CSE - Safeguard Principles and Mechanisms | Part 1 [LESSON]

Safeguard Principles and Mechanisms | Part 1

Introduction

There are foundational principles that drive digital defense tactics. By learning about cybersecurity principles and encryption you can uncover how information is secured through secret codes.

Knowledge Point

An organization's security posture depends on the controls it puts in place and if those controls are relevant to the type of threats it faces.  Controls act as safeguards that deter, detect, counteract, and reduce the risks to enterprise networks, information systems, devices, and sensitive data. The goal is to maintain the confidentiality and integrity of mission-critical business information and to keep it available to maintain normal operations.

Cybersecurity Principles

As you achieve the goal of maintaining the security of the system, there are principles that offer a balance of possible security dreams, a utopia of perfect security, and what is actually necessary to achieve it. Learn more about those principles below.

Cybersecurity Principles Learning Activity

Extending Safeguards

A significant volume of personal data, including emails, passwords, and tax documents, is transmitted online daily. So we must begin to think of additional security measures. To extend safeguards for your system, cryptographic techniques that will hide information. Cryptographic techniques are used to ensure secrecy and integrity of data in the presence of an adversary.

Cryptographic techniques are an important part of a multilayered security plan. Some security measures, such as the implementation of a firewall and the use of access permissions, attempt to keep intruders out of the network or computer altogether, much like fences and door locks attempt to keep burglars off the grounds or out of the house.

Cryptographic Techniques Activity

Check out the different Cryptographic Techniques in the learning activity below.

In the next lesson, we will dig deeper into ways in which we can further protect our data online.

Reflection

The foundational principles of digital defense tactics, focus on cybersecurity principles and encryption to secure information with secret codes. It puts an emphasis on the importance of controls in your security posture in order to be able to deter, detect and reduce risks to networks and data. Also, remember there are cryptographic techniques like ensuring data confidentiality and integrity in the face of potential threats. The text underscores the significance of additional security measures in safeguarding personal data transmitted online and the use of cryptographic techniques within a multilayered security strategy. 

MSCompSci2_LessonBottomBanner

[CC BY-NC-SA 4.0 Links to an external site.] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION - INTENDED ONLY FOR USE WITHIN LESSON.