MDIS Blog

Main Menu

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
  • + Become A Contributor

logo

Header Banner

MDIS Blog

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
Information Technology
Home›Information Technology›Cybersecurity

Cybersecurity

By MDIS
28th August 2019
4799
0
Share:

Hi, I am Nishchitha and I’m currently pursuing the Bachelor of Science (honours) in Information Technology awarded by Teesside University at MDIS. I chose to pursue the degree in information technology as it is a field that I am interested in and my study experience at MDIS has been challenging and enriching.

 

Cyber security is a practice of protecting computers, networks, programmes and data from unauthorised access or attacks that are targeted at exploitation. The network security includes activities that protect the usability, reliability, integrity and safety of the network and programmes from digital attacks.

Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users or interrupting normal business processes.

Cyber threats are the possibility of a malicious attempt to damage or disrupt a computer network or system.

Cyber-threat intelligence feeds make the unknown, known. They make visible the threats that others have already detected but have not yet been seen by their own security infrastructure.

Improved threat intelligence enables one to understand if the unknown encountered present a threat to your customer, and this information will be useful in making an informed decision.

If you have an inkling of a cyber-threat, but can’t be absolutely sure, cyber-threat intelligence feeds aid your ability to correctly classify files and help you avoid false positives and false negatives.  This in turn reduces uncertainty for the consumer, while helping the consumer in identifying threats and opportunities.

Cybersecurity demands focus and dedication. It protects the data and integrity of computing assets belonging to or connecting to an organisation’s network. Its purpose is to defend those assets against all threats throughout the entire life cycle of a cyber–attacks. A small loophole may lead to a major loss.

Understanding the Role of Cybersecurity
In a connected world, we each have a responsibility to protect ourselves and the people we interact with, and it all begins with an understanding of cybersecurity.

Anything that relies on the internet for communication, or is connected to a computer or other smart device, can be affected by a breach in security.  These include:

  • communication systems like emails, phones and text messages
  • transportation systems including traffic control, car engines, airplane government databases, including social security numbers, licenses and tax records
  • financial systems including bank accounts, loans and pay checks
  • medical systems including equipment and medical records
  • Educational systems including grades, report cards and research information.

Conclusion

There are at least three main principles behind cybersecurity: confidentiality, integrity and availability.

  • Confidentiality involves any information that is sensitive and should only be shared with a limited number of people.
  • Integrity involves keeping information from being altered.
  • Availability involves ensuring those who rely on accurate information are able to access it.

Attackers are constantly looking at devices and innovative ways in beating the system.  As such, it is important to be a step ahead of them in plugging the loopholes.

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0
MDIS

MDIS

Founded in 1956, the Management Development Institute of Singapore (MDIS) is Singapore’s oldest not-for-profit professional institute for lifelong learning. MDIS has two main subsidiaries: Management Development Institute of Singapore Pte Ltd which oversees its Singapore academic operations, and MDIS International Pte Ltd which focuses on MDIS’ globalisation strategy. MDIS offers internationally-accredited courses in Business and Management, Engineering, Fashion and Jewellery Design, Health and Nursing, Information Technology, Languages and Education, Life Sciences, Media and Communications, Psychology, Tourism and Hospitality Management, and Safety and Environmental Management. These programmes are offered in collaboration with renowned universities in the United Kingdom.

Related articles More from author

  • Your Guide to Travelling in Singapore
    Information Technology

    Your Guide to Travelling in Singapore

    18th May 2021
    By MDIS
  • SOT
    Featured BK VideoInformation Technology

    MDIS School of Technology

    24th January 2018
    By MDIS
  • cloud computing
    Featured Full Width SliderInformation Technology

    Facts about Cloud Computing

    30th September 2017
    By MDIS
  • Computing hacking
    Featured Full Width SliderFeatured PostInformation Technology

    The Truth About Hacking In Five Minutes

    4th June 2018
    By MDIS
  • Importance of Data/Information Security
    Featured BK RowInformation Technology

    Importance of Data/Information Security – A Biggest Asset

    11th June 2021
    By MDIS
  • Featured PostInformation Technology

    Credential Stuffing and Its Potential Impact

    5th August 2020
    By Yu Chang Teo

Leave a reply Cancel reply

You may also like

  • SARS
    Life Sciences

    Severe Acute Respiratory Syndrome (SARS): Symptoms and Treatments

  • Dream Job
    Career ManagementFeatured Full Width SliderFeatured Post

    Top 3 Crucial Things to Note Before Applying For Your Dream Job

  • SGTech
    Featured BK RowInformation Technology

    SGTECH Launchpad Tour

Categories

  • Business & Management (26)
  • Campus (5)
  • Career Management (21)
  • College (17)
  • Engineering (10)
  • Event (32)
  • Fashion & Design (31)
  • Featured BK Row (64)
  • Featured BK Video (10)
  • Featured Full Width Slider (58)
  • Featured Post (84)
  • Health & Nursing (6)
  • Information Technology (27)
  • Languages (17)
  • Life Sciences (24)
  • Lifestyle (7)
  • MDC (14)
  • Media & Communications (28)
  • Psychology (8)
  • Safety Management (7)
  • Student Life (15)
  • Tourism & Hospitality (26)
  • Uncategorized (10)

Follow us on Instagram

This error message is only visible to WordPress admins

Error: No connected account.

Please go to the Instagram Feed settings page to connect an account.

TAGS

  • Immersion programmes
  • nursing degree in Singapore
  • Digitalisation
  • MDIS Alumni
  • Engineering jobs
  • technology
  • biomedical sciences
  • nursing school in singapore
  • MBA vs MSc
  • MDIS Events
  • cybersecurity
  • Tourism and Hospitality
  • Fashion Design
  • nursing course
  • social media
  • Alumni
  • head of school
  • covid-19 jobs
  • life sciences
  • Health & Nursing
  • studying tips
  • MBA or MSc
  • What is an MSc
  • engineering
  • lecturer's life
  • Artificial intelligence
  • difference between MBA and MSc
  • Business Administration
  • 7 habits of highly effective people
  • MBA and MSc graduates
THINK SUCCESS. THINK MDIS.
Copyright© 2022. MDIS Blog. All Rights Reserved.
     
Where lifelong learning begins