WEBVTT Kind: captions Language: en 00:00:12.000 --> 00:00:15.920 hello and welcome back to this  cyber security awareness course   00:00:16.480 --> 00:00:20.080 in this video we're going to take  an introduction to cyber security   00:00:20.800 --> 00:00:27.360 now beginning by the definition of cyber  security it is defined as the protection of data   00:00:27.360 --> 00:00:33.120 from being stolen damaged altered or even  encrypted without the ownership's approval   00:00:34.320 --> 00:00:40.320 now in order for us to apply all of these things  and in order for us to achieve all of these things   00:00:40.960 --> 00:00:48.480 we have to stick with these concepts the first one  is confidentiality the second one is integrity and   00:00:48.480 --> 00:00:55.520 the third one is availability these concepts are  all interconnected with each other meaning that   00:00:55.520 --> 00:01:03.280 one cannot exist without the others let's go ahead  and explain each and every one of those beginning   00:01:03.280 --> 00:01:10.400 by confidentiality it is defined as the security  principle that controls access to information   00:01:11.280 --> 00:01:17.200 it is designed to ensure that wrong people  can never gain access to sensitive information   00:01:17.200 --> 00:01:24.560 meanwhile ensuring that the right people are the  only ones who can access it integrity it refers   00:01:24.560 --> 00:01:30.640 to the accuracy and completeness of data meaning  that data is supposed to be correct and without   00:01:30.640 --> 00:01:39.200 any modifications data availability it means that  information is only accessible to authorized users   00:01:39.200 --> 00:01:46.080 it provides an assurance that your system and  data can be accessed by authoricated users   00:01:46.080 --> 00:01:53.040 whenever they are needed now i know that these  concepts are kind of new to most of us so in order   00:01:53.040 --> 00:01:58.240 for us to have a better understanding of these  things let's go ahead and jump onto this example   00:01:58.880 --> 00:02:03.600 so this is a demonstration of the  cia of security and cia it stands for   00:02:03.600 --> 00:02:08.720 confidentiality integrity and availability  considering that we have a bunch of data   00:02:08.720 --> 00:02:15.280 over here and we've got a user and an attacker  and they are both trying to access this data   00:02:16.080 --> 00:02:23.280 one thing that we can do to apply the cia of  security is by doing encryption now encryption   00:02:23.280 --> 00:02:29.600 means changing the data from being a plain  text to something else called a cipher text   00:02:29.600 --> 00:02:36.960 in which this cipher text is only understandable  by the user and not understandable by the attacker   00:02:37.680 --> 00:02:42.800 so in this way we would have applied  confidentiality by making sure that the   00:02:42.800 --> 00:02:49.280 user is the only one authorized to access the  data and the attacker is not because in the end   00:02:49.280 --> 00:02:56.240 of the day they won't be able to understand what  this data is and we would have applied integrity   00:02:56.240 --> 00:03:02.320 by making sure that the data is complete and  without any modifications because if the attacker   00:03:02.320 --> 00:03:08.560 doesn't understand this data they won't be able  to modify it and then we would have applied   00:03:09.120 --> 00:03:15.760 availability by making sure that this data is  only available to the user since they are the   00:03:15.760 --> 00:03:21.200 only ones who can understand this data and  the attacker won't be able to understand it   00:03:21.200 --> 00:03:26.800 now later on in this course we're going to discuss  the term encryption and learn more about it but   00:03:26.800 --> 00:03:33.040 for now this is it for this video i hope that  you liked it and i'll see you in the next video