INTRODUCTION TO CYBERSECURITY.

THE HISTORY OF CYBERSECURITY:

Cybersecurity has been one of the prominent career paths ever since the rise of technology. Its early emergence, can be dated back as far as the year 1987. However, it hasn’t gain popularity as it gained in the preceding year (1988), after a major internet outbreak known as “The Morris Worm” which attacked the internet in November 1988, at around 08:30 p.m., a program exposed to the internet via a computer in the MIT (Massachusetts Institute Technology). Over 60,000 computers were compromised, and this gave rise to a new generation of threat agents (Hackers) attempting various malicious attacks, and compromising of digital assets and sensitive data.

 

WITH KNOWLEDGE ON THE FIRST EVER CYBER-ATTACK, HOW CAN WE DEFINE CYBERSECURITY?

The compromise of sensitive data was not only involving individual persons, but also that of big cooperation’s. In modern day with various technology and social network applications, data has become one of the most sensitive assets that can lead to the damage of reputations of individual, big cooperation’s or even the government of a country, if such data end up in the wrong hands via the internet or any other means. This gives us an understanding and hence we can have a proper definition. 

Cybersecurity can be defined as the securing of data, assets, or information’s belonging to either an individual, cooperate organizations, small scale businesses, e-commerce businesses, the government of a country, internet services providers etc., from unauthorized access.” -Mr. A.I.Benedict (Founder fixitgearware)

Defining cybersecurity is quite complex as for each field or department we are considering we have to relate the definition to the type of services and assets they provide and have custody to. However, the above definition gives us a general overview of what cybersecurity is all about with the key words being data security, and unauthorized access.

HOW IS CYBERSECURITY IMPLEMENTED, AND HOW DO WE ENSURE DATA SECURITY?

The goal of cybersecurity overtime has not change, but we cannot neglect the fact that technology has changed overtime. This gives rise to change in security policies; and patterns in securing data, has moved with the trend of newer technology. It is imperative that we have an idea of what data we are securing, whom it belongs to, who has access to the data, what can they do to the data upon access, and when would they need the data.  

A good knowledge of these, gives us a clear understanding on how we can implement data security, and as well ensure that the data is secured from unauthorized persons.

 

 

 

Put your comments below in the comment section on your thoughts about this.

Find this article and information helpful? Show some love and support  “Click-Here”
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments