Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

CYBERSECURITY

part 2
Before we read:
- Practice the vocabulary about types of Cyber attacks:

Do the activity in this link:


https://wordwall.net/es/resource/17052376/types-cyber-attacks
Read the second part of the text:
What is Cybersecurity?
Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs
and data from attack, damage or unauthorized access. From a computing point of view, security
includes cybersecurity and physical security — both are used by companies to protect against
unauthorized access to data centers and other computerized systems. Information security, which
is designed to maintain the confidentiality, integrity, and availability of data, is a subset of
cybersecurity. The use of cyber security can help prevent cyber attacks, data breaches, and
identity theft and can aid in risk management.
So, when talking about cybersecurity, one might ask yourself “What are we trying to protect ourselves
against?” Well, there are three main aspects we are trying to control:
• Unauthorized Access • Unauthorized Deletion • Unauthorized Modification

These three terms are synonymous with the very commonly known CIA triad which stands for
Confidentiality, Integrity, and Availability. The CIA triad is also known as the three pillars of security and
most of the security policies of an organization are built on these three principles.
The CIA triad:
The CIA triad which stands for Confidentiality, Integrity, and Availability is a design model to guide
companies and organizations to form their security policies. The components of the triad are
considered to be the most important and fundamental components of security. So let me brief
you all about the three components.
Confidentiality is the protection of personal information. Confidentiality
means keeping a client’s information between you and the client, and not
telling others including co-workers, friends, family, etc.

Integrity, in the context of computer systems, refers to methods of


confirming that data is real, correct and protected from unauthorized user
modification.

Availability, in the context of a computer system, refers to the ability of a


user to access information or resources in a specified location and in the
correct format.
How is Cybersecurity implemented?
There are numerous procedures for actually implementing cybersecurity, but there three
main steps when actually fixing a security-related issue.
The first step is to recognize the problem that is causing the security issue, for example, we
have to recognize whether there is a denial of service attack or a man in the middle attack.
The next step is to evaluate and analyze the problem. We have to make sure we isolate all
the data and information that may have been compromised in the attack. Finally, after
evaluating and analyzing the problem, the last step is to develop a patch that actually
solves the problem and brings back the organization to a running state.

When identifying, analyzing and treating a


cyber attack, there are three principals that are
kept in mind for various calculations. They are:
• Vulnerability
• Threat
• Risk
After you read:
- Do the activity called CYBERSECURITY - QUESTIONS on
Moodle:
1. What is Cybersecurity?
2. What does Cybersecurity try to prevent?
3. What does Cybersecurity try to control?
4. What are the components of the CIA Triad?
5. What are the 3 main steps to implement Cybersecurity?
Vocabulary Activity:

- Follow the link and you will find some activities on QUIZLET
- Look at the Flashcards (Fichas) and practice the vocabulary
- Then go to Test (Probar) and do the activities there

QUIZLET ACTIVITY:
https://quizlet.com/_9pulec?x=1jqt&i=2ndyj1

You might also like