Cyber Security: The Three Core Principles Of Information Technology Security

1059 Words3 Pages

Cyber security, also known as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. Most aspects of our lives rely on the Internet and computers, including communications (e-mail, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth or death records, social security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). Personal information are normally stored either on our computer or on someone else’s system. Cyber security is also a shared …show more content…

There are three core principles of cyber security; Confidentiality, Integrity, and Availability. Confidentiality is information which is sensitive or confidential must remain so and be shared only with appropriate users. Integrity is information must retain its integrity and not be altered from its original state. Availability, also is information and systems must be available to those who need it. For example, your confidential medical records should be released only to those people or organizations (doctor, hospital, insurance, government agency, you) authorized to see it. The records should be well protected so that no one can change the information without authorization, and the records should be available and accessible to authorized …show more content…

Example is how your computer and systems could be affected by a cyber security incident, whether because of improper cyber security controls, manmade or natural disasters, or malicious users wreaking havoc, which includes denial of service, malware, worms, and trojan horses, botnets and zombies, social network attacks, and shareware or fake security software warnings. Denial of service refers to an attack that successfully prevents or impairs the authorized functionality of networks, systems or applications by exhausting resources. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming and files in affected computer systems. In some cases, denial of service attacks have forced Web sites accessed by millions of people to temporarily cease operation. It can be prevented by blocking the attack with packet filters on the router(s). This is by far the best method, and if one can do this, you are pretty much done, except that its still a good idea to contact the other ISPs who are victims of this attack. Malware, worms, and Trojan horses; these spread by e-mail, instant messaging, malicious websites, and infected non-malicious websites. Some websites will automatically download the malware without the user 's knowledge or

More about Cyber Security: The Three Core Principles Of Information Technology Security

Open Document