✅ Understand and define basic terms, topics, and concepts of cybersecurity
✅ Identify the key threat actors, their motivations, and common threats
✅ Acquire an introductory understanding of incident response cybersecurity frameworks and standards
Click below to start the self-paced course Cybersecurity Fundamentals.
Cybersecurity involves safeguarding computer systems, networks, and data from digital attacks and unauthorized access. It integrates technologies, processes, and best practices to protect sensitive information and users from cyber threats and attacks.
Cybersecurity refers to the measures and activities necessary to safeguard information systems, networks, and data from cyber threats that could compromise their confidentiality, integrity, or availability. It involves protecting not just information and the systems that rely on it, ensuring they can withstand attacks and function securely, but also protecting users of such systems and other persons from cyber threats.
Cybersecurity measures are essential for maintaining trust in digital systems, preventing disruptions, and protecting individuals, organizations, and society from evolving cyber risks.
The ultimate goal of cybersecurity is to secure digital environments from threats that could compromise security and stability, as well as protect their users and society at large.
Governments and organizations play a crucial role in managing these risks through incident response and risk management strategies. IT security incidents, such as data breaches, system failures, and cyber attacks, can have wide-ranging consequences, from disrupting business operations to endangering personal safety. A strong cybersecurity framework helps mitigate these threats and ensure resilience against evolving cyber risks.
To effectively address these risks, cybersecurity professionals rely on the CIA Triad, a foundational model that ensures the Confidentiality, Integrity, and Availability of digital information systems.
<aside>
C is for "Confidentiality": This principle ensures that sensitive information is accessed only by authorized individuals.
</aside>
<aside>
I is for "Integrity": Integrity refers to the accuracy and reliability of data, for example, that data remains unchanged during storage and transmission.
</aside>
<aside>
A is for "Availability": Availability ensures that information and resources are accessible to authorized users whenever needed.
</aside>