6 pages/≈1650 words
IT & Computer Science
Cybersecurity (Coursework Sample)
The purpose of this assignment is to help students be able to: Define cybersecurity; define the dimensions and principles of cybersecurity; describe the fundamental principles of the cybersecurity discipline and use to provide system security; describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies; and properly use the vocabulary associated with cybersecurity. source..
Exploring Cyber-Security IT based Student’s Name Professor’s Name Course Title Submission Date Table of Contents TOC \o "1-3" \h \z \u 1.0 Cyber-security definitions PAGEREF _Toc123463275 \h 32.0 Dimensions and Principles of Cyber-security PAGEREF _Toc123463276 \h 32.1 The Principles of security PAGEREF _Toc123463277 \h 32.2 The states of data PAGEREF _Toc123463278 \h 32.3 Cyber-security safeguards PAGEREF _Toc123463279 \h 43.0 Overall Security PAGEREF _Toc123463280 \h 43.1 The principle of confidentiality PAGEREF _Toc123463281 \h 43.2 Protecting data privacy PAGEREF _Toc123463282 \h 43.3 Access control PAGEREF _Toc123463283 \h 43.4 Principle of data integrity PAGEREF _Toc123463284 \h 53.5 Availability PAGEREF _Toc123463285 \h 54.0 Assured Operations PAGEREF _Toc123463286 \h 55.0 Conclusion PAGEREF _Toc123463287 \h 6References PAGEREF _Toc123463288 \h 6 1.0 Cyber-security definitions Cyber-security is the act of protecting personal computers, workers, cell phones, electronic frames, organizations, and information from malicious attacks. Or also called security of data innovation or electronic data security. The term is used in a number of contexts, from business to general purpose processing, and can be isolated into several normal classifications: 1 ‘’Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware (Itgovernance.co.uk, 2021).’’ 2 “Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data it’s designed to protect. Successful security begins in the design stage, well before a program or device is deployed (Kaspersky.com, 2021).” 3 “Information security protects the integrity and privacy of data, both in storage and in transit (Calder, 2020).” 4 “Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella (Kaspersky.com, 2021).” 2.0 Dimensions and Principles of Cyber-security Cyber Security Cube (also known as McCumber Cube) is a device developed by John McCumber, one of the earliest network security experts, to handle insurance for organizations, areas, and the Internet. The cybersecurity cube has three dimensions and looks very much like the Rubik's Cube (Calder, 2020). The main components of Cyber Security Cube are three data security standards. Subsequent measurements recognize three states of data or information. The third element of the form distinguishes the skills required to provide insurance. These are often referred to as the three classifications of tissue protection. The three main standards include status information, important information properties, and security measures. Data state includes transmission, storage, and preparation. The main characteristics of information include confidentiality, respect and accessibility. Safety efforts include innovation, strategy and practice, as well as education, training and awareness raising for individuals. 2.1 The Principles of security The basic measurement of network security units detects the purpose of internet protection. Different goals in the main measurement is the main standard. The three standards are classification, honesty, and affordability, which is often referred to as the CIA triad (Bossomaier et al., 2019). Classification prevents data from being exposed to unauthorized persons, assets or cycles. Honesty indicates the accuracy, consistency and reliability of information. Availability ensures that data from approved customers is available when needed. These standards are used to centralize and focus activities in providing an organized framework. 2.2 The states of data The Internet is a space that contains a lot of fundamentally important information, which is why network security professionals pay attention to information security. The second component of the cybersecurity cube focuses on the question of securing information on the Internet in every possible state (Bossomaier et al., 2019): * data in transit * data at rest * data in process Internet insurance requires network security experts to protect information in each of the three countries. 2.3 Cyber-security safeguards The third element of the cybersecurity cube characterizes the skills and disciplines that network security professionals can use to provide the Internet. Network security professionals use a variety of skills and disciplines to protect information on the Internet, taking care to stay within the "half of the rights" consistently. The Cyber Security Cube recognizes three types of dimensions and principles used to provide security. Core capabilities include the innovations, gadgets and dimensions available to protect dataframes and combat cybercriminals. Network security professionals are known for their dominance of innovative tools. However, McCumber points out that innovative tools are not enough to tackle digital offenders (Bossomaier et al., 2019). Online security professionals also need to build solid security by implementing the precautions, techniques, and rules that allow Internet customers to stay safe and follow great practices. Ultimately, internet customers need to try to learn more about the dangers of the internet and build a culture of learning and paying attention. 