CYBERSECURITY

Protecting Information in the Digital Age

"In a connected world, security is not an option — it's a necessity."

Learn More

About Cybersecurity

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes.

Importance in Today's World

In our increasingly connected world, everyone benefits from advanced cyberdefense programs. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies.

Cybersecurity & Network Engineering

Cybersecurity is a fundamental pillar in the field of network engineering. As networks become more complex and interconnected, the need for robust security measures becomes critical. Network professionals must understand both the technical infrastructure and the security protocols needed to protect valuable digital assets.

$6 Trillion

Expected global cybercrime cost by 2025

Every 39 seconds

A cyber attack occurs

43%

Of cyber attacks target small businesses

Common Cyber Threats

Understanding the threats is the first step to protection

Phishing

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communications. Attackers often use fake emails or websites.

High Risk

Ransomware

Malicious software designed to block access to a computer system until a sum of money is paid. It encrypts files and demands payment for the decryption key.

Critical

Malware

Software intentionally designed to cause damage to a computer, server, client, or network. Includes viruses, trojans, worms, and spyware.

High Risk

Data Breach

A security incident in which sensitive, protected, or confidential data is accessed or disclosed without authorization. Can result in massive data leaks.

Critical

Brute Force Attack

A trial-and-error method used to obtain information such as passwords or Personal Identification Numbers (PINs) by systematically checking all possible combinations.

Medium Risk

Social Engineering

Psychological manipulation of people into performing actions or divulging confidential information. Exploits human trust rather than technical vulnerabilities.

High Risk

Security Best Practices

Essential steps to protect yourself and your organization

01

Strong Passwords

Use complex passwords with a minimum of 12 characters, including uppercase and lowercase letters, numbers, and special symbols. Never reuse passwords across different accounts.

  • Use a password manager
  • Change passwords regularly
  • Avoid personal information
02

Two-Factor Authentication

Enable 2FA on all accounts that support it. This adds an extra layer of security by requiring a second form of verification beyond your password.

  • Use authenticator apps
  • Avoid SMS when possible
  • Keep backup codes secure
03

Encryption

Encrypt sensitive data both at rest and in transit. Use end-to-end encryption for communications and full-disk encryption for devices.

  • Use HTTPS websites
  • Encrypt email communications
  • Enable device encryption
04

Regular Backups

Implement the 3-2-1 backup rule: 3 copies of data, on 2 different media types, with 1 copy offsite. Automate backups and test restoration regularly.

  • Automate backup processes
  • Test data recovery
  • Use cloud and local backups
05

Software Updates

Keep all software, operating systems, and applications up to date. Enable automatic updates when possible to patch security vulnerabilities quickly.

  • Enable automatic updates
  • Update firmware regularly
  • Remove unused software
06

Security Awareness

Stay informed about the latest security threats and trends. Educate yourself and others about recognizing and avoiding common attack vectors.

  • Verify email senders
  • Think before clicking links
  • Report suspicious activity

Technical Glossary

Essential cybersecurity terminology

Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

VPN (Virtual Private Network)

A secure connection between a device and a network that encrypts data and hides the user's IP address.

Penetration Testing

An authorized simulated cyber attack on a computer system to evaluate its security and identify vulnerabilities.

Zero-Day Exploit

A cyber attack that occurs on the same day a weakness is discovered in software, before a patch is available.

DDoS Attack

Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic.

SSL/TLS

Secure Sockets Layer/Transport Layer Security - protocols for establishing authenticated and encrypted links.

Intrusion Detection System (IDS)

A device or software that monitors a network for malicious activity or policy violations.

Endpoint Security

The practice of securing endpoints or entry points of end-user devices from being exploited by malicious actors.

Authentication

The process of verifying the identity of a user, process, or device as a prerequisite to granting access.

Patch Management

The process of distributing and applying updates to software to fix vulnerabilities and improve functionality.

White Hat Hacker

An ethical hacker who uses their skills to improve security by finding vulnerabilities legally and ethically.

Security Token

A physical or digital device used to authenticate a user's identity electronically in two-factor authentication.

About the Author

Gonzalo Pereyra

Network & Cybersecurity Student

This website was created as a final project for the English course. It represents a comprehensive overview of fundamental cybersecurity concepts, threats, and best practices.

Project Information

  • Course: English
  • Year: 2025
  • Institution: IES 9012 San Rafael en Informatica
  • Technologies: HTML5, CSS3, JavaScript