Fundamentals of IT and Cyber Security
Fundamentals of IT and Cyber Security
AND
Confidentiality
Confidentiality is roughly equivalent to privacy and avoids the
unauthorized disclosure of information. It involves the
protection of data, providing access for those who are
allowed to see it while disallowing others from learning
anything about its content. It prevents essential information
from reaching the wrong people while making sure that the
right people can get it. Data encryption is a good example to
ensure confidentiality.
Integrity
Integrity refers to the methods for ensuring that data is real,
accurate and safeguarded from unauthorized user
modification. It is the property that information has not be
altered in an unauthorized way, and that source of the
information is genuine.
Availability
Availability is the property in which information is accessible
and modifiable in a timely fashion by those authorized to do
so. It is the guarantee of reliable and constant access to our
sensitive data by authorized people.
Cryptographic techniques.
Hashing
Password Storage
Hash functions provide protection to password storage.
Instead of storing password in clear, mostly all logon
processes store the hash values of passwords in the file.
The Password file consists of a table of pairs which are in the
form (user id, h(P)).
An intruder can only see the hashes of passwords, even if he
accessed the password. He can neither logon using hash nor
can he derive the password from hash value since hash
function possesses the property of pre-image resistance.
Digital Signature
A digital signature is a mathematical technique which
validates the authenticity and integrity of a message,
software or digital documents. It allows us to verify the
author name, date and time of signatures, and authenticate
the message contents. The digital signature offers far more
inherent security and intended to solve the problem of
tampering and impersonation (Intentionally copy another
person's characteristics) in digital communications. The
computer-based business information authentication
interrelates both technology and the law. It also calls for
cooperation between the people of different professional
backgrounds and areas of expertise. The digital signatures
are different from other electronic signatures not only in
terms of process and result, but also it makes digital
signatures more serviceable for legal purposes. Some
electronic signatures that legally recognizable as signatures
may not be secure as digital signatures and may lead to
uncertainty and disputes.
Application of Digital Signature
The important reason to implement digital signature to
communication is:
Authentication
Authentication is a process which verifies the identity of a
user who wants to access the system. In the digital signature,
authentication helps to authenticate the sources of
messages.
Non-repudiation
Non-repudiation means assurance of something that cannot
be denied. It ensures that someone to a contract or
communication cannot later deny the authenticity of their
signature on a document or in a file or the sending of a
message that they originated.
Integrity
Integrity ensures that the message is real, accurate and
safeguards from unauthorized user modification during the
transmission.
Blockchain Revolution
Blockchain technology is the most important invention in
computing era. It is the first time in human history that we
have a genuinely native digital medium for peer-to-peer
value exchange. The blockchain is a technology that enables
cryptocurrencies like Bitcoin. The blockchain is a vast global
platform that allows two or more parties to do a transaction
or do business without needing a third party for establishing
trust. It is difficult to predict what blockchain systems will
offer in regards to cybersecurity. The professionals in
cybersecurity can make some educated guesses regarding
blockchain. As the application and utility of blockchain in a
cybersecurity context emerges, there will be a healthy
tension but also complementary integrations with traditional,
proven, cybersecurity approaches.
IoT Threats
IoT stands for Internet of Things. It is a system of interrelated
physical devices which can be accessible through the
internet. The connected physical devices have a unique
identifier (UID) and have the ability to transfer data over a
network without any requirements of the human-to-human
or human-to-computer interaction. The firmware and
software which is running on IoT devices make consumer and
businesses highly susceptible to cyber-attacks. When IoT
things were designed, it is not considered in mind about the
used in cybersecurity and for commercial purposes. So every
organization needs to work with cybersecurity professionals
to ensure the security of their password policies, session
handling, user verification, multifactor authentication, and
security protocols to help in managing the risk.
AI Expansion
AI short form is Artificial intelligence. According to John
McCarthy, father of Artificial Intelligence defined AI: "The
science and engineering of making intelligent machines,
especially intelligent computer programs." It is an area of
computer science which is the creation of intelligent
machines that do work and react like humans. Some of the
activities related to artificial intelligence include speech
recognition, Learning, Planning, Problem-solving, etc. The key
benefits with AI into our cybersecurity strategy has the ability
to protect and defend an environment when the malicious
attack begins, thus mitigating the impact. AI take immediate
action against the malicious attacks at a moment when a
threats impact a business.
Conclusion