Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
---
title: Introduction
---
# Introduction
(DG: Note, Far Too Mych Hyperbole)
Cyber Security is a topic that is rarely out of the news, from
allegations of state sponsored interference in the democratic process,
data breaches revealing personal data, and high profile "hacks" of
mobile apps, millions of people are potentially effected daily.
Cyber Security is focused on protecting computer systems, their
components and the data stored on them from attack, unauthorised
access or damage.
Unlike physical security, If we wish to protect an asset we could
build a big wall around it, and have security guards protecting the
entry points. Cyber security tends to be more nebulous, the nature of
the threats is constantly evolving, and our strategies for protection
need to change to deal with these threats.
Having effective Cyber Security reduces the risk of threats to people
and organisations, either reducing the change that a system will be
compromised, or the impact of an attack if (or when) the worst happens.
## Why is it important
The cost of Cyber crime is increasing with new threats discovered
daily, while businesses are a more obvious target, individuals are
still at risk. Action fraud had 332,570 incidents worth £706 Million,
reported in the 6 months between October 2017 and March 2018.
For organisations, privacy laws can lead to significant fines for
organisations, GDPR, has a maximum fine of ~£17 Million, or 4% of
annual turnover.
Finally, was the world becomes more "connected", with the rise of web
enabled "smart" devices, the number of ways we can be attacked is
growing. While previously we only needed to worry about our desktop
computer being compromised, now even our fridge, or TV can be a
target.
## The Three Pillars of Cyber Security
Effective cyber security is based on Three elements,
**People** Human error is still the leading cause of data breaches.
Educating users on the dangers they face online is an important factor
in cyber security. Computer users should be aware of threats such as
Phishing, The dangers of weak or shard passwords, and how cyber
attacks happen.
**Processes** in a business, some processes can be counter productive
to good security. Simple things like a poor password policy can
increase the threat (as people are more likely to reuse, or write
passwords down). Additionally, at a higher level, strategies to
identify, mitigate and respond to cyber threats are vital.
**Technology** is another important factor. Ensuring that your
software and hardware is resilient to attack. This can include using
software such as Antivirus or Firewalls, to protect against attack,
and ensuring that software is secure and up to date.
## Summary
In summary, cyber security is the process of protecting our computer
based assets against attack. Good cyber security is not only
dependent on getting the latest hardware, but also on the people
using the system understanding the threats and taking steps to avoid
exposure.
In the next set of topics we will focus on the specific aspects of
cyber security.
# Links
http://www.infoguardsecurity.com/the-three-pillars-of-cybersecurity/