Article image Basics of Cybersecurity

54. Basics of Cybersecurity

Page 74 | Listen in audio

Chapter 54: Understanding Cybersecurity

Cyber ​​security, also known as cybersecurity, is an area of ​​immense importance in the modern world, especially for professionals working in administrative environments. The administrative assistant, although not an IT specialist, needs to have basic knowledge on the subject to protect sensitive information and ensure the security of the company.

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, altering or destroying sensitive information, disrupting business processes or extorting money from users. An effective cybersecurity strategy involves multiple layers of protection spread across an organization's computers, networks, and programs.

Importance of Cybersecurity

As technology becomes more and more integrated into our lives, the need for cybersecurity only increases. Cyber ​​threats can affect anyone from individuals to large corporations. For businesses, a cyberattack can result in financial loss, reputational damage, and loss of customer trust.

Cybersecurity Basics

There are three core principles of cybersecurity: confidentiality, integrity, and availability, known as the CIA triangle. Confidentiality is the practice of limiting access to information to authorized persons only. Integrity involves ensuring that information is accurate and complete, and availability ensures that information is always accessible to those who need it.

Types of cyber threats

There are many types of cyberthreats, including malware, phishing, man-in-the-middle attacks, denial-of-service (DoS) attacks, and brute-force attacks. Malware is malicious software that damages or disables computers and computer systems. Phishing is a fraud technique where the attacker disguises himself as a trusted entity in order to obtain sensitive information. Man-in-the-middle attacks occur when attackers intercept and alter communication between two parties. DoS attacks overload systems, networks or servers with traffic to drain resources and bandwidth. Brute force attacks attempt to crack passwords through repetitive and systematic attempts.

Cyber ​​protection measures

There are several steps you can take to protect against cyber threats. This includes installing firewalls and antivirus software, performing regular data backups, implementing two-factor authentication, encrypting sensitive data, and educating employees on safe internet practices.

Cybersecurity in the administrative environment

In the administrative environment, cybersecurity is crucial. Administrative assistants have access to a great deal of sensitive data, and it is their responsibility to protect this information. This means not only implementing security measures, but also being aware of cyber threats and knowing how to react in the event of an attack.

Conclusion

Understanding the basics of cybersecurity is vital for any administrative assistant. While cybersecurity can seem like a complex and intimidating field, having a basic understanding of the subject can help protect your business and yourself from cyber threats. Remember, cybersecurity isn't just about protecting systems and networks - it's about protecting people and information.

Now answer the exercise about the content:

What are the three fundamental principles of cybersecurity, also known as the CIA triangle?

You are right! Congratulations, now go to the next page

You missed! Try again.

Article image Notions of Agile Methodology

Next page of the Free Ebook:

75Notions of Agile Methodology

3 minutes

Earn your Certificate for this Course for Free! by downloading the Cursa app and reading the ebook there. Available on Google Play or App Store!

Get it on Google Play Get it on App Store

+ 6.5 million
students

Free and Valid
Certificate with QR Code

48 thousand free
exercises

4.8/5 rating in
app stores

Free courses in
video, audio and text