HomePROJECTS

Cybersecurity Fundamentals 1

What is Cybersecurity?
Nov 08 2022
3 min readโ€ขHelpdesk, Hacking

Cybersecurity Fundamentals Pt 1.

ย 

I recommend you go to the Cheatsheet for a more dynamic and fun version of learning these terms. Click to find the Complete Cheatsheet

ย 

๐Ÿ”ฎ Cyberspace: It is the environment resulting from the interaction of people, software, and services on the internet, which is supported by information and communication technologies.

ย 

๐Ÿ›ก Stakeholders: It is divided into 2.

  • ๐Ÿ”น Consumers: They make use of services available in cyberspace. People and organizations are part of this.
  • ๐Ÿ”น Providers: They make services available to be used by consumers, such as connectivity services and access to applications.

ย 

๐Ÿ’ฟ Assets: The main assets are divided into 4

  • ๐Ÿ”น Organizational Assets: They involve important components for the business processes of organizations such as servers, applications, among others.
  • ๐Ÿ”น Personal Assets: They involve important components for people in their interaction with cyberspace (mobile devices, email, etc.)
  • ๐Ÿ”น Physical Assets: They involve components that have a physical presence in reality such as servers, mobile devices, etc.
  • ๐Ÿ”น Virtual Assets: They involve components that are only digital and depend on a Physical Asset that executes them.

ย 

๐Ÿ˜ Information Security: It refers to the protection of information and information systems against unauthorized access, use, disclosure, interruption, modification, or destruction to provide confidentiality, integrity, and availability.

ย 

๐Ÿ”‘ The 3 Pillars of Security: CID Triad (CIA): They define fundamental aspects of information protection whose affectation implies a security problem.

  • ๐Ÿ”น Confidentiality: It seeks to prevent the unauthorized disclosure and access to the confidential information of the organization.
  • ๐Ÿ”น Availability: It seeks that access to information is not degraded and remains accessible when required.
  • ๐Ÿ”น Integrity: It seeks that the information remains unaltered in the face of accidents or malicious attempts at modification.

ย 

๐Ÿ˜ Cybersecurity: It is the ability to protect or defend the use of cyberspace from cyberattacks and ensure that security objectives are achieved and maintained. Cybersecurity is part of information security.

ย 

๐Ÿ™ Threat Agents: Actor or entity capable of potentially triggering or executing a cyberattack or security incident.

  • ๐Ÿ”น Cybercriminals
  • ๐Ÿ”น Hacktivists
  • ๐Ÿ”น Cyberterrorists
  • ๐Ÿ”น Script kiddies
  • ๐Ÿ”น Insiders/Internal attackers
  • ๐Ÿ”น States or nations
  • ๐Ÿ”น Corporations or other companies

ย 

๐Ÿ™ Threats.: Event with the potential to negatively affect assets with respect to the 3 pillars of security.

  • ๐Ÿ”น Threats to organizational groups.
  • ๐Ÿ”น Threats to personal assets.

ย 

๐Ÿ‘ฟ Vulnerability: Weakness or failure in a system that compromises its security.

ย 

๐Ÿ’€ Risk: Methodologically calculated measure resulting from the probability and impact of the materialization of an adverse cybersecurity event.

ย 

๐Ÿค– Control: Action taken by organizations to address a risk and reduce it to an acceptable point.

ย 

Thanks for reading part 1

aiskoa.

Did you like this article? Share it!

ยฉ 2025