Saturday, June 25, 2022
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Blog

Cyber security – What is Cyber security?

Cybersecfill by Cybersecfill
January 4, 2019
in Blog
0
Cyber Security
Share on FacebookShare on Twitter

Cyber Security has become a household word because of the connectivity of all devices which comes with cyber security threats.

What is Cybersecurity?

It is the protection of internet-connected systems, including hardware, software and data, from cyber attacks.

The security of the internet has become a necessity in the world due advent of internet and computers.This has given a rise to cyber crimes. The world is living in a digital era which means we are constantly using the internet and constantly generating data. This has result to a lot of data breaches.

Everything now relies on the computer and the internet, this includes the means of communication (emails and phones), storing information (clouds, flash drives, memory cards etc.)

Cyber criminals are increasing by the day and it has become not just an organization thing to be cyber aware(understand your internet risks). Therefore, we all need to be proactively secured on the internet.

Cyber security can also be defined as the technique or practice to protect digital data. This are data that are stored, transmitted or in use on the network. The goal is to protect data from unauthorized access, modifications, and deletion.

Principles of Cyber Security

There are three core principle in cybersecurity, this are Confidentiality,  Integrity and availability.

Confidentiality

This is also known as privacy. Do you want your data or information to get into the wrong hands? definitely not. Confidentiality deals with measures to prevent sensitive information from getting into the wrong hands.

Integrity

Integrity is the protecting of information from being modified by an unauthorized person.Information that has being modified by unauthorized party no longer has any value.

Availability

All systems need to work properly to ensure that the information they protect are available when it is needed.This ensures that authorized parties are able to access information.

 

 

Tags: BlogCyber Security
Cybersecfill

Cybersecfill

An independent Nigeria cybersecurity blog.

Next Post
online cybersecurity resources

Online Cybersecurity Resources

0 0 votes
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments
  • Trending
  • Comments
  • Latest
CEH_PRACTICAL

CEH PRACTICAL EXAM – TICKET TO CEH MASTER

February 6, 2021
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

9
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
Suspected Head of Cybercrime Gang Arrested in Nigeria…

Suspected Head of Cybercrime Gang Arrested in Nigeria…

June 17, 2022
Types of Hackers and Hacking Protection Tips….

Types of Hackers and Hacking Protection Tips….

June 6, 2022
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips…

May 31, 2022
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022

Recommended

Suspected Head of Cybercrime Gang Arrested in Nigeria…

Suspected Head of Cybercrime Gang Arrested in Nigeria…

June 17, 2022
Types of Hackers and Hacking Protection Tips….

Types of Hackers and Hacking Protection Tips….

June 6, 2022
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips…

May 31, 2022
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply

Privacy Policy - Terms and Conditions