πŸ”‘ Core Cybersecurity Concepts

1. CIA Triad (The Foundation)
The three pillars of cybersecurity:
β€’ Confidentiality – Keeping data private (only authorized users can access it).
Example: Encryption, passwords, access controls.
β€’ Integrity – Ensuring data is accurate and unaltered.
Example: Digital signatures, file checksums.
β€’ Availability – Ensuring data and systems are accessible when needed.
Example: Backups, redundancy, DDoS protection.
________________________________________
2. Authentication, Authorization, and Accounting (AAA)
β€’ Authentication – Verifying identity (e.g., username + password, biometrics, MFA).
β€’ Authorization – Granting permissions (what the user can access/do).
β€’ Accounting – Tracking user activity (logs, audits).
________________________________________
3. Threats & Vulnerabilities
β€’ Threat – Something that could cause harm (e.g., hacker, malware).
β€’ Vulnerability – Weakness that can be exploited (e.g., unpatched software).
β€’ Exploit – The actual method of attack.
β€’ Risk = Threat Γ— Vulnerability Γ— Impact.
________________________________________
4. Defense in Depth (Layered Security)
Security should not rely on one layer only.
β€’ Physical Security – Locks, CCTV, guards.
β€’ Network Security – Firewalls, VPN, IDS/IPS.
β€’ Endpoint Security – Antivirus, patches, device encryption.
β€’ Application Security – Secure coding, testing.
β€’ Data Security – Encryption, backups.
β€’ User Awareness – Training against phishing, social engineering.
________________________________________
5. Security Controls
β€’ Preventive (stop attacks) β†’ firewalls, access controls.
β€’ Detective (identify attacks) β†’ IDS, monitoring, SIEM.
β€’ Corrective (fix damage) β†’ patches, backups, disaster recovery.
________________________________________
6. Common Cyber Attacks
β€’ Phishing (tricking users into giving info).
β€’ Malware (virus, worm, trojan, ransomware).
β€’ DDoS (overloading a service).
β€’ Man-in-the-Middle (eavesdropping).
β€’ SQL Injection & XSS (web app attacks).
β€’ Zero-day Exploits (attacks on unknown vulnerabilities).
________________________________________
7. Encryption & Cryptography
β€’ Symmetric encryption – Same key for encryption/decryption (AES).
β€’ Asymmetric encryption – Public/private key (RSA, ECC).
β€’ Hashing – One-way fingerprint of data (SHA, MD5).
β€’ Digital Certificates – Used in SSL/TLS for website security.
________________________________________
8. Identity & Access Management (IAM)
β€’ Principle of Least Privilege (PoLP) – Give only the access required.
β€’ Zero Trust – β€œNever trust, always verify.”
β€’ Multi-Factor Authentication (MFA) – Extra security layer.
________________________________________
9. Incident Response
Steps when something goes wrong:
1. Preparation – Plans, training, backups.
2. Detection – Spot the incident (monitoring, alerts).
3. Containment – Limit the damage.
4. Eradication – Remove the threat.
5. Recovery – Restore systems.
6. Lessons Learned – Improve security.
________________________________________
10. Compliance & Standards
β€’ GDPR, HIPAA, PCI-DSS – Regulations for protecting data.
β€’ ISO 27001, NIST, CIS – Security frameworks & best practices.
________________________________________
βœ… In short: Cybersecurity = protecting data + systems + people from threats using layers of defense, strong identity controls, and continuous monitoring.

Leave a Reply

Your email address will not be published. Required fields are marked *