EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

Cybersecurity Fundamentals

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Cyber Security Tutorial » Cybersecurity Fundamentals

Cybersecurity Fundamentals

Introduction to Cybersecurity Fundamentals

For a few years, the growth of the internet has increased exponentially. A decade back, most of the things were handled offline while these days one can internet for any almost of the purpose. Together with the growth of the internet, security has become a point of concern. The attackers are sitting all across the world to breach the system for their personal benefits. Several AI-based complex applications have also been developed these days that makes hacking easier. In contrast to that, the cybersecurity auditors have also reinforced their court by using the same complex applications to protect the system. Here in this article, we are going to learn about cybersecurity fundamentals. Cybersecurity is comprised of various components and we will cover most of them here.

Understanding the Fundamentals of Cybersecurity

Cybersecurity refers to the term which means protecting the system on the internet. It can also be considered as the fortifying the systems in order to stay protected against the breaches online. Cybersecurity compromise is several modules where every module has is responsible to protect the system in a particular manner. Eventually what all the modules take care of is to prevent the system from malicious attacks that could lead to harm to the system. Below are some of the modules of cybersecurity that helps in protecting the system, especially to the systems that are having the public interface.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

Some of the Cybersecurity Fundamentals are given below:

1. Network Security

Network security can be defined as protecting the internal network from being attacked by malicious users. The organizations use the internal servers that have to stay protected in order to protect the system and business operations. The server has to be configured with the security aspects so that it has the capability to oppose the attack. The network security is also about protecting all the devices connected in the network like computers, printers, routers, switches and so on. The server should have a strong mechanism implemented to detect malicious activity so that it could be stopped before it harms the network. The main purpose of this network security is to ensure that the network is secure so that the entire system could stay protected. Below are some of the technologies and tools used in network security.

  • IPS & IDS – These are the tools that are used to detect malicious activity and stop it from being executed. IPS stands for intrusion prevention system and IDS stands for the intrusion detection system.
  • Firewall – Firewall works are the checking point for all of the requests that hit the ports of the server to get inside the network. It ensures that the ports not in use should be closed or filtered based on the business need.

2. Security Compliances

Compliances are the policies that have to be implemented in the organization to protect their system. The compliances are comprised of a set of rules which define the security measures which the organization must have to take care of in order to stay protected. All the policies that restrict the users or the employees of the organization from performing particular activities are the outcome of security compliances. ISO 27001 is one of the most popular compliance is usually practiced by large, mid and some of the small organizations. Below are some of the compliance that vary industry-wise.

  • PCI DSS: The compliance is applicable for all of the organizations that accept online payment. It stands for Payment Card Industry Data Security Standard. It is mandatory for all of the organizations to adopt this compliance before they can bring the functionality of accepting online payment into their system.
  • HIPPA: It stands for Health Insurance Portability and Accountability Act. This is the compliance that has to be followed by all of the organization that works with patients data. The purpose of this complaint is to ensure that the sensitive data of the patients are protected.

3. Web Application Security

Web Application Security may be defined as the term that defines the protection of the web application that is used by the users of that system in order to interact with them. The web application must be developed by keeping the security in mind as the vulnerability can be leveraged by attackers in order to breach the system. Compromising any vulnerability can also make a path for the attacker to attack the organization’s network. To make sure that the application is protected from vulnerabilities, there is a mechanism to perform manual and automated checks. There are several tools available that allow the cybersecurity analysts to run the scan and check if the web application is vulnerable to any attack. The OWASP Top 10 is the list of vulnerabilities that are commonly found in any application and are very severe in nature. Below are some of the common web application vulnerabilities that are usually found in the application.

  • SQL Injection: The SQL injection is the vulnerability that lets the attacker inject SQL queries in the application in order to access the data from the database without authorization.
  • Cross-site scripting: This vulnerability allows an attacker to execute the Javascript at the client-side so that they can get the information stored in the client-side and also to force the client to perform a particular activity.
  • Broken authentication: The is the second vulnerability mentioned in the list of OWASP top 10. Any application that allows the authentication bypass is vulnerable to this attack.
  • XML External Entity: Any application that parses the XML entity from the external data is vulnerable to this attack. The hacker can gain access to sensitive files stored in the server using this weakness of the application.

Conclusion

Cybersecurity is a huge domain and comprises several modules. These modules have their own importance and can be used to protect the system in a particular manner. We have covered some of the modules in this article while there are several other cybersecurity professionals to protect the system from being breached. The more features we add into our system, the more it has the chance to be vulnerable but by using the current technologies we can design the best solutions.

Popular Course in this category
Cyber Security Training (12 Courses, 3 Projects)12 Online Courses | 3 Hands-on Projects | 77+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (6,021 ratings)
Course Price

View Course

Related Courses
Ethical Hacking Training (9 Courses, 7+ Projects)Penetration Testing Training Program (2 Courses)

Recommended Articles

This is a guide to the Cybersecurity Fundamentals. Here we have discussed the basic concept with some of the modules of cybersecurity fundamental that helps in protecting the system. You can also go through our other suggested articles to learn more –

  1. Invest in Cybersecurity
  2. Types of Web Hosting
  3. Web Application Security
  4. Cyber Marketing

Cyber Security Training (12 Courses, 3 Projects)

12 Online Courses

3 Hands-on Projects

77+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

2 Shares
Share
Tweet
Share
Primary Sidebar
Cyber Security Tutorial
  • Basics
    • What is Cyber Security
    • Careers in Cyber Security
    • Types of Cyber Security
    • Cyber Security Challenges
    • Cyber Security Principles
    • Cyber Security Standards
    • Cybersecurity Framework
    • Cybersecurity Fundamentals
    • Invest in Cybersecurity
    • Cyber Marketing
    • Cyber Security Incidents
    • What is Data Breach?
    • Pretty Good Privacy
    • What is Incognito Mode?
    • Important Cyber security Tools
    • The Importance Cyber Security
    • Cyber Crime in India
    • Guide On Viruses Function Lives
    • Malware Analysis
    • Cyber Forensics
    • What is SSL Certificate?
    • Techniques of fraud detection analytics
    • Types of Computer Worms
    • Types of Network Security Attacks
    • Cyber Security Interview Questions

Related Courses

Cyber Security Training Course

Ethical Hacking Training Course

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More