CSE - Basics of Cybersecurity in Society [LESSON]
Basics of Cybersecurity in Society
Introduction
Cybersecurity plays a critical role in ensuring our society is safe from digital threats. By learning about cybersecurity, you will be able to express the vital need for protecting sensitive information and preventing cyber attacks.
Knowledge Point
CIA Triad
In the evolving world of cyber security, protecting sensitive information and maintaining the integrity of digital systems is essential to safety online. In order to achieve those goals, let's first explore the CIA Triad, which is a model that forms the basis for the development of security systems. The CIA Triad (Confidentiality, Integrity, and Availability) is a guiding model in information security. An effective and efficient information security strategy includes policies and security controls that minimize cyber threats to these three crucial components.
Take a look at the learning object below to learn more about the CIA Triad. Click the ℹ button to learn more.
Take the CIA Triad into consideration by thinking about how it has an effect on e-commerce. Every day people use the internet to complete transactions like shopping at their favorite stores or even buying the latest popular concert tickets.
E-commerce moves through CIA Triad as follows, click each title to reveal.
Confidentiality (click to reveal)
-
-
- Customer payment information is stored securely using encryption.
-
Integrity (click to reveal)
-
-
- Checks prevent tampering with product prices or customer reviews.
-
Availability (click to reveal)
-
-
- Load balancing and server scaling ensure the website remains accessible, even during traffic spikes.
-
Access Controls
Access controls are like the bouncers of the cyber world, deciding who gets in and who doesn't. They are security features that act as gatekeepers, determining how users and systems can communicate and interact with different systems and resources. Just like how you need a ticket to enter a concert, users and systems need the right permissions to access specific information or perform certain actions. Access controls help keep sensitive data safe by limiting who can view, edit, or delete it. Think of them as the digital security guards making sure only the right people get access to the VIP section of the internet. Access controls are security features that control how users and systems communicate and interact with other systems and resources. Access controls give the organization the ability to control, restrict, monitor, and protect resource availability, integrity, and confidentiality.
Access Control Activity
Take a look at the components of access control by clicking through the learning object below.
As you have seen, controlling access to a network and system is imperative to being secure. Some controls are physical. Access to data centers, for example, is limited through locks, fences, guards, and access cards. Digital controls include usernames and passwords, two-factor authentication, antivirus software, and firewalls. Which will be discussed later in this module. By implementing access controls, organizations can monitor and manage who has permission to access specific resources within a network. This not only helps in preventing unauthorized access but also protects sensitive information from falling into the wrong hands. With the increasing number of cyber threats and attacks, having strong access controls in place is essential to safeguard data and maintain the integrity of networks.
Manage Those Risks!
No matter what you do, there is always a risk that you take, so you must not only understand the strategies and ways in which access is controlled but also understand the address risks if they may arise. In the digital world security risk management can provide a better understanding of the nature of security threats and their interaction in society.
Think of security risk management as an ongoing process of identifying these security risks and implementing plans to address them. Risk is determined by considering the likelihood that known threats will exploit vulnerabilities and the impact they have on valuable things.
When managing your security risks, remember these five-step strategies that can be useful to combat the risk, click each step to learn more:
Step 1 (click to reveal)
-
-
- Identify assets- Which critical devices need to be protected?
-
Step 2 (click to reveal)
-
-
- Identify threats- How can the assets be attacked?
-
Step 3 (click to reveal)
-
-
- Identify consequences- Impact analysis to determine worst case scenario and fallout.
-
Step 4 (click to reveal)
-
-
- Identify solutions- What solutions can best deter or prevent the threats?
-
Step 5 (click to reveal)
-
-
- Implement solutions and monitor effects- Have the threats been eliminated? If not, the cycle continues.
-
Cybersecurity Basics Self-Assessment
Let’s complete a quick self assessment of the information learned in this lesson.
Reflection
Safeguarding sensitive information and ensuring the stability of digital systems are vital for online safety. The CIA Triad serves as a cornerstone for security system development, focusing on keeping data confidential, reliable, and accessible to authorized parties. Access controls play a crucial role in maintaining information security by regulating system access and the extent of user permissions. Also by understanding security risks and implementing risk management strategies you can address potential security threats effectively.
[CC BY-NC-SA 4.0 Links to an external site.] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION - INTENDED ONLY FOR USE WITHIN LESSON.