Step-2-Step—2-Cybersecurity Background Summary-Final (3)

.docx

School

Prince George's Community College, Largo *

*We aren’t endorsed by this school

Course

610

Subject

Computer Science

Date

May 4, 2024

Type

docx

Pages

11

Uploaded by blingtyra on coursehero.com

1 Step—2-Cybersecurity Background Summary Victory Smith Aziah CMP 610 Professor Ferrer
2 Cybersecurity Background Summary Compare and Contrast Cybersecurity and Computer Security Cybersecurity means the process of having protections set in place for protecting programs, systems, networks so that they are not attacked digitally. Cybersecurity also implies the process of protecting threats that exist in the digital realm while computer security is about protecting and safeguarding computer software and hardware. Cyber security is broad concept that involves network security, information security, and application security (Gupta et al., 2020). However, computer security is smaller in scope including issues such as data encryption, control measures, and malware prevention and is part of the cybersecurity process. Data Flows across Networks Cyber security is not restricted to implementing password protection on a tool either. Each network has particular security needs defined as information is created and produced. For data protection, one should learn how the information is moving ( Gupta et al., 2020). An example of a model accustomed to demonstrate the flow of data is the Transmission Control Protocol/Internet Protocol (TCP/IP), which is a client-server model developed by the Department of Defense, showing how data transverses online by dividing internet protocols into four categories: Internet, Network Interface, Application, and Transport.  The OSI is a theoretical model developed by the ISO; that explains how data flows through a system by dividing functions into different layers; Presentation, Application, session, Network, Transport, Data Link, and Physical ( Wang & Jones, 2021). Although people can comprehend visible display units readable by human beings, the operating system reads and understands data such as letters, numbers, symbols, and binary digits. Before this process, data
3 including binary digits that can be read commonly move across the networks, and different actions request to transform it into bits which are then combined in bytes before being divided into packets ( Wang & Jones., 2021). The system routes nontextual data using assigned protocols, such as the transmission of files by the File Transfer Protocol (FTP) while connecting to websites online using HTTP or HTTPS. Data exchange methods across every model layer affect how data is delivered and received. Individuals at each layer should configure the devices properly, implement security controls, and ensure their policies are followed. If this doesn't happen, data can get lost, stolen, or unavailable. Basic Cybersecurity Concepts and Vulnerabilities Confidentiality, Integration, and Availability (CIA), or a triad of cybersecurity are examples of basic cybersecurity concepts. These concepts relate to an organization's cyber security infrastructure foundation. The confidentiality principle of the triad helps maintain
4 secrecy and deal with security issues in an organization. Confidentiality is a means of controlling access to data so as not to allow use disclosure by unauthorized personnel. Integrity indicates that the data has not been changed and can be relied on. Integrity is put to use using hashing algorithms. Like confidentiality, many factors can define what type of hashing algorithms shall be utilized to guarantee the data's authenticity ( Samtani et al., 2020). Accessibility means the operation of the networks, systems, and applications only allowed for authorized users. This principle of the triad guarantees that there are authorized users with timely, reliable access to appropriate resources. It can be achieved by eliminating all single points of failure, like technologies, people, and processes. The concept most applied in cybersecurity concerning information is the CIA triad. In the domain of cyber security it is almost impossible to avoid vulnerabilities. A vulnerability is a weakness that an attacker can use to gain unauthorized access or perform an undesirable action on the system. Software vulnerabilities are flawed software programs that are vulnerable to an attack. These specific vulnerabilities do not simply appear; they are created either inadvertently or intentionally. There are some ways in which software vulnerabilities are made and have flaws to exist in a system. This includes: • Software patches and updates not being installed into the computer systems. • Software patches and updates not being released promptly by the vendor. • Software platforms are not locked down before releasing software. Common Cyber Attacks The best examples of cyber-attacks include social engineering, Distributed Denial of Service (DDoS), and Malware. They are actions through which at least one attack vector or a system is used against another for malicious purposes such as turning off the target, accessing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help