Latest Post

About Cyber Security, cyber security details.

We will provide you with details about cyber security.

The technique of securing information by limiting information risks is known as cyber security (cybersecurity) or information security. It’s a component of information risk management. It often entails preventing or limiting the likelihood of unauthorized/inappropriate data access, or the illegal use, disclosure, interruption, deletion, corruption, alteration, inspection, recording, or devaluation of information.

Early Days of Computing

  • The earliest days of computing saw limited use of computers and the internet.
  • Security was not a primary concern, as the threat landscape was not as sophisticated as it is today.

The Emergence of the Internet

  • The emergence of the internet changed the game for cybersecurity, as it created a global network that connected people, organizations, and devices.
  • The rapid growth of the internet led to an increase in cyber threats, as hackers and malicious actors sought to exploit vulnerabilities in the network.

Rise of Cybercrime

  • The rise of cybercrime was a significant event in the evolution of cybersecurity.
  • As the internet grew in popularity, so did the number of cyber attacks, including viruses, malware, and phishing scams.

The Need for Cybersecurity Solutions

  • The growing threat of cybercrime prompted the development of cybersecurity solutions, including firewalls, antivirus software, and intrusion detection systems.
  • These solutions helped organizations to better protect their information and assets from cyber threats.

Cyber security is a critical aspect of modern life, as more and more of our personal and professional activities are conducted online. It refers to the practice of protecting internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access. The fundamental objective of information security is the balanced protection of data confidentiality, integrity, and availability (also known as the CIA triad) while retaining a focus on effective policy execution, all without compromising organisational productivity.

There are many different threats, including viruses, malware, hacking, and identity theft. In order to stay protected, it’s important to stay informed about the latest threats and to take steps to secure your devices and online accounts. This can include installing anti-virus software, using strong passwords, and being cautious when downloading or opening email attachments.


For businesses, security is especially important. In addition to protecting sensitive customer information and financial data, companies must also protect their critical infrastructure and intellectual property. This can involve implementing firewalls, intrusion detection systems, and other security measures to prevent unauthorized access to their networks and systems.

Overall, cyber security is an ever-evolving field, and it’s important to stay informed and proactive in order to stay protected. By understanding the basics of cyber security and taking steps to secure your devices and online accounts, you can help ensure that your sensitive information and assets remain safe and secure in the digital world.

Note: Academics and cyber security professionals work together to provide guidelines, policies, and industry standards on passwords, antivirus software, firewalls, encryption software, legal liability, security awareness and training, and so on. See factsheets.


    No feed items found.