The key concept of Cyber Security

The Cyber Security on a whole is a very broad term but is based on three fundamental concepts known as “The CIA Triad“. It consists of Confidentiality, Integrity and Availability. This model is designed to guide the organization with the policies of Cyber Security in the realm of Information security. Confidentiality It defines the rulesContinue reading “The key concept of Cyber Security”

Difference Between CyberSecurity and Network Security

Cyber security is a subset of information security which refers to a set of techniques and methodologies used to protect integrity of networks, devices, programs, and data from damage, attack, or unauthorized access. In simple terms, cyber security is the practice of protecting internet-connected systems and networks from digital attacks. Network security, on the otherContinue reading “Difference Between CyberSecurity and Network Security”

Best sites to Learn about Cyber Security

With the increasing need for cyber-security professionals in this day and age of constant threats and sophisticated hackers, having even the most basic knowledge in cyber-security is more important than ever. With the constant looming threats, the Internet is lurking with bad guys waiting to attack businesses and even you. With basic or even moreContinue reading “Best sites to Learn about Cyber Security”

Jobs in Cyber Security

While other types of IT jobs like network administrator or software developer are more common and well-known, cyber security jobs are smaller in number but fast increasing in importance. As our global economy has led to more Internet-based computing and connectivity the world over, organizations have grown ever more vulnerable to hacking and cyber attacks.Continue reading “Jobs in Cyber Security”

My First Blog Post

Journey to the thousand miles begin with one single step… This is Midhun Nirmal. I am passionate towards cybersecurity and started this blog which could be helpful for netizens looking for informaton in cybersecurity space. Lets being… Attackers are now using more sophisticated techniques to target the systems. Individuals, small-scale businesses or large organization, areContinue reading “My First Blog Post”