Journal Entry #2

Explain how the principles of science relate to cybersecurity

The science of applied cyber security. In other words, experts in the subject frequently employ established knowledge and recent scientific findings to produce practical applications, frequently in the form of technology. Other types of science include social science, formal science (such as statistics), and natural science (such as biology) (e.g., economics).
Fundamentals of cybersecurity
There are two distinct objectives to be met while adopting cybersecurity: first, private information must be kept out of the hands of possible online attackers and other unauthorized people. Second, cybersecurity precautions shouldn’t prevent legitimate users from accessing the information. The three major tenets of cybersecurity are as follows.
1.Confidentiality: As part of cybersecurity, it is important to make sure that the information being protected is only accessed by authorized users and that no information is disclosed to unauthorized parties. For instance, access to a cloud-based Customer Relationship Management (CRM) system might be restricted to users who have the proper login and password combination to implement confidentiality of firm information. Most systems additionally use data encryption to implement secrecy as an extra layer of protection.

2. Integrity: Efforts in cybersecurity should guarantee that data is accurate, consistent, and not open to unauthorized change. Integrity is attained, for instance, in the CRM example given, when safeguards are put in place to guarantee that email correspondence between a sales representative and a client isn’t eavesdropped on and altered by an intrusive party while it’s still in transit.


3. Availability: Attempts to protect information online shouldn’t prevent a legitimate person from accessing it. Additionally, redundancy access must be included in cybersecurity installation in case of any interruption. Proxy servers and firewalls, for instance, can be put in place by the business utilizing the cloud-based CRM system as a security precaution against Denial of Service (DoS) assaults, which, if successful, would render the system unavailable.

Leave a Reply

Your email address will not be published. Required fields are marked *