Assignment #1 - Cyber Security Principles.docx - Fundamentals of Cybersecurity Assignment#1 Cyber Security Principles Professor Yair Levy Ph.D Table of

Assignment #1 - Cyber Security Principles.docx -...

This preview shows page 1 - 4 out of 8 pages.

Fundamentals of Cybersecurity Assignment #1 - Cyber Security Principles Professor Yair Levy, Ph.D.
Image of page 1

Subscribe to view the full document.

Table of contents Cybersecurity definitions - 2 Principles of Cybersecurity - 3 Overall Security - 3 Assured Operations - 4 Conclusion - 6 Sources - 7 Certificate of Authorship - 8 What is cybersecurity? Three sources will stated to attempt to accomplish the matter of defining cybersecurity. Starting with Cisco, on their website, cybersecurity is the practice of 1
Image of page 2
protecting systems, networks and programs from digital attack. Simple as that, nothing more. Cybersecurity according to Cisco is just a simple way of saying we use different techniques and software to create physical and software systems that primarily serve to prevent unauthorized access. Another point Cisco makes, cyberattacks are usually aimed at accessing, changing, or destroying sensitive information. As mentioned previously, the reason of cybersecurity is preventing, mitigating that process from happening. Another great point which Cisco dedicates a headline to is people. User’s have to understand and comply with basic data security principles such as choosing strong passwords, knowing spam emails and false emails, and backing up their data. Another part of our job is to educate the people in the work area about these principles and making sure they follow those principles. Digital Guardian has just about the same definition but with an extra line, “Cyber security may also be referred to as information technology security.” That is another simple way to describe what this word means. Digital guardian then goes on to explain why it is important to have cybersecurity, in brief there is lots of data that is constantly floating around, this data should be treated with care so it lands in the correct hands and protecting through the passage. This is another crucial reason of cybersecurity, protecting the data through its entire life cycle and not just in a specific part. Straight from the government, U.S. Department of Homeland Security, “It seems that everything relies on computers and the internet now, communication, entertainment, transportation, shopping. Medicine, and the list goes on.” Cybersecurity is protecting that information. The risks of having poor cybersecurity are very real, attackers are constantly searching for easy ways to cause damage or gain monetary value. With decent cybersecurity, a solid amount of prevention can happen to protect valuable data that cyberattacks aim to gain.
Image of page 3

Subscribe to view the full document.

Image of page 4
  • Fall '14
  • BiswajitPanja

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes