Best Cyber Security Principles — Must be known by everyone

Nanduri Balajee
4 min readMay 29, 2019

Since w.r.t, the time Cyber attacks were increased in an exponential manner the UK government has made a special concern regarding this. Today Cyber Security training has given the more and most important in regular activities like Socializing and business activities. Usually, the Cyber Security comes with special privileges to keep the information in Cyber Space.

What is Cyber Security?

The terms cybersecurity and Information security looks similar but not identical.

Technically Cybersecurity is an ability to protect from Cyber attacks in the Cyber Space.

What is a Cyber Space?

Cyber Space is a virtual environment. Computer systems usually create this environment on the internet.

What is a Cyber Attack?

A cyber attack is an attempt to disrupt, disable, (or) destroy the computer systems through the cyberspace. An attacker major agenda is to destroy the target system within a fraction of seconds.

In simple words, Cybersecurity is about the protection of sensitive information, specifically stored/accessed through the internet

What is Information Security?

Information security is the protection of Information and Information system from unauthorized access, disruption, modification to provide integrity, Confidentiality and high availability. So the information to be protected can reside on Internet, Local Area Network (or) a Wide Area Network (or) any other mobile networks

Attack types:

Cyber attacks can happen through different channels as shown below :

Phishing:

A phishing attack occurs through emails (or) websites to track the users into the required information through masquerading.

Malware:

It is a computer program that performs malicious activity on another computer. Moreover, we can download this Malware as a genuine application. So if once the application has got access to the computer, it can perform malicious activities such as securely retrieving the computer data (or) destroying the existing data.

Man in Middle:

In this type of attack, the attackers manipulate the data transferring between the sender and the receiver through an intermediate presence. And this receiver thinks the data that is data sent from the sender. The user may be unaware of attacker intrusion

Brute force:

In this attack type, the user guess different possible passwords to get into the system until the attacker’s logs in

Cyber Security principles:

To maintain the Cybersecurity the user must attain two specific goals, initially, the information must be kept out of the reach from the potential customers and unauthorized individuals. Additionally, cybersecurity measures must not stop authorized user access. Cyber Security follows the three major principles

Confidentiality:

Cybersecurity ensures for secured information and permits the data to the accessible for the authorizable users. It means information access should provide to the authorized persons. For example, in a company, Customer Relationship Management (CRM) should be used to prevent the authorization of non -employees to the office premises. Besides in addition to the security layer, companies also implement more confidentiality through data encryption.

Get the best information on confidentiality through Cyber Security Course in India

Confidentiality best practices:

a)A secure authentication process that contains a user id and a password to verify the authorized users. Otherwise, biometrics works the best one in terms of Confidentiality

b)A role-based methods must the employed for the viewing / accessing the data. For instance, data access levels may be assigned to the specific department staff.

c) Action control must enable, the action must remain with their roles. For example, if the user is authorized to read, but not to write, the systems must obstruct the user from editing

Integrity :

The best Cybersecurity must ensure that the information remains secured and is accessible for authorized users. It means the security system should not accept modification without any credentials. Integrity involves maintaining consistency, accuracy and trustworthiness of the data over the entire life cycle. So to maintain integrity, the data must not be altered/modified during the transaction. Such measures include implementing the user access controls and the version control to prevent the data manipulations.

Besides, to verify the integrity, we can use other measures like Checksums and cryptographic checksums. So network administers must ensure that data integrity system includes document system administration procedures, parameters and maintenance activities ad creating the recovery activities at the times such as power outages, server failure (or) the security attacks.

Availability :

This is considered as one of the five pillars of Information Assurance. It ensures applications and data are available to the users when they need them. The most common attacks that impact availability is a denial of service. Moreover, In the cyberspace, any information must not disturb the authorized user access. Besides at any instance, the cybersecurity should have redundancy access at any stage. For example, companies using cloud-based CRM must implement the proxy servers and firewalls as the security measure against the service attacks.

These principles were considered as the best one. Additionally, Cyber Security has some more other principles that need to know. So visit Cyber Security training to get the details with real-time examples and protect your system from hackers.

--

--

Nanduri Balajee

Iam a Technical Content writer having 4years of Industry experience. Till now, I have written 300+ articles and 6 tutorials