2.1.2 Cybersecurity

Cybersecurity is the set of procedures and tools that are implemented to protect the information that is generated and processed through personal computers, servers, mobile devices and networks.

Lesson goals and objectives

In this lesson you will learn:

  • Identify the factors that compromise cyber security
  • Understand the legislation that relates to online security and data management
  • Evaluate the most effective ways to plan for and respond to breaches in online security and data management

One of the essential aspects to take into account in cybersecurity is the updates that are added or modifications made to the operating systems or applications that we have installed in our devices and whose mission is to improve both aspects of functionality and security.

If we do not keep our devices up to date we expose ourselves to all kinds of risks: information theft, loss of privacy, identity theft, etc.

Nor can we forget the risk posed by public wifi. These public networks are not usually protected by a password or even having an access password, many users connect to them. Moreover, these networks do not encrypt the information that is transmitted through them, so they are not secure. When we connect we are accessing a network in which we have no control over what is being transmitted through it, nor who is connected to it.

For all these reasons, we must be very careful when connecting to these free networks, avoiding being able to use them. And if we do so, we should maintain some security guidelines: to have the device updated as well as an antivirus or not to access with user and password to any service.

Another measure to take into account is the use of encryption systems for our data if we are going to copy or store sensitive or private information, to prevent it from being read by others.

Don’t forget either that data on a lost or stolen device can be remotely blocked or deleted.

Drag the words