3.0 Overall Security 3.1 The principle of confidentiality Confidentiality presupposes disclosure of data to unauthorized persons, assets and circuits. Another term used for classification is security. Associations must prepare employees for prescribed procedures to protect sensitive data in order to protect themselves and their associations from attacks (Bossomaier et al., 2019). Techniques used to ensure classification include information encryption, verification, and access control. 3.2 Protecting data privacy Associations collect a lot of information, and much of that information is not sensitive because it is publicly available, such as names and phone numbers. However, the various information collected is very touching. Touching data is information that is protected from unauthorized access to protect a person or an association. 3.3 Access control Access control is characterized by various security conspiracies designed to prevent unauthorized access to computers, organizations, data sets, or various sources of information. The idea of AAA includes three security administrations: authentication, authorization, and accounting (Bossomaier et al., 2019). Verification verifies the identity of the customer to prevent unauthorized access. Customers indicate their character with a username or identification number. The approval administration determines which assets the customer has access to and which tasks the customer can perform. Approvals can also control when customers approach certain assets. 3.4 Principle of data integrity Respect is the accuracy, consistency and reliability of information throughout its life cycle. Another expression of sincerity is quality. Strategies used to ensure information reliability include hashing, information approval checks, information compatibility checks, and access control. Reliability requirements for information depend on how the association uses the information (Alsmadi, 2019). For example, Facebook does not validate information that customers post to accounts. A bank or currency association is more concerned with respecting information than Facebook. Exchange and customer accounts must be correct. It is difficult for most associations to ensure respect for information. Loss of information integrity can result in entire sets of information being unreliable or unusable. Honesty is an approach to measuring the order of various pieces of information (documents, pictures, or notes). Respect plays into an interaction called hash capacity to display information at a specific point in time on a schedule. 3.5 Availability Information accessibility is the standard used to map the need for consistent monitoring of data frame accessibility and administration. Cyber-attacks and frame frustration can prevent access to frameworks and data managemen (Alsmadi, 2019)t. Techniques used to ensure accessibility include frame replication, frame amplification, frame strength enhancement, hardware maintenance, advanced frameworks, and programming and plans to recover quickly from unexpected defects. High availability frameworks typically include three planning standards: vulnerability elimination, solid hybrid adaptation, and differentiation from disappointment when it occurs. 4.0 Assured Operations Organizational security is achieved by filtering network traffic from different OSI layers. The example firewall checks up to OSI layer 4, and since then, web application firewall dominates and verifies down to the application layer (OSI layer 7). The introduction of new innovations enables the development of new, vibrant bots that display "humanistic" behavior (Calder, 2020). In addition, powerful bo...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Challenges in Identifying and Documenting IT Acquisition RequirementsDescription: Challenges in Identifying and Documenting IT Acquisition Requirements IT & Computer Science Coursework...8 pages/≈2200 words| 3 Sources | APA | IT & Computer Science | Coursework |
- Heuristic Principles ReflectionDescription: The knowledge and skills obtained from this course are vital because it plays an instrumental role in enabling me to fulfill my duties as a data engineer. As a data engineer, the main goal is to make data accessible so that a particular form can utilize it to maximize its performance. As a data engineer ...1 page/≈550 words| 2 Sources | APA | IT & Computer Science | Coursework |
- Database Security and SQL InjectionDescription: Executives at all levels of an organization and IT professionals at all levels should have a working knowledge of database security issues like SQL injection. There are a variety of methods firms employ to protect their databases from both external and internal threats. Database security includes...1 page/≈275 words| 4 Sources | APA | IT & Computer Science | Coursework |