Understanding the business side of cybersecurity
By now, you have heard of cybersecurity many times in this book, so let’s recap. Cybersecurity protects computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves a combination of technologies, processes, and practices designed to secure sensitive information and prevent cyber threats.
Information security is a broader term that refers to the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes physical security measures and digital security measures to ensure the confidentiality, integrity, and availability of information, the CIA Triad.
These three objectives form the foundation of a comprehensive cybersecurity strategy and are considered to be the cornerstones of information security.
Authentication is essential for maintaining confidentiality, as...