The internet sure isn't a safe place as you might think it is this not only applies for us as individuals but also large organizations there have been multiple cyber breaches in the past that has compromised the privacy and confidentiality of a data if we head over to the site called information as beautiful we can see all this major cyber breaches that have been committed so as you guys can see even big companies like eBay, AOL, Evernote, Adobe have actually gone through major cyber breaches even though they have a lot of security measures taken to protect the data that they contain so it's not only that small individuals are targeted by hackers and other people but even bigger organizations are constantly being targeted by these guys so after looking at all sorts of cyber-attacks possible the breaches of the past and the sheer amount of data available we must be thinking that


 there must be some sort of mechanism and protocol to actually protect us from all these sorts of cyber-attacks and indeed they're in a way and this is called cyber security


     in a computing context security comprises of cyber security and physical security both are used by enterprises to protect against unauthorized access to data centers and other computerized systems information security which is designed to maintain the confidentiality integrity and availability of data in a subset of cyber security the use of


 Cyber security can help prevent against cyber-attacks, data breaches, identity theft and can aid in risk management


 so when an organization has a strong sense of network security and an effective incident response plan this better able to prevent and mitigate these attacks.

 there are three main activities that we are trying to protect ourselves against and they are

  1.  Unauthorized modification
  2. Unauthorized deletion 
  3. Unauthorized access 

    these freedoms are very synonymous to the very commonly known 

CIA tried which stands for confidentiality integrity and availability the CIA triad is also commonly referred to as three pillars of security


  1. Confidentiality
  2. Integrity
  3. Availability


 and most security policies of bigger organizations and even smaller companies are based on these three principles so let's go through them one by one so first on the list we have 

 


Confidentiality

 is roughly equivalent to privacy measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people while making sure that the right people can in fact get it access must be restricted to those authorized to view the data in question in as common as well for data to be categorized according to the amount and type of damage that could be done should it fall into unintended hands more or less stringent measures can then be implemented across to those categories sometimes safeguarding data confidentiality may involve special training for those privy to such documents such training would typically include security risks that could threaten this information training can help familiarize authorized people with risk factors and how to guard against them further aspects of training can include strong password and password related best practices and information about social engineering methods to prevent them from bending data handling rules with good intention and potentially disastrous results next on the list we have 

Integrity

 involves maintaining the consistency accuracy and trustworthiness of data over its entire lifecycle data must not be changed in transit and steps must be taken to ensure that data cannot be altered by unauthorized people for example in a breach of confidentiality these measures include file permissions and user access controls version control may be used to prevent erroneous changes or accidental deletion by authorized users becoming a problem in addition some means must be in place to detect any changes in data that might occur as a result of non-human caused events such as electromagnetic pulses or silver crash some data might include checksums even cryptographic checksums for a verification of integrity back up or redundancies must be available to restores affected data to its correct state last but not least is 

Availability

     is best ensured by rigorous maintaining of hardware performing hardware best immediately when needed and maintaining a correctly functional operating system environment that is free of software conflicts it's also important to keep current with all necessary system upgrades providing adequate communication bandwidth and preventing the occurrences of bottlenecks are equally important redundancy failover and even high availability clusters can mitigate serious consequences when Hardware issues do occur fast in as adaptive disaster recovery is essential for the worst case scenarios that capacity is reliant on the existence of a comprehensive disaster recovery plan safeguards against data loss or interruption in connection must include unpredictable events such as natural disasters and file to prevent data loss from such occurrences a backup copy must be stored in a geographically isolated location perhaps even in a fireproof water safe place extra security equipment’s or software such as firewalls and proxy servers can guard us against down times and unreachable data due to malicious actions such as denial of service attacks and network intrusions


     so now that we have seen what we are actually trying to implement when trying to protect ourselves on the internet we should also know the ways that we actually protect ourselves when we are attacked by cyber organizations so the first step to actually mitigate any type of cyber-attack is to

 Identify

     the malware or the cyber threat that is being currently going on in your organization next we have to actually 

Analyze 

    and evaluate all the affected parties and the file systems that have been compromised and in the end we have to patch the whole treatment so that our organization can come back to its original running state without any cyber breaches so how is it exactly done this is mostly done by actually calculating three factors.