CyberSecurity Day 01 to 100: DAY 01 | Fundamental ethics of Cyber Security

Albus Security
11 min readJun 14, 2023

--

Welcome back, esteemed security heroes! As we previously announced, the Cyber Security Day 01 To 100 Day Series is now officially initiated. You’re already familiar with the details, but today marks the beginning of this series, where you’ll gain an amazing understanding of security. The series is specifically designed to provide you with a thorough understanding of the concepts and practical knowledge required. I’m Aniket Tyagi, your author for today’s article. Today, we will explore the fundamental ethics of Cyber Security. However, before we dive in, if you have any questions about this series, be sure to read on as we address various queries to provide you with clarity. Security Series

Let’s start our First Article with a very basic term which is Information Security, So In today, modern world, where almost everything will be going into technology-based, Any technology that can be controlled through the Internet is vulnerable to digital threats, and there is an important aspect of protection of sensitive information and maintaining a secure digital environment has become an important part of our life. Information Security Refers to a process to protect your valuable assets from hackers’ access, use, disclosure, destruction, etc. It involves the processing of safeguarding Information, whether in physical or digital form. Information Security ensures that your Information remains confidential, only accessible to your or systems when needed, and maintains reliability. Now What Does Cyber Security?

HAHAHA-Typing-Command-On-laptop

So, Cyber Security is completely different, as this image is showing you, and most people think that Cyber Security means you’re just doing something on a laptop and something will happen that no one else can do. And you all know everything up to this point, that Cyber Security experts know everything. But actually, Cyber Security means much more than that.

Cybersecurity can be easily explained as the process of protecting computers, networks, and pieces of code from unauthorized access and potential losses. It involves various aspects and techniques designed to ensure the security of your digital assets. Let me explain cybersecurity using an example. Imagine you have a box filled with precious belongings that are valuable to you. Naturally, you want to keep it safe from anyone attempting to steal those items. To achieve this, you construct a strong and advanced robot equipped with mechanisms to lock and protect the contents of the box. In this scenario, the robot represents your computer system, while the box symbolizes your information, such as photos, passwords, and card details. The sophisticated mechanisms embedded in the robot represent cybersecurity, which grants access only to authorized individuals, primarily you, and safeguards against hackers and cybercriminals. Creating and building a secure system requires cybersecurity professionals to employ different techniques and approaches to defend against hackers. It’s important to note that cybersecurity extends beyond just laptops and computers. Cybersecurity is everywhere, wherever there is a cyber world. It is present in every system that is connected to the internet and in every technology that holds sensitive information.

If we look at the difference between Cyber Security and Information Security, both play important roles in securing the cyber world. While Cyber Security focuses on protecting digital assets, specifically securing systems from cyber threats. On the other hand, Information Security has a broader scope, as it encompasses the management of all forms of information, including both physical and digital assets. It’s important to note that Cyber Security is a subset of Information Security, meaning it is a part of the larger discipline.

We learn various things and understood a lot about cybersecurity. Now let’s see what importance cyber security holds. So Imagine all the personal information we share online — from our credit card information or any sensitive information. Without Proper Cyber Security Measures, any malicious, hackers and Cyber Criminals can steal your information from any online platform that you are using. Do not Worry Cyber Security acts like a saver, But it’s not just about us as individuals. Businesses and organizations also rely on cyber security to keep their secrets safe. By investing in cyber security, businesses can protect their assets, maintain customer trust, and ensure smooth operations Cyber security is such a field that you will find it everywhere, wherever there is technology, because anything that is created can also be broken. Similarly, for securing the technologies being developed, only cyber security is available. They’re like the lifeblood of our society. Imagine if hackers got their hands on all systems — it would be great for them. But thanks to cyber security, we can sleep peacefully knowing that these vital systems are well-guarded and functioning smoothly. It’s like having a superhero group defending our cities from digital villains.

