TheCyberSecHub

Cybersecurity Fundamentals

Cybersecurity involves safeguarding data, systems, and networks from cyber threats. These threats typically seek to access, disrupt, modify, or delete sensitive information or interrupt the functioning of systems and services. This page presents the basic principles and practices of cybersecurity โ€” providing a vital guide for those entering the field or wishing to grasp the fundamental challenges and strategies related to contemporary information security.


๐Ÿ” 1. Security Fundamentals

Central to cybersecurity is an essential yet impactful question:
How can we safeguard our valuable digital resources from harm?
We start with the Confidentiality, Integrity, Availability (CIA Triad) โ€” the core framework that informs almost all cybersecurity initiatives:

ElementDescription
ConfidentialityEnsuring that data is only accessible to individuals who have permission/authorisation. Techniques include encryption, access control, and data classification.
IntegrityProtecting data from unauthorised modification or deletion. Includes hashing, checksums, and digital signatures.
AvailabilityEnsuring that data and services are available to authorised users whenever required. This includes redundancy and disaster recovery.

CIA Triad

โ€œCybersecurity involves more than just firewalls and defence-in-depth โ€” it requires an understanding of risk, trust, and resilience.โ€

Other key terms to understand include:

Asset Threat Vulnerability Risk


2. Elements of a Typical Cyberattack

To protect ourselves effectively, we need to understand how cyberattacks occur. Most attacks follow a phased, methodical approach โ€” from researching targets to executing harm.

๐Ÿ”„ Common Stages of a Cyberattack

  1. Conduct Research
    Cyber attackers (or adversaries) begin with reconnaissance โ€” gathering intelligence through public sources. This includes LinkedIn profiles, open ports, employee emails, and web applications.
    They may use tools like OSINT Framework, phishing kits, and scanning platforms like Metasploit.

  2. Identify Targets
    Once targets are identified, attackers deliver their payload โ€” via phishing emails, malicious files, or drive-by downloads โ€” to exploit vulnerabilities like outdated software.

  3. Exploit Target
    The attacker breaches the system, installs backdoors, and creates persistence. Malware like ransomware or spyware is typically deployed. C2 (Command & Control) channels are established.

  4. Do Harmful Things
    Attackers may:

    • Exfiltrate sensitive data (emails, credentials, business records)
    • Sabotage services (erase backups, encrypt drives)
    • Demand ransoms in cryptocurrencies (via ransomware)

Cyber Kill Chain Diagram

The Cyber Kill Chain model illustrates this structured attack lifecycle.
By disrupting even one stage in the chain, defenders can often neutralize the attack altogether.


3. Elements of a Typical Security Program

Effective cybersecurity programs include a strategic blend of governance, risk, operations, and training initiatives.

๐Ÿ›ก๏ธ Core Components of a Security Program

ComponentDescription
Risk ManagementIdentify, assess, and mitigate potential cybersecurity risks through prioritization.
GovernanceEstablish roles, responsibilities, policies, and oversight mechanisms.
Security ControlsImplement technical safeguards like firewalls, endpoint protection, and access control.
Security Awareness & TrainingEmpower users to detect and respond to threats (e.g., phishing simulations).
Incident Response & RecoveryEstablish workflows to detect, contain, investigate, and recover from attacks.
Ethical ResponsibilityEnsure compliance with laws, responsible disclosure practices, and ethical guidelines.

Security Program Diagram


This page offers the foundational building blocks for understanding cybersecurity.
Next, explore other sections like Cyber Defense Models or SOC & SIEM to deepen your learning.