What is Cybersecurity?

Cybersecurity: the protection of internet-connected systems (ex: hardware, software, data, etc.) from cyber threats.
Although a relatively recently developed field of practice, this job is extremely important because there is now an established profession that has the purpose of protecting huge tech platforms, including major social platforms (ex: instagram, facebook, snapchat, etc.) or huge voting events stored in databases. People who learn things concerning cybersecurity are able to protect various online platforms from being compromised by a foreign threat or any unauthorized access into a specific component of the database.

How Do Cyber-Attacks Compromise Tech Platforms?

Cyber-Attacks are becoming more and more of a common problem when it comes to the technological field. For those that do not know what cyber-attacks are, they are essentially online attacks that are used to interfere and compromise with a target (a specific network). These online assaults are very wide-ranged and vary with every case; each and every conflict is very different from the other depending on what platform was attacked and to what degree the network was compromised by the cybercriminals floating through the internet.
As these problems deepen further as society becomes more and more dependent on technology and computers, the development of the cybersecurity field and people who take up the profession is extremely important at this point in time. With more cybersecurity efforts, there will be more able people to stop cyber-attacks before they can become detrimental to the network and to limit the amount of online attacks made in the first place.

Types of Cybersecurity Threats

The five most common types of threats include the following:
1. Malware- a malicious software (frequently viruses) used to breach information in the targeted network
2. Phishing- social engineering attack that appears as a seemingly trusted source
3. Man-In-The-Middle Attack (MITM)- A cyber-attacker intercepts and sends messages between two parties (also known as the eavesdropping attack and often used to steal important information)
4. Distributed Denail-of-Service Attack (DDoS)- a series of attacks to the targeted central server using simultaneous data requests
5. Zero-Day Exploit: When a network vulernability is announced, there is a period of time where it remains vulnerable, allowing cyber attacks to take the opportunity to target the essentially weak network