Alright, let’s talk about cybersecurity laws and regulations, So I know it might sound a bit boring, but trust me, it’s crucial for keeping our sensitive information safe and fending off those nasty cyber threats. So, these legal rules are basically like rulebooks that advise organizations on how to handle and protect our valuable data. They cover all sorts of stuff like data privacy, breach notifications, and security practices. They make sure that organizations handle our personal info, like names, addresses, and financial details, with care and respect. To meet the requirements, companies have to put in place security measures like encryption, access controls, and regular security assessments. It’s like locking up a treasure chest to keep the bad guys away from our precious loot.
Now, here’s the cool part. Cybersecurity regulations often make it mandatory for organizations to let us know if our data has been compromised in a breach. They have to give us a heads-up so we can take steps to protect ourselves from identity theft or any other cyber shenanigans. It’s all about transparency and giving us the power to protect ourselves. And If companies don’t comply with these cybersecurity laws and regulations, they could face hefty fines, legal trouble, damage to their reputation, and lose our trust as customers. Nobody wants that, right? So, it’s important for organizations to stay in the loop about the regulations in their area, regularly check their own cybersecurity practices, and make any necessary improvements to stay on the right side of the law. Here are some reliable online resources where you can learn about cybersecurity laws and regulations:

Let’s talk about hacking, something that you might have heard about in movies or news, or youtube videos. Basically, hacking is when someone tries to break into computer systems or networks without permission. It’s like those cool tech-savvy detectives you see on TV, but not always with good intentions. You see, hackers use their computer skills to find vulnerabilities in systems and exploit them just by typing various commands and wearing hoodies (jokes part). so They might try to steal sensitive information, mess up websites, or even take control of computers remotely. It’s like a high-tech game of sneaking into places where they shouldn’t be. Now, not all hackers are bad guys. There are ethical hackers called “white hat” hackers who use their skills for good. They help companies find weaknesses in their systems, so they can fix them and stay safe from the bad guys. So, remember, hacking is like a digital dog-and-cat game. We need to stay vigilant, learn how to protect ourselves and support the good guys who are working to keep our digital world safe. Stay smart and keep those virtual doors locked tight.

let’s clear up the difference between hacking and cybersecurity. Hacking is like a mischievous cat trying to break into a house, while cybersecurity is the protective defense(Dog) that keeps the house safe from intruders(Cat).

Hacking is when someone with tech talents tries to gain unauthorized access to computer systems or networks. It’s like a game for them, meaning it’s like fun for them, trying to find loopholes and vulnerabilities to exploit the system. Sometimes hackers have bad intentions, aiming to steal information, or just create digital scams. On the other hand, there are ethical hackers, the good guys, who use their skills to help companies find and fix vulnerabilities. Now, cybersecurity is the superhero defending against hacking attacks. It’s all about protecting our digital systems and data from these sneaky intruders. And Cybersecurity involves implementing measures like firewalls, encryption, and strong passwords to keep the bad guys out. It also includes creating policies and procedures to ensure that our information is handled securely and that we’re prepared to respond if a breach occurs. So, think of hacking as the naughty troublemaker and cybersecurity as the mighty shield that keeps our digital assets safe. By understanding both, we can better protect ourselves and stay one step ahead of those hackers.

You Know the exciting world of cyber security and the amazing career opportunities it offers! So, you know how we’re all hooked on technology these days? Well, that also means there are more and more cyber threats out there, and that’s where cyber security professionals come in. So A career in cyber security is like being a digital superhero and you are the heroes to handle future security. You have to protect organizations, individuals, and even governments from those black-hat hackers and cybercriminals.

You’ll be the shield that keeps our cyber world safe and secure. The best part is that there’s a high demand for cybersecurity experts right now. Companies are desperate for skilled professionals who can defend their systems and keep their sensitive information locked away from the bad guys. It means you’ll have a wide range of job opportunities and plenty of room to grow and advance in your career. Plus, the field is constantly evolving. You know what the best part of Cyber Security you’ll never be bored or feel bad about it as technology keeps changing, so as a cyber security professional you always keep learning these new technologies to protect your system from new threats all the time. You’ll get to stay on the cutting edge, learning new techniques and strategies to outsmart those cyber villains. So, if you like working on computers, problem-solving, and making an analysis of problems both offensive and defensive, then cybersecurity might just be the perfect career for you. I just listed some of the job profiles in cyber security.

