HomePROJECTS

Cybersecurity Fundamentals 1

Nov 08 20223 min read
HelpdeskHacking

Cybersecurity Fundamentals Pt 1.

Ā 

I recommend you go to the Cheatsheet for a more dynamic and fun version of learning these terms. Click to find the Complete Cheatsheet

Ā 

šŸ”® Cyberspace: It is the environment resulting from the interaction of people, software, and services on the internet, which is supported by information and communication technologies.

Ā 

šŸ›” Stakeholders: It is divided into 2.

  • šŸ”¹ Consumers: They make use of services available in cyberspace. People and organizations are part of this.
  • šŸ”¹ Providers: They make services available to be used by consumers, such as connectivity services and access to applications.

Ā 

šŸ’æ Assets: The main assets are divided into 4

  • šŸ”¹ Organizational Assets: They involve important components for the business processes of organizations such as servers, applications, among others.
  • šŸ”¹ Personal Assets: They involve important components for people in their interaction with cyberspace (mobile devices, email, etc.)
  • šŸ”¹ Physical Assets: They involve components that have a physical presence in reality such as servers, mobile devices, etc.
  • šŸ”¹ Virtual Assets: They involve components that are only digital and depend on a Physical Asset that executes them.

Ā 

šŸ˜ Information Security: It refers to the protection of information and information systems against unauthorized access, use, disclosure, interruption, modification, or destruction to provide confidentiality, integrity, and availability.

Ā 

šŸ”‘ The 3 Pillars of Security: CID Triad (CIA): They define fundamental aspects of information protection whose affectation implies a security problem.

  • šŸ”¹ Confidentiality: It seeks to prevent the unauthorized disclosure and access to the confidential information of the organization.
  • šŸ”¹ Availability: It seeks that access to information is not degraded and remains accessible when required.
  • šŸ”¹ Integrity: It seeks that the information remains unaltered in the face of accidents or malicious attempts at modification.

Ā 

šŸ˜ Cybersecurity: It is the ability to protect or defend the use of cyberspace from cyberattacks and ensure that security objectives are achieved and maintained. Cybersecurity is part of information security.

Ā 

šŸ™ Threat Agents: Actor or entity capable of potentially triggering or executing a cyberattack or security incident.

  • šŸ”¹ Cybercriminals
  • šŸ”¹ Hacktivists
  • šŸ”¹ Cyberterrorists
  • šŸ”¹ Script kiddies
  • šŸ”¹ Insiders/Internal attackers
  • šŸ”¹ States or nations
  • šŸ”¹ Corporations or other companies

Ā 

šŸ™ Threats.: Event with the potential to negatively affect assets with respect to the 3 pillars of security.

  • šŸ”¹ Threats to organizational groups.
  • šŸ”¹ Threats to personal assets.

Ā 

šŸ‘æ Vulnerability: Weakness or failure in a system that compromises its security.

Ā 

šŸ’€ Risk: Methodologically calculated measure resulting from the probability and impact of the materialization of an adverse cybersecurity event.

Ā 

šŸ¤– Control: Action taken by organizations to address a risk and reduce it to an acceptable point.

Ā 

Thanks for reading part 1

aiskoa.

Share this article

Ā© 2026