Majid Z Hacker - Free Crack Softwares
Advertisement
  • Home
  • Articles
    • Tech Articles
    • Tech Guides
  • Android
    • APK
    • Games APK
    • Moded Apk
  • Cracked Softwares
    • Marketing Softwares
    • PC Cracked Softwares
    • Premium Softwares
    • Remote Administration Tools
    • Vpns
  • SEO
    • SEO Tools
  • PC Softwares
    • Windows Softwares
  • Tech Courses
No Result
View All Result
  • Home
  • Articles
    • Tech Articles
    • Tech Guides
  • Android
    • APK
    • Games APK
    • Moded Apk
  • Cracked Softwares
    • Marketing Softwares
    • PC Cracked Softwares
    • Premium Softwares
    • Remote Administration Tools
    • Vpns
  • SEO
    • SEO Tools
  • PC Softwares
    • Windows Softwares
  • Tech Courses
No Result
View All Result
Majid Z Hacker - Free Crack Softwares
No Result
View All Result
  • Home
  • Articles
  • Android
  • Cracked Softwares
  • SEO
  • PC Softwares
  • Tech Courses
Home Articles

What is Cyber Security?

Majid Z Hacker by Majid Z Hacker
in Articles, Tech Articles
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on WhatsappShare on Telegram

What is Cyber Security?

What is Cyber Security?

So let’s talk about cybersecurity at a very high level and look at the purpose of security so if you’ve done any research on security in general you’ll probably see these terms quite frequently information security information assurance system security cyber security. There’s a there’s so many different names and terms that apply to pretty much the same thing at a very deep technical level there are certainly differences between information security or InfoSec and IA but at a very high level. There’s really no difference it’s really one in the same you’re still focused on the same thing so cyber security can be defined as the techniques and practices designed to protect data and when we talk data we’re talking about digital data so data that’s stored transmitted or used on an information system after all that’s what the attackers are after they’re after the data the the network or the computers or the servers or any of those things those are just mechanisms to get to the data so you know a lot of people get confused about security is I need to lock down this computer or I need to change my password I need to do all these things right and those are all protective mechanisms to keep people from accessing data so when  a attacker is coming into your system or trying to get something they’re trying to get the data they’re not trying to get your computer they’re not trying to get your phone they’re trying to get your data and that is exactly what we’re trying to protect so what are we protecting data from really what you’re trying to protect data from is unauthorized access unauthorized modification and unauthorized deletion now. You’ll see terms Vannucci ality integrity and availability those three terms are pretty synonymous with security those are the core three terms that you’ll see and you’ll see it called the CIA triad or the ica triad and those are the core principles of security and when you’re talking about unauthorized access.

You’re talking about you don’t want people to see data which is keep it confidential right keep it secret you don’t want anyone seeing the data unless they’re authorized to do so the same with changing the data modifying it that protects the integrity of the data and lastly you don’t want anybody deleting data or you want it to be available so they’re pretty simple concepts but believe it or not it’s very complex when you get into actually implementing these on an information system and implementing security using these principles but at its core again these are the three main principles unauthorized access unauthorized modification and unauthorized deletion is exactly what you’re defending so let me give you a couple examples of each one of them an example of access is anyone using a computer or device like a mobile device a phone a tablet or getting into an actual folder or directory that contains files getting into those files or executing a software application running a software application every user that does this needs to be authorized to do so you need to tightly control that to make sure that whoever is opening devices or using devices or opening files is authorized to do so and the same with modification anybody changing a computer or device changing the configuration of the computer or device same with changing the configuration of a folder or directory you can actually modify permissions who can get in who can get out you don’t want anybody changing those unless they’re authorized to do it same with files and software applications. So it’s very important to control who can modify things on your information system and lastly you don’t want anybody deleting anything unless they’re authorized to do it right so if you go to use the data that you need access to and it’s not there hey who deleted that I don’t know you need to know it’s important it’s it’s critical that’s probably in my opinion this is probably one of the more important principles is the availability or the deletion of data you want to make sure that that data that system whatever it is is available when your customers or when you need to use it so in closing. Consider using a tool like IGA, which can help system admins manage user identities and entitlements. For more about what is identity governance, check the link. I wanted to add this this awesome picture I found this on the internet and thought it was hilarious you know guy just napping and you know hanging out and I just wanted to drive home the the principles of you really want to make sure that you’re vigilant and that you’re protecting it gets unauthorized access modification and deletion so be the opposite of this guy.

ShareTweetSendShare
Previous Post

Understanding API Testing, Its Benefits, And Best Practices [ 2025 ]

Next Post

Why Study Information Technology (IT) ? Full Explaination In Details

Majid Z Hacker

Majid Z Hacker

Related Posts

Articles

Why Dedicated Software Development In Ukraine Is Booming [ 2025 ]

by Majid Z Hacker
14 January 2025
Articles

Tips How To Find PST Files In Microsoft Outlook 2007 And 2010 [ 2025 ]

by Majid Z Hacker
17 January 2025
Articles

Data-Driven Agriculture: 5 Useful APIs In Farming [ 2025 ]

by Majid Z Hacker
14 January 2025
Articles

How To Buy Tron In The United States In 2025: A Step-by-Step Guide

by Majid Z Hacker
15 January 2025
Next Post

Why Study Information Technology (IT) ? Full Explaination In Details

Telegram Channel

Advertise With Us

advertise with us

Popular Posts

  • fl studio

    FL Studio 24.0 Crack Download [ 2025 ] Full Activated

    0 shares
    Share 0 Tweet 0
  • WonderDraft 1.1.9 Crack Download [ 2025 ] Fantasy Maps Creator

    0 shares
    Share 0 Tweet 0
  • Adobe Acrobat Pro DC 24.4.1.2 Crack Download [ 2025 ] Activated

    0 shares
    Share 0 Tweet 0
  • Wondershare Filmora 14.13.12 Crack Download [ 2025 ] Activated

    0 shares
    Share 0 Tweet 0
  • AnyUnlock 2.1.0 Crack [ 2025 ] Download – iPhone Password Unlocker

    0 shares
    Share 0 Tweet 0
Majid Z Hacker - Free Crack Softwares

We provide here windows and pc softwares, tech tips and tricks, digital marketing, seo and blogging, crypto and tech related articles for free.

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms And Conditions
  • Advertise With Us
  • Write For Us
No Result
View All Result
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms And Conditions
  • Advertise With Us
  • Write For Us

© 2024 Majid Z Hacker - Website Created By Admin.