What is Cybersecurity?

This post is part of my Buildables Fellowship.

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks and programs from digital attacks from unauthorized access, damage, theft or disruption.

Why Cybersecurity matters?

It matters because our personal and professional lives are highly dependent on technology. A successful cyber-attack can lead to data breaches, financial loss, reputational damage, and even national security threats.

Key Terms

Threat
Any potential danger that could exploit a weakness. For example, a malware, a hacker or an insider.

Vulnerability
A weakness in a system that can be exploited. For example, weak passwords or outdated software.

Risk
The likelihood that a threat will exploit a vulnerability and cause harm. (Risk = Threat × Vulnerability × Impact).

Asset
Anything valuable that needs protection. For example, personal data, financial records, servers or intellectual property.

Types of Cyber-Attacks

  • Phishing: Fraudulent emails or messages that trick people into revealing sensitive information.
  • Malware: Malicious software such as viruses, worms, trojans designed to harm or steal data.
  • Ransomware: Malware that encrypts data and demands payment for decryption.
  • Denial of Service (DoS/DDoS): Flooding a system with traffic to make it unavailable.
  • SQL Injection: Exploiting vulnerabilities in databases through malicious input.
  • Man-in-the-Middle (MitM): Intercepting communications between two parties.
  • Password Attacks: Brute force, dictionary, or credential stuffing to break into accounts.

There are many more types of cyber-attacks, too many to list here.

CIA Triad

The CIA Triad is the foundation of information security.

  • Confidentiality: Ensuring only authorized people have access to information. (e.g., encryption, access controls).
  • Integrity: Ensuring data is accurate and has not been tampered with. (e.g., hashing, checksums).
  • Availability: Ensuring systems and data are accessible when needed. (e.g., backups, redundancy, DDoS protection).



    Enjoy Reading This Article?

    Here are some more articles you might like to read next:

  • Day 5 | Information Gathering
  • Day 4 | Intro to Web Proxies Pt. 2
  • Day 3 | Intro to Web Proxies
  • Day 2 | Web Applications!
  • Day 1 | Starting the Bug Bounty Journey