Today we will discuss about the various domains present in vast landscape of Cybersecurity to choose to get started/advancing after completing foundational knowledge.
“Cybersecurity is a multidisciplinary field due to vast variety in technologies employed in every part of our digital life .”
Since there are multiple type of technology used , various type of best security practices must be employed in multiple domains.
This field provides a plethora of different domains to indulge in:
Let’s get started –
The general and specific application we all engage with, requires a level of protection from intruders because they store a lot of personal and organisational confidential information . To ensure integrity of data and reputation of organisation,it’s important to employ security best practices.
Centers on maintaining the confidentiality, integrity, and availability of sensitive information, shielding it from theft, alteration, or destruction. It’s main objective is to prevent confidential information irrespective of the medium it is present, from unauthorised actions by threat actors.
It’s main objective is on securing communication pathways to prevent the network environment(perimeter) of a device/service. The Operational Network (*network in which device/service operates) of any end point device must be intact and secure to prevent any ‘info’ leak or eavesdropping.
Operational Security, or OPSEC, is like keeping a secret to stay safe online. It means being careful about what you share and how you do things, so bad people can’t figure out your personal information. It’s like a digital lock to protect yourself and your stuff on the internet.
It’s a pretty vast domain in itself as it addresses security challenges associated with cloud platforms, ensuring the protection of data stored and processed in cloud environments. It also includes protection at the perimeter of users accessing unauthorised resources on clouds or tampering with the functionality.
It deals with the “Handling User Access” Mechanism of an application which we will learn in near future.It
manages user access rights, authentication, and authorization, preventing unauthorized entry to systems and data.
For integrity of data in transmission and storage we use cryptographic mechanism which utilizes mathematical algorithms to encrypt and protect data during transmission and storage, preventing unauthorized access.
— Cryptography is an advanced and crucial domain which we will learn in depth. —
Understanding the different parts of cybersecurity is like having a strong shield to keep our online world safe.
Grateful for your time on this journey of words. Until our next chapter, stay inspired and be well. Thank You!
Passionate Cybersecurity Enthusiast educating beginners in simplest way possible to go from "Rookie to Corporate"
Security Lit Limited
Text to speech