DEFINITION OF CYBERSECURITY AND SAFETY THREATS PRESENTED BY: GIO BADILLES DARLYN MACAVINTA
Cybersecurity According to Kim, D., & Solomon, M. G. in "Fundamentals of Information Systems Security" (Jones & Bartlett Learning, 2016), A cybersecurity threat refers to any potential malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information systems.
Key Aspects of Cybersecurity Protection of Assets Cybersecurity aims to safeguard various digital assets, including networks, servers, mobile devices, cloud systems, applications, and the sensitive data they hold. Defence Against Threats It defends against various cyberattacks, such as ransomware, data breaches, phishing scams, and other forms of malicious activity designed to steal, change, or destroy information or disrupt business processes.
People, Processes, and Technology: An effective cybersecurity strategy integrates these three components: People : Users need to understand security principles, use strong passwords, be cautious of email attachments, and follow safe digital practices. Processes : Organizations implement frameworks and policies, such as data backup and management, to handle and respond to cyber incidents effectively. Technology : Tools like firewalls, antivirus software, intrusion detection systems, and security gateways are used to detect and prevent threats.
According to Goetsch , D. L. in "Occupational Safety and Health for Technologists, Engineers, and Managers" (Pearson, 2018), A safety threat involves any situation, condition, or behavior that poses a risk of physical harm to individuals or damage to the environment or property. Safety Threats
Common Cybersecurity Safety Threats 1. Malware – malicious software such as viruses, worms, Trojans, and ransomware that damage or hijack systems. 2. Phishing Attacks – deceptive emails or messages tricking users into revealing sensitive information. 3. Denial-of-Service (DoS) and Distributed DoS (DDoS) – flooding systems with traffic to make them unavailable.
4. Man-in-the-Middle Attacks ( MitM ) – interception and manipulation of communication between two parties. 5. SQL Injection – exploiting vulnerabilities in databases to gain unauthorized access to da 6. Insider Threats – misuse of access by employees or trusted individuals.
7. Zero-Day Exploits – attacks that exploit unknown vulnerabilities before they are patched. 8. Social Engineering – manipulating people into bypassing security measures