Source: safaltaCybersecurity affects not only businesses, but also individuals' computers, mobile phones, and tablets.
Only authorized parties have access to sensitive information and functions, according to confidentiality norms. Military secrets, for example.
Only authorized persons and means can change, update, or remove sensitive information and functions, according to integrity principles. A user, for example, may enter inaccurate data into the database.
Availability: According to availability principles, systems, functions, and data must be available on-demand based on agreed-upon specifications and service levels.
- Access control systems and methodologies are concerned with preventing unauthorized modification of vital system resources.
- Telecommunications and network security: This section focuses on communications, protocols, and network services, as well as the possible vulnerabilities that each of these poses.
- Practices in security management: This area effectively deals with catastrophic system failures, natural disasters, and other sorts of service disruptions.
- Security architecture and models: This section focuses on putting in place security rules and processes. This security sector deals with policy development for a wide range of security issues.
- Law, investigation, and ethics: This section deals with the legal aspects of computer security.
- Security for application and system development: This person is responsible for database security models and the implementation of multilevel security for internal applications.
- Cryptography: Designed to teach you how to use encryption and when to utilise it.
- Computer operations security includes everything that occurs while your computers are in use.
- Physical security: This section mostly deals with physical access to your servers and workstations.
A network is a connection that allows two or more computers to communicate with one another.
The Internet is a network that connects computers all over the world through specialized routers and servers.
3. Internet Protocols
Data cannot be sent or received in any direction. To manage the flow of information on the internet, a set of rules is followed. The internet protocol is the name for these rules.
4. IP Address
An IP address is a numerical address that is assigned to all devices that connect to a computer network and communicate using the Internet Protocol. The following is an example of an IP address: 22.214.171.124
5. MAC Address
Every gadget that connects to the internet has a unique identification number. MAC addresses are typically 12-digit hexadecimal digits. D8-FC-93-C5-A5-EO is an example of a MAC address.
6. Domain Name Server(DNS)
Consider DNS to be the internet's phonebook. It saves all of the IP addresses as well as the names of the links. You might want to go to google.com, for example. This is what you type into your web application. The name is then sent to a DNS server, which looks up the IP address of google.com. The DNS server then returns the IP address to your machine.
Before we get into the different types of assaults, it's important to understand why they happen, and this cyber security for beginners lesson will teach you everything you need to know. Every attack has a purpose, and the most common cause for attacks is money. After breaking into the system, hackers demand ransom from the victims. Other motives include financial loss to the target, achievement of a state's military goal, damage to the target's reputation, or political manipulation.
There are five primary sorts of assaults:
- DDoS (distributed denial of service) is a type of distributed de (DDoS)
- In the middle, a man
- Email-based attacks
- Attacks on passwords
- Malware assault