Skip to main content
Completion requirements

Cybersecurity encompasses various practices and strategies aimed at safeguarding digital assets from unauthorized access, use, disclosure, disruption, modification, or destruction. It's a multifaceted field that
constantly evolves alongside the ever-changing landscape of cyber threats. This presentation explores the core components of cybersecurity, providing a comprehensive overview of its key areas.

Information Security
Focus on protecting the confidentiality, integrity, and availability of
information.

Confidentiality
Ensuring that only authorized individuals can access sensitive
information. This involves implementing access controls,
encryption, and data masking techniques.

Integrity
Maintaining the accuracy and completeness of information. This
includes measures like data validation, change management, and
digital signatures to prevent unauthorized modifications.

Availability
Guaranteeing that information is accessible to authorized users
when needed. This involves implementing disaster recovery
plans, redundancy measures, and security monitoring tools to
ensure uninterrupted service.

Non-repudiation
Preventing individuals from denying their actions. This is achieved
through digital signatures, timestamps, and audit trails that
provide evidence of data origin and modifications.

Last modified: Tuesday, 9 September 2025, 12:14 PM