Cyber Sec Assignment 1
Cyber Sec Assignment 1
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, theft,
and damage. It involves implementing security measures to safeguard information, devices, and
infrastructure from cyber threats such as hacking, malware, ransomware, and other forms of
cybercrime. Cybersecurity aims to ensure the confidentiality, integrity, and availability (CIA triad)
of data and systems.
Protects personal data - Cybersecurity measures safeguard sensitive personal data, such as financial
information and PII, from unauthorized access, theft, or misuse, ensuring privacy and reducing
identity theft and fraud risk.
Helps preserve reputation - Effective cybersecurity protects against data breaches and cyberattacks,
maintaining an organization's reputation for reliability and trustworthiness among customers,
partners, and stakeholders.
Enhances productivity - Cybersecurity tools such as firewalls and antivirus software minimize
disruptions from malware and attacks, ensuring smooth operations and enhancing overall
productivity.
Assists the remote workspace - Secure remote connections through VPNs and strong authentication
protect remote employees and company resources, supporting the rise of remote work.
Regulation compliance - Adhering to cybersecurity best practices helps organizations meet
regulatory requirements for data protection, avoiding fines and penalties for non-compliance.
Improves cyber posture - Strong cyber posture involves proactive measures to prevent, detect, and
respond to cyber threats, reducing the likelihood of successful attacks.
Better data management - Cybersecurity practices such as data classification, access controls, and
encryption ensure effective data management, protecting data integrity and reducing breach risks.
Helps maintain trust and credibility - Protecting customer and client data demonstrates a
commitment to security, building trust and credibility with stakeholders and customers.
Streamlines access control - Implementing strict access control policies enhances security while
providing authorized users efficient access to resources, improving user experience and reducing
insider threat risks.
c) List objectives of Cybersecurity
The primary objectives of cybersecurity, often referred to as the CIA triad, include:
Confidentiality - Ensuring that sensitive information is accessed only by authorized
individuals.
Integrity - Ensuring that data remains accurate and unaltered, except by authorized actions.
Availability - Ensuring that data and services are accessible to authorized users when
needed.
Additionally, other objectives may include:
Authentication - Verifying the identity of users and systems to grant appropriate access.
Non-repudiation - Ensuring that a user or system cannot deny a specific action or
transaction.