Cyber Security Preparation
Cyber Security Preparation
What is Cybersecurity?
Cybersecurity is about keeping our computer systems, networks, and data safe from attacks or harm.
It’s like locking the door to your house and installing a security system, but for digital stuff.
Data Security: Making sure your data doesn't get stolen or corrupted.
Application Security: Ensuring the software you use is secure from threats.
Identity Management: Keeping track of who can access what information and systems.
Cloud computing is like renting digital space on the internet, where you can store your files, run
programs, and access services (like email or websites) without needing a physical server.
Why Cloud?
The cloud is great because it saves money, scales as your needs grow, and makes collaboration much
easier. It’s also a great way to spark innovation!
While the cloud is awesome, it does come with its own set of challenges:
Data Breaches: Hackers can sometimes break into cloud storage to steal sensitive information.
Insider Threats: Sometimes, the biggest threat can come from someone who already has access—like
an employee misusing their privileges.
Data Loss & Downtime: If cloud services go down, businesses can be disrupted.
Shared Responsibility Model: Both cloud providers and customers have roles in keeping things secure
—providers protect the cloud infrastructure, and customers protect the data and applications they
store there.
Encrypt Your Data: Make sure your information is scrambled (even if someone tries to steal it) when
stored and during transfer.
Use Multi-Factor Authentication (MFA): A second security step, like a text code or fingerprint scan,
makes sure only the right people can access sensitive information.
Regular Audits and Monitoring: Keep an eye on cloud systems to catch any suspicious activity and
check for vulnerabilities.
Limit Access: Only give people the access they need to do their job—this limits the chances of
something going wrong.
Backup and Disaster Recovery: Always have a backup plan in case things go wrong, like getting locked
out or losing data.
ISO/IEC 27001: A global standard that helps businesses manage information security.
NIST Cybersecurity Framework: Provides a set of guidelines for improving security across different
industries.
Big players in the cloud space like AWS, Azure, and Google Cloud have specific tools to keep things
secure:
AWS: Features like encryption, identity management, and security groups to protect data.
Azure: Tools like the Security Center and encryption to keep things locked down.
Google Cloud: Tools like the Security Command Center and DDoS protection to safeguard data.
Zero Trust Security: This means we don’t trust anyone by default—every user and device has to be
continuously verified.
Edge Computing Security: As data moves closer to the source (like IoT devices), securing those edge
systems becomes critical.
Capital One (2019): A misconfigured firewall on AWS exposed over 100 million accounts.
Key Lessons:
Quantum Cryptography: As quantum computers develop, we’ll need new encryption methods that
can’t be cracked by these supercomputers.
Stronger Collaboration: Cloud providers and customers must work together to make sure security is
top-notch for everyone.
Use cloud security icons (like padlocks and firewalls) and diagrams to help explain concepts.
Stick with a color scheme of blue (for trust), white (clarity), and gray (modern look).
Use clear, bold fonts for headings and key points, and include charts or diagrams to show things like
the shared responsibility model or trends over time.