black and gray laptop computer turned on
black and gray laptop computer turned on

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”
Stephane Nappo

Cybersecurity, a word that has gained a lot of significance in the last two decades. With the growing perimeter of digital information, there is a greater need for security professionals in many domains. From IT companies to hospitals, the demand for security has been on a high as a lot of information is requiring confidentiality, integrity and availability

Cybersecurity is like an ocean with multiple disciplines. These areas include cyber threat intelligence, security architecture, security operations, risk assessment, framework and governance. Each specialty has a pivotal role to play in cybersecurity.

green and black digital device
green and black digital device

Can security be 100%?

In the recent past since the COVID-19 pandemic, there has been huge dependency on the Work From Home environment. As per the statistics in this year 2020, a lot of users have been exposed to phishing fraud, identity theft and unreported records of usernames and passwords being stolen.

NBC news reported to have discovered more than 500,000 Zoom credentials have been stolen and sold on the dark web. This has stirred a lot of concerns with individuals who aren’t computer savvy or find it difficult to point the difference between a fake email and a genuine one.

An individual or an entity can do everything in the power to safeguard information but security can never be 100%.

Cybersecurity is a field of study that requires a combination of various facets like theoretical knowledge, practical experience or hands-on, report writing and finally certifications. I have added a knowledge base section as I believe it is quintessential to understand the various domains within cybersecurity as the functioning of these domains are interlinked. The tools that has been covered here are basic tools based off Linux and some complex software like Intrusion Detection System or IDS, Intrusion Prevention System or IPS.