  1. Security Analyst: A security analyst is like a detective who investigates and analyzes computer systems and networks for vulnerabilities and threats. They identify potential risks, develop strategies to protect against them and monitor systems for any suspicious activities.
  2. Ethical Hacker: An ethical hacker, also known as a penetration tester or white-hat hacker, is a cybersecurity professional who legally and ethically attempts to hack into computer systems to identify weaknesses. They help organizations find and fix vulnerabilities before malicious hackers can exploit them.
  3. Security Engineer: A security engineer designs and builds secure computer systems and networks. They develop security protocols, configure firewalls and encryption tools, and implement measures to protect against cyber threats. They work closely with software developers and IT teams to ensure the security of systems.
  4. Network Engineer: A network engineer is like a “network architect” who designs and takes care of the computer networks in a company. They make sure the networks are set up correctly, and they keep them running smoothly and securely. They work with cybersecurity experts to add security measures to the networks and protect against hackers.
  5. Chief Information Security Officer (CISO): The CISO is the “head of cybersecurity” in a company. They are responsible for keeping the company’s information and computer systems safe from cyber attacks. They create plans to deal with security risks, make sure the company follows security rules, and lead the response if there is a cyber threat or attack.

Let’s dive into two important aspects of cybersecurity: VAPT and incident response. First, we have VAPT, which stands for Vulnerability Assessment and Penetration Testing. It’s like having a friendly hacker on your team. VAPT specialists help organizations by checking for weaknesses in their systems, just like checking for open areas. They simulate real-life attacks to uncover vulnerabilities before the bad guys do. It’s their job to ensure the organization’s systems are secure. Now, let’s talk about incident response. Think of it as having a team of superheroes ready to jump into action when a cyber attack strikes. Incident response is all about swiftly detecting, analyzing, and responding to security incidents. The incident response team acts with lightning speed to minimize damage and get things back on track. They are the defenders of the cyber world, always ready to protect organizations from cyber threats. So, there you have it! VAPT and incident response work together like a dynamic duo to protect Cyber World.

Alright, Security Readers, Now if we talk about certifications in cybersecurity. They’re like super-up things of honor that show the world you’ve some skills to protect against cyber threats. It is very important to obtain professional certifications in the field of cybersecurity. However, it may not be necessary from all perspectives. If you desire a well-settled job profile, certifications are crucial. But always remember one thing: cybersecurity is a field where your skills are given first priority rather than certifications. So, always focus on honing your skills rather than just acquiring certificates.

Before terminating the article, let me provide you with an explanation of some basic terms that will be useful for your future work and enhance your cybersecurity knowledge.

  1. Firewall: A firewall acts as a protective barrier between a network and the internet, monitoring and controlling incoming and outgoing network traffic based on predefined security rules.
  2. Encryption: Encryption is the process of converting information into a secret code to prevent unauthorized access. It ensures that only authorized individuals can access and understand the encrypted data.
  3. Patching: Patching involves applying updates or fixes to software or systems to address known vulnerabilities. Regularly installing patches helps protect against potential security risks.
  4. Vulnerability: A weakness or flaw in a system that can be exploited to compromise its security, often leading to unauthorized access, data breaches, or other malicious activities.
  5. Zero-day exploit An attack or exploit that takes advantage of a vulnerability in software or hardware that is unknown to the developers or the public. It refers to the fact that developers have zero days to fix the vulnerability.
  6. Phishing: A fraudulent attempt to obtain sensitive information, such as usernames, passwords, or credit card details, by disguising as a trustworthy entity through email, instant messages, or fake websites.

Join us on this journey, where readers and authors unite to make the online world a safer place for everyone to browse securely.

Get ready to be a digital hero in the future and embark on an exciting journey into the world of cybersecurity! Stay with us and understand the upcoming articles thoroughly. All the articles will be interconnected, providing you with a better and more valuable learning source. Just like this Day 01 article, I hope you liked it, and the upcoming articles will be equally enjoyable for you. Happy learning, happy hacking! Goodbye, see you later.

--

--

Albus Security
Albus Security

Responses (1)