Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and damage. The three core goals of cybersecurity are known as the CIA Triad:
As individuals, organizations, and governments rely increasingly on digital systems, the risks of cyber threats have grown significantly. Cybersecurity protects:
Human error remains the weakest link in cybersecurity — most successful attacks exploit people rather than technology directly.
Malware is any software intentionally designed to disrupt, damage, or gain unauthorized access to a computer system.
| Type | Description |
|---|---|
| Virus | Attaches itself to legitimate files; spreads when the file is executed |
| Worm | Self-replicates and spreads across networks without human intervention |
| Trojan Horse | Disguises itself as legitimate software to trick users into installing it |
| Ransomware | Encrypts user data and demands payment (ransom) for the decryption key |
| Spyware | Secretly monitors user activity and collects sensitive information |
Phishing is a social engineering attack that uses disguised emails or fraudulent websites to trick users into revealing sensitive information such as passwords or credit card numbers.
A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predefined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (like the internet).
Detects, quarantines, and removes malware from a system by scanning files against a database of known threat signatures.
Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) using an algorithm and a key. Only authorized parties with the correct key can decrypt and read the data.
| Feature | Symmetric | Asymmetric |
|---|---|---|
| Keys used | 1 (shared) | 2 (public + private) |
| Speed | Faster | Slower |
| Key distribution | Difficult | Easier |
| Example | AES | RSA |
HTTPS (Hypertext Transfer Protocol Secure) secures web communication by using SSL/TLS encryption. It combines asymmetric encryption (for key exchange) and symmetric encryption (for data transfer), ensuring confidentiality and integrity between a browser and a web server.