What is Cyber Securty?

Cyber security is an activity to protect the information or resources of telematics to prevent cyber crime or cybercrime attacks. Cyber Security here aims to disrupt the physical and logical flow of systems that are deliberately done to interfere with the confidentiality, integrity, and availability of information.

The reason cyber crime is varied and ranges from hate to profit-oriented. However, some are morally motivated. System hacking is usually a moral motivation to reveal the truth about what is in the system. For example, a hacker is looking for a terrorist website and then submits that data to the authorities for management.

Cybersecurity is an effort to protect information from cyber crim attacks. Cyberattacks on the information process are all kinds of actions deliberately committed to disrupt confidentiality (confidentiality), integrity, and availability (availability) of information.

Cyber security consists of technologies, processes and controls designed to protect systems, networks, programs, devices, and data from cybercrime attacks. Effective cyber security reduces the risk of cyber attacks and protects against unauthorized access to systems, networks, and technology.

Information security definitions are often associated with the information security definition, often referred to as “Information technology security”, to protect all information resources, both in paper and digital form.

Basic concept of Cyber Security

The overall cyber security is a very broad term, but it is based on three basic concepts known as the “Trias CIA” consisting of Confidentiality, Integrity, and Availability. This concept aims to lead the organization with information security guidelines in the field of information security. Here is the explanation:


Cyber Security is a rule that restricts access to information by taking action to restrict cyber hacker access to sensitive information. In an organization, people are authorised or denied access to information based on their category by granting permission to the appropriate person in a department. Precise training on information sharing and protecting your account with a secure password is also offered.

You can change how data is managed in an organization to ensure privacy. The option to ensure confidentiality is authentication is a factor of data encryption, data classification, biometric verification, and security tokens.


Integrity ensures that data is consistent, accurate, and reliable for a certain period of time. This means that the data cannot be altered, removed, or illegally accessed during transmission. An organization must take appropriate action to ensure its security. File permissions and user access controls are steps that prevent data from being hacked.

In addition, tools and technologies should be used to detect changes or data breaches. Many organizations use checksums and cryptographic checksums to verify data integrity. To prevent data loss or accidental deletion or even cyber attacks, a regular backup should exist. Cloud Backup is the most reliable solution today.


In this case, Availability includes requirements such as hardware, software, networks, and security devices whose performance has to be maintained and upgraded. This is done to ensure smooth operation and uninterrupted access to data and to ensure constant communication between components by providing sufficient bandwidth.

These points also include selection of additional security devices in the event of a disaster or traffic jam. Utilities such as firewalls, disaster recovery plans, proxy servers and appropriate backup solutions must be insured to manage denial of service attacks.

Main element Cyber Security

Here are some of the main elements of Cyber Security:

  • Document security Policy, is a standard document used as a reference for implementing all information security processes.
  • Information infrastructure, is a medium that plays a role in the continuity of the information process, including hardware and software.
  • Perimeter Defense, is a medium that acts as a defense component in an IT infrastructure such as IDS, IPS and firewalls.
  • Network Monitoring System, is a medium that is monitoring the feasibility, use, and performance of information infrastructure.
  • System Information and Event Management, is a medium that plays a role in monitoring various events on the network, including events related to security incidents.
  • The Network security Assessment, is a cyber-security element that serves as a control mechanism and enables information security.
  • Human resource and security awareness, in relation to human resources and information security awareness.

Benefits of Cyber Security

The benefit of computer security systems is the protection of computer systems from access to someone who does not have the right to access our computer system. Cyber security systems are increasingly needed in line with increasing computer use worldwide.

In addition, more and more users connecting their LAN to the Internet do not have the necessary human resources to ensure the security of their data and information. This threatens the security of existing data because of access by people who are not authorized to do so. Computer security is important because it relates to data protection, integrity, authentication, confidentiality, and availability.

Some computer security threats are viruses, worms, trojans, spam, and more. Anyone can steal data and even damage our computer system. Security threats to this computer system cannot be eliminated in this way, but we can reduce this by using system security software such as virus protection, spam protection, etc.

1 comment for "What is Cyber Securty?"

  1. This blog has amazing information regarding this topic. The posts and blogs are very unique. Thank you so much for sharing the details. Soar Cyber Security


Post a Comment