What is cybersecurity?
Cybersecurity is not a single product or a checkbox you tick. It is an ongoing practice that involves preventing, detecting, and responding to three broad categories of threat:- Unauthorized access — someone reading data they are not permitted to see.
- Unauthorized modification — someone changing or deleting data without permission.
- Denial of authorized access — blocking legitimate users from reaching resources they need.
The most secure computer is one that is completely unplugged and inaccessible — but it is also completely useless. Good security always balances protection with the practical needs of the people who use the system.
Key terms
Vulnerability
Vulnerability
A vulnerability is a weakness in software, hardware, configuration, or processes that can be exploited to violate security. Vulnerabilities are catalogued in public databases such as the National Vulnerability Database (NVD) and the CVE list. They can range from a misconfigured file permission to a flaw deep in an operating system kernel.Vulnerabilities are distinct from the attacks that exploit them. A vulnerability is a condition; an exploit is the action that takes advantage of it.
Threat
Threat
A threat is any potential cause of an unwanted event that could harm a system or organization. Threats can come from external attackers, malicious insiders, natural disasters, or simple human error. When you think about threats, ask: who wants to attack us, and what do they want to achieve?
Risk
Risk
Risk is the combination of a threat, a vulnerability, and the potential cost of a successful attack. A common formulation is:
Risk = Threat × Vulnerability × Cost
- Threat: Who is likely to attack, and what method might they use?
- Vulnerability: How easy is it to exploit a weakness in your system?
- Cost: What do you lose if the attack succeeds — data, revenue, reputation, safety?
Exploit
Exploit
An exploit is a piece of code, a technique, or a sequence of actions that takes advantage of a vulnerability to cause unintended behavior in a system. A vulnerability is the weakness; an exploit is the tool or method that weaponizes it.
Attack surface
Attack surface
The attack surface is the sum of all potential entry points where an attacker could try to subvert a system. Any way data gets into your system — email, network ports, USB drives, downloaded software, SMS messages, even hardware chips — is part of your attack surface. Reducing your attack surface is one of the most effective things you can do to improve security.
Privacy vs. security
Privacy and security are closely related but solve different problems.| Privacy | Security | |
|---|---|---|
| Concern | Who controls personal information | Who can access systems and data |
| Question asked | What data is shared, with whom, and for what purpose? | Is data protected from unauthorized access and tampering? |
| Example measure | Opt-out settings, data minimization policies | Encryption, firewalls, access control |
Defense in depth
No single security control is infallible. Defense in depth is the strategy of layering multiple independent controls so that if one fails, others still protect the system. Think of it like an onion: each layer has to be peeled back before an attacker can reach the core. The layers typically span three categories:- Physical controls — locks, access badges, security cameras, and guards that restrict who can physically touch your hardware.
- Technical controls — firewalls, intrusion detection systems, encryption, antivirus software, and access control mechanisms that protect systems at the network, host, application, and data layers.
- Administrative controls — security policies, staff training, multi-factor authentication requirements, patch management processes, and incident response plans.
- Preventive — stop an attack before it succeeds (e.g., firewalls, access control).
- Detective — identify and log an attack in progress (e.g., intrusion detection systems, audit logs).
- Corrective — recover from an attack after it occurs (e.g., backups, incident response procedures).