What is Cybersecurity?

A brief introduction to Cyber Security and the most common threats people & organizations face daily.

2 years ago   •   3 min read

By Karla Evelize
Table of contents

If you follow Codaisseur on social media, you probably already know that we’re launching something new and exciting: the Cyber Security Bootcamp, a 6-month part-time (evening classes) course starting in January.

But what exactly is Cyber Security?, you might be wondering. In this article, I'll try to answer some basic questions about it and explain why it's so important nowadays.

As a broad definition, we can say Cyber Security is the practice that defends computers, servers, mobile phones, electronic systems, networks, and data against attacks.

Why do we need Cyber Security?

The dangers and losses (money, jobs, relationships and beyond) of poor online security have intensified the debates about Cyber Security all over the world, as more and more companies, industries, and governments use connected digital systems, which means they can at any time become targets to cyber attacks.

To understand how it works and why we need cyber security, let's think for a bit about what can happen if a network is breached:

  • Partial or total loss of data
  • Confidential data theft: passwords, personal id's, bank data etc
  • Blackmail to get sensitive information back
  • Spying
  • Manipulation of company data
  • Spamming users

Cyber Threat Categories

  • Cybercrime: a person or a group of people targeting systems for financial gain or to cause disruption;
  • Cyberattack: often involves politically motivated data theft;
  • Cyber terrorism: intended to undermine electronic systems in order to cause panic or fear.

What are the most common Cyber threats?

How do cybercrime, cyber attacks, and cyber terrorism work? How do the attackers get control of computer systems?

There are quite a few ways of doing that, but here are some of the most common ones:

  • DDoS (distributed denial-of-service): an attack where cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions.
  • Malware: a piece of software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer; known examples are viruses, trojans, spyware.
  • SQL injection: cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. This gives them access to the sensitive information contained in the database.
  • Phishing: cybercriminals target potential victims with emails that appear to be from legitimate senders (banks are often used here) asking for sensitive information. Phishing attacks are used to dupe people into handing over credit card data and other personal information.
  • (Wo)Man in the middle attack: a cybercriminal intercepts communication between two parties in order to steal data. On an insecure WiFi network, for example, an attacker could intercept data being passed from one or more devices to the network.

A career in Cyber Security

Now that you know a bit more about it, do you think a career in Cyber Security could be your next professional step?

The Cyber Security industry has grown more than 30 times in the last 10 years and is expected to keep growing exponentially in the future.

And not only that, but the shortage of Cyber Security professionals is now estimated at nearly 3 million around the world.

So if you feel like this could be a (new) career path for you, sign up for our free open evening event and take the first steps.

Want to know more about our Cyber Security course?

Spread the word

Keep reading