developers who are constantly innovating online attacks. With so much data to exploit out there, Cyber security has become essential. Hence, I decided to write up this book on, from a computing point of view, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity, and availability of data, is a subset of cybersecurity. The use of cyber security can help prevent cyber-attacks, data breaches, and identity theft and can aid in risk management. So when talking about cybersecurity, one might wonder “What are we trying to protect ourselves against?” Well, there are three main aspects we are trying to control, name:
•Unauthorised Access
•Unauthorised Deletion
•Unauthorised Modification These three terms are synonymous with the very commonly known CIA triad which stands for Confidentiality, Integrity, and Availability. The CIA triad is also commonly referred to as the three pillars of security and most of the security policies of an organization are built on these three principles.