Cybersecurity Fundamentals Pt 1.
Ā
I recommend you go to the Cheatsheet for a more dynamic and fun version of learning these terms. Click to find the Complete Cheatsheet
Ā
š® Cyberspace: It is the environment resulting from the interaction of people, software, and services on the internet, which is supported by information and communication technologies.
Ā
š” Stakeholders: It is divided into 2.
- š¹ Consumers: They make use of services available in cyberspace. People and organizations are part of this.
- š¹ Providers: They make services available to be used by consumers, such as connectivity services and access to applications.
Ā
šæ Assets: The main assets are divided into 4
- š¹ Organizational Assets: They involve important components for the business processes of organizations such as servers, applications, among others.
- š¹ Personal Assets: They involve important components for people in their interaction with cyberspace (mobile devices, email, etc.)
- š¹ Physical Assets: They involve components that have a physical presence in reality such as servers, mobile devices, etc.
- š¹ Virtual Assets: They involve components that are only digital and depend on a Physical Asset that executes them.
Ā
š Information Security: It refers to the protection of information and information systems against unauthorized access, use, disclosure, interruption, modification, or destruction to provide confidentiality, integrity, and availability.
Ā
š The 3 Pillars of Security: CID Triad (CIA): They define fundamental aspects of information protection whose affectation implies a security problem.
- š¹ Confidentiality: It seeks to prevent the unauthorized disclosure and access to the confidential information of the organization.
- š¹ Availability: It seeks that access to information is not degraded and remains accessible when required.
- š¹ Integrity: It seeks that the information remains unaltered in the face of accidents or malicious attempts at modification.
Ā
š Cybersecurity: It is the ability to protect or defend the use of cyberspace from cyberattacks and ensure that security objectives are achieved and maintained. Cybersecurity is part of information security.
Ā
š Threat Agents: Actor or entity capable of potentially triggering or executing a cyberattack or security incident.
- š¹ Cybercriminals
- š¹ Hacktivists
- š¹ Cyberterrorists
- š¹ Script kiddies
- š¹ Insiders/Internal attackers
- š¹ States or nations
- š¹ Corporations or other companies
Ā
š Threats.: Event with the potential to negatively affect assets with respect to the 3 pillars of security.
- š¹ Threats to organizational groups.
- š¹ Threats to personal assets.
Ā
šæ Vulnerability: Weakness or failure in a system that compromises its security.
Ā
š Risk: Methodologically calculated measure resulting from the probability and impact of the materialization of an adverse cybersecurity event.
Ā
š¤ Control: Action taken by organizations to address a risk and reduce it to an acceptable point.
Ā
- Access to my Website
Thanks for reading part 1
aiskoa.
