Introduction To Cyber Security (Print)
Introduction To Cyber Security (Print)
[CYU 07104]
Introduction
By Paul E. Lutonja
Cyber security introduction
• Cyber Security is the protection of Computer systems against harm
• Any system is most vulnerable at its weakest point
• Attackers exploit vulnerabilities to gain unauthorized access to
valuable resources e.g., data/information
• For an attack to be successfully undertaken, attacker(s) must have the
three things: Method, Opportunity, and Motive (MOM)
• Hardware e.g., Laptops, Servers, Desktop
Computers, Phones, etc.
• Software e.g., Microsoft Windows,
C.I.A Triad
Confidentiality
• Confidentiality ensures that computer assets are accessed only by
authorized parties. That is, only those who should have access to
something will, in a need-to-know basis
• By Access, it means not only reading but also even viewing, printing,
or simply knowing that a particular asset exists.
• Confidentiality can also be called secrecy or privacy.
Integrity